240 likes | 265 Views
Learn about data encryption, implementation aspects, encryption packages, concerns, and a product demonstration. Understand the importance of encryption, its benefits, and precautions for a successful implementation.
E N D
Implementing Data EncryptionOpportunities and Challenges Beth E. Binde Bruce T. Rights Harold W. Winshel
Housekeeping • Speaker backgrounds • Cell phones (as well as other devices that beep, chirp and otherwise distract)
Agenda • Define terms • Why implement encryption? • Which encryption package to implement? • What concerns need to be addressed during implementation? • Product demonstration
What is data encryption? • Protecting data by concealing the meaning • Reduces impact of data theft • Helps protect Data At Rest
Three states of data Data at rest Data in transit Data in process
Why implement encryption? • Protect confidential data • Non-public personal information (NPPI) • Intellectual property • Regulatory requirements
Encryption vs. Data Breach Pay now … or pay later
Caution! • Don’t trust a secret or proprietary algorithm or roll your own • Public scrutiny by multiple experts finds the flaws • Public scrutiny beneficial • Protect keys • Keys essential for decryption • Even knowing the algorithm is not sufficient • Don’t rely on any single technology or measure for security
Safeboot: Product of Choice • Gartner Magic Quadrant recommendation • GSA SMARTBuy product • Centrally managed • Provides audit logs • Supports Full Disk Encryption as well as Content Encryption (File/Folder Encryption) • Password recovery, both local and remote • Price
Additional Product Features • Initial disk encryption operation runs in background • Multiple permission levels (32!) • Easy back up of managed systems • Seamless integration following login process • Pre-boot authentication
Implementation: Precautions • Marginal disks are more likely to fail while being exercised during the encryption process • Backup prior to encryption (especially for deans, directors, department chairs and other entities above your pay grade) • Practice on a test machine • Provide training for systems administrators • Document, document and document
Housekeeping: • I recently had a stroke, and it affects my verbal skills. • I have no problem understanding you but I may need to self-correct as I speak. I appreciate your patience. • I’ll try to speak slowly.
Housekeeping (continued): • If I’m unclear, don’t hesitate to ask me to repeat it. • If, after three times, my repetition is still unclear, give up! • (Actually, feel free to see me after the session or email me.)
Implementation Precautions: • Don’t encrypt the Dean’s PC WITHOUT FIRST BACKING UP! • Don’t encrypt any PC without first backing up • Assume the hard drive may (will) fail
Policy Objective: • If you have a clear business need for juicy stuff to be stored on your computer, you have to have authorization in writing.
Implementation Objectives: • Initially, all notebooks with juicy stuff are to be encrypted. • “Juicy stuff” is, certainly among other things, defined as student social security numbers. • After that, all notebooks – regardless of content – are to be encrypted. • The reason: notebook PC’s travel a lot, are more subject to being stolen, are becoming more and more popular as opposed to desktop PC, etc.
Concerns of Users: • Will I be locked out – on campus, or off campus? • Does encryption add a new risk to the data? • No. It adds a nominal amount of currently existing risk. • You should be backing up for data anyway. • Example: PC could be lost, stolen, or experience mechanical failure. • How long will it take to have a password reset?
If Encryption’s So Great, How Come Everyone Doesn’t Use It? • Lack of awareness of reporting requirements if a PC stolen or lost • Cost of purchase • Time • Product evaluation and testing • Installation and maintenance • Staff training • User education • Loss of data due to corruption of encrypted disks • Possible temporary lock out due to forgotten passwords
Product Demonstrations • End user point of view • Administrator point of view
Concluding thoughts • What is encryption? • Why do you need it? • Encryption as part of an overall security posture • Sharing experiences to help you
Questions? • Beth Binde binde@rutgers.edu • Bruce Rights brights@rci.rutgers.edu • Harold Winshel winshel@camden.rutgers.edu