{"title":"Encryption technologies: testing and identifying campus needs","authors":"Gale D. Fritsche, Sara K. Rodgers","doi":"10.1145/1294046.1294071","DOIUrl":null,"url":null,"abstract":"Lehigh University is implementing a plan to secure sensitive information across campus through the use of various encryption technologies. Several committees were formed, at all levels of the University, to advise, identify, and direct data security activities at the enterprise level. One of these committees was assigned to take a detailed look at the types of hardware and media that need to be secure, to test various encryption technologies and hardware devices, and to produce a recommendation on which technologies needed to be implemented. The committee began by developing a document listing the types of hardware and media that need to be secured, operating systems that need to be supported, and an estimate of the number of individuals on campus with access to secure information. Special criteria were developed for evaluating the products such as: price/performance, platform compatibility, media compatibility (SD cards, USB keys, handhelds), authentication level (one- or two-factor), user friendliness, key management, and enterprise implementation tools. Next, several whole-disk, file, and volume encryption software packages were selected and evaluated as well as special devices such as USB keys and handheld devices. Performance benchmarks were run on the test systems to compare performance variations. Enterprise encryption key management features were also tested. This session will provide a detailed overview of the various steps involved in the evaluation process mentioned above, discuss the successes and failures encountered, and review the final results.","PeriodicalId":277737,"journal":{"name":"Proceedings of the 35th annual ACM SIGUCCS fall conference","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 35th annual ACM SIGUCCS fall conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1294046.1294071","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Lehigh University is implementing a plan to secure sensitive information across campus through the use of various encryption technologies. Several committees were formed, at all levels of the University, to advise, identify, and direct data security activities at the enterprise level. One of these committees was assigned to take a detailed look at the types of hardware and media that need to be secure, to test various encryption technologies and hardware devices, and to produce a recommendation on which technologies needed to be implemented. The committee began by developing a document listing the types of hardware and media that need to be secured, operating systems that need to be supported, and an estimate of the number of individuals on campus with access to secure information. Special criteria were developed for evaluating the products such as: price/performance, platform compatibility, media compatibility (SD cards, USB keys, handhelds), authentication level (one- or two-factor), user friendliness, key management, and enterprise implementation tools. Next, several whole-disk, file, and volume encryption software packages were selected and evaluated as well as special devices such as USB keys and handheld devices. Performance benchmarks were run on the test systems to compare performance variations. Enterprise encryption key management features were also tested. This session will provide a detailed overview of the various steps involved in the evaluation process mentioned above, discuss the successes and failures encountered, and review the final results.