Protect Data with Encryption | UCI Information Security (2024)

What is Encryption?

The most reliable way to protect confidential or sensitive data is to avoid handling sensitive data. Sensitive data should be retained or handled only when required.

Encryption can be an effective information protection control when it is necessary to possess confidential data.

Encryption is the process of concealing data by using a code. After encryption, in order to read or use the concealed data, the code used during encryption must be known. This process is called decryption. Encryption and decryption are used to allow access to data only to those who have the code. To those who do not have the code, the data is unusable.

In computing, encryption is primarily used to protect data in one of two instances. The first is to protect data at rest. An example of data at rest is a spreadsheet with data located on the hard drive of a desktop or laptop computer. The second is to protect data in motion. An example of data in motion is using a web browser to get data from a remote server.

Methods for encrypting data at rest

Whole Disk Encryption

Encryption of data stored on portable computing devices (e.g., PDAs, tablet PCs, laptops, and smart phones), as well as storage media, (e.g., CDs, DVDs, and USB drives) should be provided through the use of a whole disk encryption tool or one that can at least be configured to encrypt all Confidential data.

File Encryption – File by File

Encryption of Confidential data should be provided to facilitate the secure transport of individual files over a network without transmission encryption or to off-line storage devices (e.g., CDs, DVDs, or USB drives.)

Database Storage

Encryption of Confidential data contained in a database server should be provided through the use of whole disk encryption or through features native to the database server software. Encryption capabilities native to database server software may allow for encryption of specific tables or columns of a database and may also be required to segregate access rights among multiple applications that utilize a single database server.

Methods for encrypting data in motion

File Transfers

Encryption of Confidential file transfers can be achieved via the use of an encrypted transmission protocol or network service (e.g., scp, sftp, etc) or by transferring a confidential file that has been encrypted prior to the transmission.

E-mail

Confidential content transmitted in e-mail messages should be encrypted prior to the transmission, presented via a secure web application, or encrypted in a secure message format, given e-mail is exposed to the possibility of unauthorized access at a number of points throughout the delivery process.

Interactive Sessions

Encryption of Confidential data, including login passwords, transmitted during remote login sessions (e.g., Telnet, TN3270, and remote control software for PCs) should be provided through the use of secure applications or protocols such as SSH.

Web-Based Applications

Encryption of Confidential data communicated between a user’s browser and a web-based application should be provided through the use of secure protocols (e.g., HTTPS, TLS/SSL, etc.) The display of confidential data should be limited to only what is required by the user’s authorized use of the application.

Remote File Services

Encryption of Confidential data transmitted by remote files services should be provided through the use of encrypted transmission protocols (e.g., IPSec, ISAKMP/IKE, SSL/TLS) to prevent unauthorized interception.

Database Access

Encryption of Confidential data transmitted between an application server and a database should be implemented to prevent unauthorized interception. Such encryption capabilities are generally provided as part of, or an option to, the database server software.

Application-to-Application Communications

Encryption of Confidential data transmitted between cooperating applications should be provided through the use of commonly available encrypted protocols (e.g., SOAP with HTTPS) to prevent unauthorized interception.

Virtual Private Network (VPN)

A VPN connection offers an additional option to protecting confidential data transmitted via the network when other alternatives are not feasible. The use of VPNs should be carefully considered so that all security and networking issues are understood. OIT Security should be consulted prior to any VPN implementations.

Encryption Use-Cases and suggested tools for securing data

How do I protect my data stored on my laptop against possible theft?

Whole Disk Encryption / Full Disk Encryption (FDE) – should be used to protect against theft. If your desktop or laptop should be stolen or misplaced, the computers data will not be accessible. This protects the individuals who may have their sensitive information stored on your computer system, and protects the University by ensuring sensitive and confidential data are not released to unauthorized personnel.

Examples of tools that can be used for FDE

    • Mac OS X via FileVault 2
    • Microsoft Windows – Bitlocker
    • VeraCrypt

How do I encrypt my data for compliance?

Although there are many distinct types of data of importance to regulators, most of them fall into several broad categories and each may have specific compliance requirements:

Financial data: The types of financial data are numerous, but commonly include credit card account numbers and tracking data, bank account numbers and associated financial information, and a variety of credit-related data on individuals and businesses. Several regulatory standards, particularly Sarbanes-Oxley in the Unites States, are concerned with reporting financial data for public companies.

Personal health data: Sensitive patient health data can include insurance-related data, actual medical information, and personal data about patients, such as social security numbers, addresses, and other sensitive information, which should not be publicly available.

Private individual data: Such data includes social security numbers, addresses and phone numbers, and other personally-identifiable data that could potentially be used for identity theft and other illicit activity.

Military and government data: Data specific to government programs, particularly those related to military departments and operations is carefully regulated.

Confidential/sensitive business data: Data that has to be kept secret including trade secrets, research and business intelligence data, management reports, customer information, sales data, etc. falls into this category.

FIPS Compliant software for Whole Disk Encryption / Full Disk Encryption (FDE)

    • Windows Bitlocker FIPS Mode

How do I protect the data on my USB thumb drive?

In order to encrypt the USB or container we need to start off with a blank USB drive to ensure that ALL files going forward are encrypted. After we encrypt the drive you can then move the unprotected data to the newly encrypted USB drive to protect the files going forward.

    • Mac Users: Finder Can Encrypt it For You
      • Open the Disk Utility app, select your USB drive, and pick Erase. Choose the MacOS Extended (Journaled) format and erase the drive, formatting it with the proper filesystem.
    • Windows Users: Try BitLocker or Veracrypt
      • Windows features its own built-in file encryption software, dubbed BitLocker and Bitlocker-to-Go it’s found in Pro, Ultimate, or Enterprise versions of Windows 8 and onward.

I create or work with confidential files and save these files on my department shared drive or server repository. How do I encrypt the files stored on these department shared network drives?

Secure File/Folder share encryption (SFS) – should be used to protect against unauthorized read access to a file stored on a department network share drive. The Folder encryption allows users to move or save files in specific folders where they are automatically encrypted

  • Check with your Server Administrator as there are multiple ways and requirements in order to secure that data. Securing data either by the entire volume or individually are two methods of protecting the data but have different requirements and fulfill different protection gaps.
  • Folder/file encryption requires an additional mechanism in order to support provisioning of the encryption keys to “unlock” the file and be able to read these files.
Protect Data with Encryption | UCI Information Security (2024)

FAQs

How can we protect data through encryption? ›

How encryption works. Encryption works by encoding “plaintext” into “ciphertext,” typically through the use of cryptographic mathematical models known as algorithms. To decode the data back to plaintext requires the use of a decryption key, a string of numbers or a password also created by an algorithm.

Does NIST 800 171 require encryption at rest? ›

Does NIST 800-171 require encryption at rest? Yes. SP 800-171 requires organizations to encrypt CUI at rest.

Is encryption still an effective method of protecting data? ›

Data encryption protects your sensitive data by rendering it inaccessible, even if stolen. Decrypting well-encrypted data without the key is theoretically possible, but it would require all of the world's computing power and many years to succeed. Data that has been encrypted can be stolen, but only in encrypted form.

Why is encryption important in data protection? ›

It helps protect private information, sensitive data, and can enhance the security of communication between client apps and servers. In essence, when your data is encrypted, even if an unauthorized person or entity gains access to it, they will not be able to read it.

How do I encrypt secure data? ›

Data encryption is a security method that translates data into a code, or ciphertext, that can only be read by people with access to a secret key or password. The unencrypted data is called plaintext. The science of encrypting and decrypting information is known as cryptography.

What are the NIST standards for data encryption? ›

Data Encryption Standard (DES)

With a 56-bit secret key, the block cipher technique DES encrypts data in 64-bit blocks. The algorithm operates in multiple rounds, each using a different subkey generated from the original secret key. DES encrypts and decrypts data using a symmetric-key technique.

What is the DOD standard for encryption? ›

Military grade encryption often refers to a specific encryption type, AES-256 (Advanced Encryption Standard). Currently, the U.S. government has named this algorithm the standard for encryption and most cybersecurity organizations today use this form of military grade encryption.

What is the strongest encryption method? ›

AES 256-bit encryption is the strongest and most robust encryption standard that is commercially available today.

What is more secure than encryption? ›

Since encryption is two-way, the data can be decrypted so it is readable again. Hashing, on the other hand, is one-way, meaning the plaintext is scrambled into a unique digest, through the use of a salt, that cannot be decrypted.

What can break encryption? ›

Quantum computers are known to be a potential threat to current encryption systems, but the technology is still in its infancy.

How to use encryption to protect data? ›

In simple words, encryption protects sensitive data from prying eyes by scrambling ordinary text (plaintext) into a form (ciphertext) that is impossible to read without the proper decryption key. An example of basic encryption is swapping each letter with the one that holds its opposite position in the alphabet.

Who can see encrypted data? ›

With encryption, Internet browsing information is only shared between those who have the encryption key. The only two parties who should have access to the key are the user (or actually the user's device) and the website they are visiting.

How does encryption protect files? ›

File encryption is a security method that converts your files into ciphertext or unreadable data. By using this method, you may be sure that even if unauthorized people access your files, they won't be able to understand the contents without the decryption key.

What methods are used to encrypt data? ›

There are two types of encryption in widespread use today: symmetric and asymmetric encryption.

Top Articles
Elevate Your Finances With This Banking Method
International Currency Conversion | Cornell University Division of Financial Services
Bank Of America Financial Center Irvington Photos
Craigslist Houses For Rent In Denver Colorado
Cooking Chutney | Ask Nigella.com
Robot or human?
50 Meowbahh Fun Facts: Net Worth, Age, Birthday, Face Reveal, YouTube Earnings, Girlfriend, Doxxed, Discord, Fanart, TikTok, Instagram, Etc
Caroline Cps.powerschool.com
Victoria Secret Comenity Easy Pay
10000 Divided By 5
Jesus Revolution Showtimes Near Chisholm Trail 8
Stream UFC Videos on Watch ESPN - ESPN
Housing Intranet Unt
Craigslist Labor Gigs Albuquerque
World Cup Soccer Wiki
Oriellys St James Mn
Pittsburgh Ultra Advanced Stain And Sealant Color Chart
Walmart Windshield Wiper Blades
Price Of Gas At Sam's
Niche Crime Rate
Candy Land Santa Ana
Concordia Apartment 34 Tarkov
Project, Time & Expense Tracking Software for Business
Contracts for May 28, 2020
Thick Ebony Trans
Essence Healthcare Otc 2023 Catalog
Rek Funerals
Gen 50 Kjv
Sensual Massage Grand Rapids
Greater Orangeburg
Dentist That Accept Horizon Nj Health
Greencastle Railcam
Diana Lolalytics
Navigating change - the workplace of tomorrow - key takeaways
Sinfuldeeds Vietnamese Rmt
Despacito Justin Bieber Lyrics
Best Weapons For Psyker Darktide
Wildfangs Springfield
Scanning the Airwaves
Dmitri Wartranslated
Hellgirl000
One Main Branch Locator
Noaa Duluth Mn
RECAP: Resilient Football rallies to claim rollercoaster 24-21 victory over Clarion - Shippensburg University Athletics
All Characters in Omega Strikers
Craigslist Farm And Garden Reading Pa
Grizzly Expiration Date Chart 2023
Gon Deer Forum
Contico Tuff Box Replacement Locks
Campaign Blacksmith Bench
Zom 100 Mbti
Primary Care in Nashville & Southern KY | Tristar Medical Group
Latest Posts
Article information

Author: Lilliana Bartoletti

Last Updated:

Views: 5850

Rating: 4.2 / 5 (73 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Lilliana Bartoletti

Birthday: 1999-11-18

Address: 58866 Tricia Spurs, North Melvinberg, HI 91346-3774

Phone: +50616620367928

Job: Real-Estate Liaison

Hobby: Graffiti, Astronomy, Handball, Magic, Origami, Fashion, Foreign language learning

Introduction: My name is Lilliana Bartoletti, I am a adventurous, pleasant, shiny, beautiful, handsome, zealous, tasty person who loves writing and wants to share my knowledge and understanding with you.