240 likes | 482 Views
IS3340 Windows Security Unit 3 Setting up Windows Systems Using Encryption and Application Rules. Learning Objective and Key Concepts. Learning Objective Set up encryption in a given organization to secure Windows environment. Key Concepts
E N D
IS3340 Windows Security Unit 3 Setting up Windows Systems Using Encryption and Application Rules
Learning Objective and Key Concepts Learning Objective • Set up encryption in a given organization to secure Windows environment. Key Concepts • Setting bitlocker, applocker, file, folder, and volume level encryption • Setting up secure communication protocols • Security certificate • Public key infrastructure (PKI)
Secure Protocols in Windows • Secure Sockets Layer (SSL) or Transport Layer Security (TLS) • Wi-Fi Protected Access (WPA)
Secure Protocols in Windows (Continued) • Virtual Private Network (VPN) protocols • Internet Protocol Security or Layer 2 Tunneling Protocol (IPsec or L2TP) • Point-to-Point Tunneling Protocol (PPTP) • Secure Socket Tunneling Protocol (SSTP)
Security Certificates • Solutions to balance encryption algorithms strengths • Use asymmetric encryption to exchange a symmetric key. • Use symmetric encryption after key exchanges further messages. • Security certificate • Use identity information in addition to Public key for encryption.
Server Certificates • Purchase a certificate • Use Internet information server (IIS) to request a server certificate. • Send request to issuer. • Import purchased certificate into IIS.
Server Certificates (Continued) • Create your own using Active Directory certificate services • Use IIS to create a self-signed certificate. • Export the certificate from IIS. • Import the certificate to each client.
Self-Signed Certificate Create Certificate Export Certificate Import Certificate on Clients
PKI • General approach to handling keys • Uses trusted entities and certificates • Trusted entity—Certificate Authority (CA)
PKI (Continued) • To set up a connection: • Get a certificate from a CA for the connection target. • Decrypt the certificate using the CA’s public key. • The decrypted certificate contains the public key of the connection target.
Encrypted Data Transmission Encrypted data transmission
Encryption for Compliance • Many regulations mandate encryption for transmitting sensitive data • Health Insurance Portability and Accountability Act (HIPAA)–Private medical information • Gramm-Leach-Bliley Act (GLBA)–Financial information • Payment Card Industry Data Security Standards (PCI DSS)–Payment card information • Multiple state laws–Personal information
PKO Bank Polski • One of Poland’s largest banks • PKO’s needs • Authorize users, devices, and applications • Protect documents and e-mail messages • Central administration
PKO Bank Polski (Continued) • Solution–Windows Server 2008 • With System Center Operations Manager 2007 • Improved security and efficiency
Summary In this presentation, the following topics were covered: • Secure communication • Encryption • Security, server, and self-signed certificates • PKI