SlideShare une entreprise Scribd logo
1  sur  25
Secure Email
UW Digital ID
Secure Email
Starring the Angry Birds
Introduction
Background: Nicholas Davis
Email, the electronic postcard
Why encryption is important
S/MIME, secure email
What is a UW Digital ID
How does a UW Digital ID work
What is inside a digital ID
Where do digital IDs come from
A story of trust, based on massive payments
Digital IDs for secure email
Digital IDs for digital signing
What encrypting email looks like in practice
Interception of data in transit
How to get that important public key
Email, the electronic postcard
Easy
Cheap
Gets the idea across
Who can see it
What assurance do
you have of
confidentiality?
Does confidentiality
matter? Yes, no,
maybe…
Why Encryption is Important

        Keeps private information private
        HIPAA, FERPA, SOX, GLB compliance
        Proprietary research
        Human Resource issues
        Legal Issues
        PR Issues
        Industrial espionage
        Over-intrusive government
        You never know who is
         listening and watching!
S/MIME Industry Standard
Secure/Multipurpose Internet Mail
Extensions
The equivalent of a Kevlar envelope
for your email
Email is encrypted (wrapped up)
before sending and is secure for its
entire trip, and at its destination
Email is decrypted (unwrapped) only
by the intended recipient
What is a UW Digital ID
• A UW Digital ID is our branded
  digital certificate
• A UW Digital ID is the electronic
  identification equivalent of a
  passport
• It has added benefits too
• Allows you to digitally sign email
  and electronic documents
• Allows you to encrypt email for
  others
• Allows you to decrypt email which
  others have encrypted for you
How Does a Digital ID Work



                    Even some Angry Birds
                    have difficulty
                    understanding this!
What is Inside a Digital ID
Where Do Digital IDs Come From
• A certificate issuer
  recognized by all
  computers around
  the globe
• Root certificates are
  stored in the
  computer’s central
  certificate store
• Requires a stringent
  audit and a lot of
  money!
It Is All About Trust
Using Digital IDs to Secure Email

 Best use for certificates, in my opinion
 Public key enables encryption and ensures that
  the message can only be read by the intended
  recipient
Digital ID Also Demonstrates…..
 Proof of authorship
 The contents of the message have not been
  altered from their original form
 This is done through the use of digital signing
What does it actually look like in practice?
                -Sending-
What does it actually look like in practice
      (unlocking my private key)
               -receiving-
What does it actually look like in practice?
        -receiving- (decrypted)
Digitally signed and verified;
          Encrypted
What does it look like in practice?
    -receiving- (intercepted)
Intercepting the Data in Transit
Send Me a Signed Email,
Please, I Need Your Public Key
Who Uses UW Digital IDs
Everyone in the Office of the Registrar
Everyone in the Office of Financial Aid
Numerous other departments around campus
Over 1300 users already
Those who want to exchange secure email with people
at other UW-System campuses
For encryption and signing of email and attached files
The entire email is encrypted, including attachments
How To Get a UW Digital ID
1. Go to the DoIT Tech Store
2. Tell the friendly people that you would like a UW Digital ID
3. Show them your Faculty/Staff ID card and one other form of ID
4. Go back to your office
5. Within 24 hours, you receive a registration email
6. Follow instructions
7. Click on link to download your UW Digital ID
8. Follow simple import instructions
9. Send a digitally singed email to someone, by clicking on the digitally sign button
10. Now, that person can encrypt mail to you, by clicking on the encrypt button
11. If they send you a digitally signed email, you can now encrypt for them
12. If you both send digitally signed emails, you can now encrypt for each other
13. Digital signed email must only be sent once

* If your department has multiple interested people, we can send someone to do
credentialing at your office
You Never Know Who Is
 Watching – Movie #1
How Do They Do It
    Movie #2
Questions and Discussion
Nicholas Davis
MBA, CISA, CISSP
ndavis1@wisc.edu

Contenu connexe

En vedette (9)

O.a. sba
O.a. sbaO.a. sba
O.a. sba
 
CSEC Social Studies - Sample SBA
CSEC Social Studies - Sample SBACSEC Social Studies - Sample SBA
CSEC Social Studies - Sample SBA
 
Social studies sba 2015 (adri)
Social studies sba 2015 (adri)Social studies sba 2015 (adri)
Social studies sba 2015 (adri)
 
LAND POLLUTION
LAND POLLUTIONLAND POLLUTION
LAND POLLUTION
 
Oa sba
Oa sbaOa sba
Oa sba
 
Kandy social studies sba
Kandy social studies sbaKandy social studies sba
Kandy social studies sba
 
Social Studies SBA
Social Studies SBA Social Studies SBA
Social Studies SBA
 
Social studies sba
Social studies sba Social studies sba
Social studies sba
 
Qualitative data analysis
Qualitative data analysisQualitative data analysis
Qualitative data analysis
 

Plus de Nicholas Davis

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentNicholas Davis
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsNicholas Davis
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development MethodologiesNicholas Davis
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityNicholas Davis
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Nicholas Davis
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewNicholas Davis
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets PersonalNicholas Davis
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...Nicholas Davis
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectNicholas Davis
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Nicholas Davis
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryNicholas Davis
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing EducationNicholas Davis
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An OverviewNicholas Davis
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNicholas Davis
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application SecurityNicholas Davis
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...Nicholas Davis
 

Plus de Nicholas Davis (20)

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An Overview
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
 

How to Secure Email By Using Encryption

  • 3. Introduction Background: Nicholas Davis Email, the electronic postcard Why encryption is important S/MIME, secure email What is a UW Digital ID How does a UW Digital ID work What is inside a digital ID Where do digital IDs come from A story of trust, based on massive payments Digital IDs for secure email Digital IDs for digital signing What encrypting email looks like in practice Interception of data in transit How to get that important public key
  • 4. Email, the electronic postcard Easy Cheap Gets the idea across Who can see it What assurance do you have of confidentiality? Does confidentiality matter? Yes, no, maybe…
  • 5. Why Encryption is Important  Keeps private information private  HIPAA, FERPA, SOX, GLB compliance  Proprietary research  Human Resource issues  Legal Issues  PR Issues  Industrial espionage  Over-intrusive government  You never know who is listening and watching!
  • 6. S/MIME Industry Standard Secure/Multipurpose Internet Mail Extensions The equivalent of a Kevlar envelope for your email Email is encrypted (wrapped up) before sending and is secure for its entire trip, and at its destination Email is decrypted (unwrapped) only by the intended recipient
  • 7. What is a UW Digital ID • A UW Digital ID is our branded digital certificate • A UW Digital ID is the electronic identification equivalent of a passport • It has added benefits too • Allows you to digitally sign email and electronic documents • Allows you to encrypt email for others • Allows you to decrypt email which others have encrypted for you
  • 8. How Does a Digital ID Work Even some Angry Birds have difficulty understanding this!
  • 9. What is Inside a Digital ID
  • 10. Where Do Digital IDs Come From • A certificate issuer recognized by all computers around the globe • Root certificates are stored in the computer’s central certificate store • Requires a stringent audit and a lot of money!
  • 11. It Is All About Trust
  • 12. Using Digital IDs to Secure Email  Best use for certificates, in my opinion  Public key enables encryption and ensures that the message can only be read by the intended recipient
  • 13. Digital ID Also Demonstrates…..  Proof of authorship  The contents of the message have not been altered from their original form  This is done through the use of digital signing
  • 14. What does it actually look like in practice? -Sending-
  • 15. What does it actually look like in practice (unlocking my private key) -receiving-
  • 16. What does it actually look like in practice? -receiving- (decrypted)
  • 17. Digitally signed and verified; Encrypted
  • 18. What does it look like in practice? -receiving- (intercepted)
  • 19. Intercepting the Data in Transit
  • 20. Send Me a Signed Email, Please, I Need Your Public Key
  • 21. Who Uses UW Digital IDs Everyone in the Office of the Registrar Everyone in the Office of Financial Aid Numerous other departments around campus Over 1300 users already Those who want to exchange secure email with people at other UW-System campuses For encryption and signing of email and attached files The entire email is encrypted, including attachments
  • 22. How To Get a UW Digital ID 1. Go to the DoIT Tech Store 2. Tell the friendly people that you would like a UW Digital ID 3. Show them your Faculty/Staff ID card and one other form of ID 4. Go back to your office 5. Within 24 hours, you receive a registration email 6. Follow instructions 7. Click on link to download your UW Digital ID 8. Follow simple import instructions 9. Send a digitally singed email to someone, by clicking on the digitally sign button 10. Now, that person can encrypt mail to you, by clicking on the encrypt button 11. If they send you a digitally signed email, you can now encrypt for them 12. If you both send digitally signed emails, you can now encrypt for each other 13. Digital signed email must only be sent once * If your department has multiple interested people, we can send someone to do credentialing at your office
  • 23. You Never Know Who Is Watching – Movie #1
  • 24. How Do They Do It Movie #2
  • 25. Questions and Discussion Nicholas Davis MBA, CISA, CISSP ndavis1@wisc.edu