130 likes | 273 Views
Encryption Applications. George Bailey Information Security Ivy Tech Community College. Tech Day – Columbus, Indiana. Topics. Password Vaults Data Encryption E-Mail Encryption Transport Encryption Hashing. Tech Day – Columbus, Indiana. Password Vaults. Too many passwords to remember
E N D
Encryption Applications George Bailey Information Security Ivy Tech Community College Tech Day – Columbus, Indiana
Topics • Password Vaults • Data Encryption • E-Mail Encryption • Transport Encryption • Hashing Tech Day – Columbus, Indiana
Password Vaults • Too many passwords to remember • Bad practice to write them down unprotected…Avoid sticky Note Syndrome! • Vaulting allows for encrypted storage of password databases Tech Day – Columbus, Indiana
Password Vault Demo http://keepass.sourceforge.net/ Tech Day – Columbus, Indiana
Data Encryption • Data Confidentiality • No unauthorized disclosure of data • Protect data on network shares • Protect data on removable media & mobile devices • Data Integrity • No unauthorized modification of data Tech Day – Columbus, Indiana
Data Encryption Demo • File Encryption • GnuPG –http://www.gnupg.org/ • Virtual Disks • TrueCrypt – http://www.truecrypt.org/ • Private Disk – http://www.dekart.com/ • Whole Disk • Pretty Good Privacy – http://www.pgp.com/ Tech Day – Columbus, Indiana
E-Mail Encryption • Secure communication • Contents of E-mail encrypted • Source authentication • Digital signature confirms sender authenticity • Message integrity • Digital signature used to verify genuineness of message content Tech Day – Columbus, Indiana
E-Mail Encryption Demo Tech Day – Columbus, Indiana
Transport Encryption • Secure Authentication • Login credentials are encrypted • Secure Terminal Emulation • Screen data viewed is encrypted (e.g. system configs) • Secure Data Transfer • Unlike FTP, data transfers are encrypted Tech Day – Columbus, Indiana
Transport Encryption Demo • Putty - http://www.chiark.greenend.org.uk/~sgtatham/putty/ Tech Day – Columbus, Indiana
Hashing • Confirm the integrity of data • Confirm MD5 and SHA-1 hashes of software • Fast one-way encryption for password storage • Used to detect errors in transmission • Redundancy check Tech Day – Columbus, Indiana
Hashing Demo • Confirming MD5 and SHA-1 hashes DigestIT - http://digestit.kennethballard.com/download.html Tech Day – Columbus, Indiana