Title: Identifying and Encrypting Personal Information
1Identifying and Encrypting Personal Information
- Using Cornell Spider and
- Pointsec for PC
- Benjamin Stein
- Doreen Meyer
- cybersecurity_at_ucdavis.edu
2Overview
- What is personal information?
- Searching for personal information using Cornell
Spider - Mitigating risk of exposure of personal
information - Encryption Policy, Encryption Options
- Whole disk encryption using Pointsec for PC
- Questions
3Personal Information and HIPAA
- HIPAA Health Information Portability and
Accountability Act - Psychological Services
- Medical Records
- http//www.hhs.gov/ocr/hipaa/
4Personal Information CA SB1386 and Civil Code
1798
- Account access number and password
- Bank/financial account number
- California identification card number
- Credit/debit card number
- Drivers license number
- Social Security number
- http//www.privacy.ca.gov/code/ipa.htm
5Personal Information FERPA
- Family Education Rights and Privacy Act of 1974
(FERPA) - Class level, class schedule, academic status,
grades, instructors, transcripts - Student ID number, Social Security number
- Fees paid, loan collection records, financial aid
records, etc. - http//www.ed.gov/policy/gen/guid/fpco/ferpa/index
.html
6Searching for personal information
- Data focus credit card numbers and Social
Security numbers - UCD supported products Cornell Spider and
PowerGREP
7Mitigating Risk of Exposure of Personal
Information
- Higher cost (time, tools) for administering a
system containing personal information. - IET supports the Cyber-safety program and a
number of tools that assist in protecting
personal information, including Tripwire,
Spider/PowerGREP, self-directed Nessus scans, and
Pointsec.
8Maintain a list of systems containing sensitive
data
- Catalog the system name, IP, owner, type of
service running on the system, type of sensitive
data residing on the system - Share this information with the technical support
staff and the unit administrative managers - Confirm and update this information on a regular
basis
9Monitor when the data is accessed or modified
- Use Tripwire to identify file and directory
changes. - Write logs to a central logging server (syslogng,
snare, MOM). - Turn on auditing of successful and unsuccessful
logins. - Read your logs on a regular basis.
10Restrict access to the system and its sensitive
data
- No group accounts (cannot audit access)
- Access system and data using encrypted protocols
such as ssh (sftp, scp), ssl (https), rdp, ipsec
- Evaluate physical security
- Use host-based and hardware firewalls
11Use, share, or transfer restricted data in a safe
manner
- Do not use email to send unencrypted restricted
data. - Do not use restricted data as a key in a
database. - Do not use restricted data on a test or
development system. - When sharing restricted data, ensure that users
are aware that the data should be handled
carefully and in compliance with policies.
12Cornell Spider Demo
13Encryption Policy
- UC Davis whole disk encryption policy draft
http//security.ucdavis.edu/encryption_policydraft
.pdf - UCOP protection of personal information policies
http//www.ucop.edu/irc/itsec/infoprotect.html
14Encryption Options
15Encryption Options
16Encryption Options
17Pointsec for PC at UCD
- http//security.ucdavis.edu/encryption.cfm
18Pointsec for PC
- If a drive is lost or stolen, the encrypted
partitions and everything on them are reasonably
secure. - Meets certain legal requirements
19What it isnt
- Pointsec for PC is not a complete encryption
solution - Currently limited to 2000 and XP
- Only encrypts partitions
- Does not encrypt network drives
20Features
- Whole disk encryption
- Multiple user access
- Configuration options
- Recovery tools
- Enterprise management
- Logging
- Enforceable policies
- Permissions
21Experience
- Login screen at boot
- System tray icon
- Transparent to OS
- Minimal performance impact
22Example
23(No Transcript)
24System Tray Icon
- While encrypting
- Fully encrypted
25How to install
- Available to individuals and departments
- Check requirements
- Request license from IET Security
- Decide on default or custom configuration
- Get install media
- Return recovery file
- After encryption completes return log file
26Requirements
- Windows 2000, XP and Vista soon
- No dual boot
- No servers
- No fancy disk configurations
27Preparing the System
- Backup!
- Defrag
- Scan for viruses, etc
- Uninstall and disable the unnecessary services
- Check the disk(s)
28Installing the Software
- Use administrative account
- Launch installer
- Reboot
- Login to Pointsec
- Login to OS
- Grab recovery file
- Encryption begins
29Demo
30Encryption Process
- Encryption proceeds at 10-20GB/hr
- Depends on disk size not amount of data
- System can be used, shut down or rebooted
- After encryption completed grab log file
31Support
- Remote password reset
- Managing users
- Uninstall
- Updates and upgrades
- Recovery disk
- Barts disk
32Remote Password Reset
- Depends on accounts name and password or
certificate - Challenge and response
- Also one-time for forgotten tokens
33(No Transcript)
34Managing Users
- Types of users
- Normal, Service, Temp
- Types of permissions
- Privileged and plain permissions
- Creating additional users
35Uninstall
- Requires two accounts with rights
- Can be faster to clone or recover than decrypt
36Updates, Upgrades and Reinstalls
- Updates
- Change users, passwords, certs or settings
- Upgrades
- Major product upgrade?
- Reinstalls
- Add additional partitions or disks
37Recovery Disk
- Create from recovery file or target computer
- Requires two admin accounts
- Decrypts
38Barts PE with Plug-in
- Requires version specific plug-in
- Must boot and login
- Ctrl F10 for alternative boot menu
- Barts then has full access to disk
39Customizing
- Default configuration will meet most needs,
however, there are lots of options - Configuration worksheet
- Alternative profiles
40(No Transcript)
41UCLA beat USC
42Review
- Whole Disk Encryption
- Low overhead
- Quick default install
- Support options
- Highly customizable
43Additional Resources
- Product documentation
- Pointsec 24 x 7 tech support
- IET cybersecurity_at_ucdavis.edu
44Questions Answers
45(No Transcript)