SlideShare uma empresa Scribd logo
1 de 20
Using Digital Certificates to Secure Sensitive
      Communications at UW-Madison
                  WHOOHA
           Nicholas Davis – DoIT Middleware
Overview
• Old business processes vs. new
  business processes
• Protecting your electronic identity
• Email security
• Digital certificates defined
• What digital certificates can do for
  your department
• How digital certificates can help
  your increase security
• Questions
• Next Steps
Old vs. New Business Processes
• UW-Madison has
  historically relied upon
  manual business
  processes
• Transcripts, HR Data,
  Contracts, Research Data,
  Health Information,
  Financial and Accounting
  Information—all kept on
  paper
• Physically secure
• Difficult to access,
  replicate and distribute
Old vs. New Business Processes
• As the amount of information we
  manage has increased, we have
  turned to electronic information
  systems to help us organize and
  disseminate information in a more
  efficient manner
Old vs. New Business Processes
• Today, we send official
  documents as email
  attachments
• We send email and documents
  to group mail lists
• Access to information is much
  greater than it was in the days
  of manual processes
• With new technologies there
  are new threats
Protecting Your Personal
             Identity
• When you send a document, how
  does the receiver know it came
  from you?
• When you send an electronic
  document, wouldn’t you want the
  same assurance?
Email Security
• How secure is the email you
  sent this morning?
• What happens to an email
  once you click the “send”
  button?
• Network, Intermediary
  Servers, Receiving Email
  Server, End User’s
  Workstation
• Laptops!
Digital Certificates Defined
• A digital certificate is NOT a
  software application
• A digital certificate is an
  “electronic passport”, with special
  added features
• Proves your identity
• Allows you to protect your
  information with encryption
• Functionality already built into
  existing applications on your
  compter
What Digital Certificates Can Do
     For Your Department
• Provide electronic equivalent
  of pen and paper signature
• Proves that the document
  (Word, Excel, PDF,
  Powerpoint) came from you
• Proves that the document has
  not been altered from origianl
  form
Example
Example
Encryption
• Protects your email from being
  read and/or altered from the
  moment it leaves your computer
• Simple as “click and send”
• In order to receive encrypted
  email, you must have a digital
  certificate
• In order to encryption to work bi-
  directionally, both users must have
  digital certificates
Example
If The Encrypted Email Is
       Intercepted
Uses

• Signing official documents
  (and email) to prove
  authorship
• Encrypting sensitive emails
  and attachments
Think About This
Could cause harm in
   a critical situation
Case Scenario
   Multiple hoax
   emails sent with
   Chancellor’s name
   and email.
   When real crisis
   arrives, people
   might not believe
   the warning.
It is all about trust!
Case Scenarios To Be Avoided

• HR related email concerning
  Nicholas Davis is intercepted
  by someone on the campus
  network and sent to
  newspaper
• Laptop containing spreadsheet
  with SSN’s of all UW faculty is
  stolen at Moscow airport.
The Technology Is Trustworthy


• X.509 is the industry
  standard
• Used by National
  Security Agency
• Used in all Western
  European passports
• Used by GE,
  Raytheon, J&J, P&G
The Technology Is Managed
• DoIT generates,
  distributes,
  supports and
  manages the digital
  certificate program
• Our certificates are
  provided by
  Verisign, the most
  widely trusted
  issuer of digital
  certificates
• We keep copies—
  just in case
Questions, Comments
• Nicholas Davis
• ndavis1@wisc.edu (info)

Mais conteúdo relacionado

Mais procurados

(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1
maranan_alexa
 
Donna Schmidt Resume
Donna Schmidt ResumeDonna Schmidt Resume
Donna Schmidt Resume
Donna Robeck
 
12 ipt 0305 Communication Issues
12 ipt 0305   Communication Issues12 ipt 0305   Communication Issues
12 ipt 0305 Communication Issues
ctedds
 
Enterprise social networking v1.2
Enterprise social networking v1.2Enterprise social networking v1.2
Enterprise social networking v1.2
James Sutter
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
CRM
 

Mais procurados (18)

The Basics: Reviewing & Producing ESI Evidence
The Basics: Reviewing & Producing ESI EvidenceThe Basics: Reviewing & Producing ESI Evidence
The Basics: Reviewing & Producing ESI Evidence
 
(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1(Alexa 09) chap.2 lab 1
(Alexa 09) chap.2 lab 1
 
Studying is life, but et is lifer
Studying is life, but et is liferStudying is life, but et is lifer
Studying is life, but et is lifer
 
Mobile Convention Brussels 2014 - Paul Skeldon
Mobile Convention Brussels 2014 - Paul SkeldonMobile Convention Brussels 2014 - Paul Skeldon
Mobile Convention Brussels 2014 - Paul Skeldon
 
Isc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagyeIsc(2) eastbay-lenin aboagye
Isc(2) eastbay-lenin aboagye
 
Recent developments in data analytics and big data
Recent developments in data analytics and big dataRecent developments in data analytics and big data
Recent developments in data analytics and big data
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
New to CWRU Staff 2015
New to CWRU Staff 2015New to CWRU Staff 2015
New to CWRU Staff 2015
 
InsurTech - How DataScience is transforming FinTech & InsurTech by Nele Coghe...
InsurTech - How DataScience is transforming FinTech & InsurTech by Nele Coghe...InsurTech - How DataScience is transforming FinTech & InsurTech by Nele Coghe...
InsurTech - How DataScience is transforming FinTech & InsurTech by Nele Coghe...
 
Smith jared v2-2
Smith jared v2-2Smith jared v2-2
Smith jared v2-2
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
Donna Schmidt Resume
Donna Schmidt ResumeDonna Schmidt Resume
Donna Schmidt Resume
 
Lab 1
Lab 1Lab 1
Lab 1
 
12 ipt 0305 Communication Issues
12 ipt 0305   Communication Issues12 ipt 0305   Communication Issues
12 ipt 0305 Communication Issues
 
Internet
InternetInternet
Internet
 
Enterprise social networking v1.2
Enterprise social networking v1.2Enterprise social networking v1.2
Enterprise social networking v1.2
 
Chap2 lab1
Chap2 lab1Chap2 lab1
Chap2 lab1
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
 

Destaque

Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...
Nicholas Davis
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
Simmi Kamra
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
Sheetal Verma
 

Destaque (8)

Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...Pki & personal digital certificates, the key to securing sensitive electronic...
Pki & personal digital certificates, the key to securing sensitive electronic...
 
Understanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets LayerUnderstanding Digital Certificates & Secure Sockets Layer
Understanding Digital Certificates & Secure Sockets Layer
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
 
The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...
 
Digital certificates
Digital certificatesDigital certificates
Digital certificates
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information security
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 
Digital certificates
Digital certificates Digital certificates
Digital certificates
 

Semelhante a Using digital certificates to secure sensitive communications at uw madison

Healthcare information security secure sensitive communications within the ...
Healthcare information security   secure sensitive communications within the ...Healthcare information security   secure sensitive communications within the ...
Healthcare information security secure sensitive communications within the ...
Nicholas Davis
 
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Nicholas Davis
 
Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...
Nicholas Davis
 
Securing email and electronic documents with digital certificates, by nichola...
Securing email and electronic documents with digital certificates, by nichola...Securing email and electronic documents with digital certificates, by nichola...
Securing email and electronic documents with digital certificates, by nichola...
Nicholas Davis
 
Securing Email And Electronic Documents With Digital Certificates, By Nichola...
Securing Email And Electronic Documents With Digital Certificates, By Nichola...Securing Email And Electronic Documents With Digital Certificates, By Nichola...
Securing Email And Electronic Documents With Digital Certificates, By Nichola...
Nicholas Davis
 
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Nicholas Davis
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman
 

Semelhante a Using digital certificates to secure sensitive communications at uw madison (20)

Healthcare information security secure sensitive communications within the ...
Healthcare information security   secure sensitive communications within the ...Healthcare information security   secure sensitive communications within the ...
Healthcare information security secure sensitive communications within the ...
 
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
 
Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...
 
Securing email and electronic documents with digital certificates, by nichola...
Securing email and electronic documents with digital certificates, by nichola...Securing email and electronic documents with digital certificates, by nichola...
Securing email and electronic documents with digital certificates, by nichola...
 
Securing Email And Electronic Documents With Digital Certificates, By Nichola...
Securing Email And Electronic Documents With Digital Certificates, By Nichola...Securing Email And Electronic Documents With Digital Certificates, By Nichola...
Securing Email And Electronic Documents With Digital Certificates, By Nichola...
 
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
Pki & Personal Digital Certificates, The Key To Securing Sensitive Electr...
 
Pki the key to securing sensitive communications
Pki the key to securing sensitive communicationsPki the key to securing sensitive communications
Pki the key to securing sensitive communications
 
E-commerce.pptx
E-commerce.pptxE-commerce.pptx
E-commerce.pptx
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
Making Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesMaking Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar Slides
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Cyber Security.pdf
Cyber Security.pdfCyber Security.pdf
Cyber Security.pdf
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
6 security
6 security6 security
6 security
 
This is Strikersoft
This is StrikersoftThis is Strikersoft
This is Strikersoft
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 

Mais de Nicholas Davis

Mais de Nicholas Davis (20)

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An Overview
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
 
Demystifying Professional Certifications
Demystifying Professional CertificationsDemystifying Professional Certifications
Demystifying Professional Certifications
 
Cloud Security and Bring Your Own Device (BYOD) Security
Cloud Security and Bring Your Own Device (BYOD) SecurityCloud Security and Bring Your Own Device (BYOD) Security
Cloud Security and Bring Your Own Device (BYOD) Security
 

Último

Último (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Using digital certificates to secure sensitive communications at uw madison

  • 1. Using Digital Certificates to Secure Sensitive Communications at UW-Madison WHOOHA Nicholas Davis – DoIT Middleware
  • 2. Overview • Old business processes vs. new business processes • Protecting your electronic identity • Email security • Digital certificates defined • What digital certificates can do for your department • How digital certificates can help your increase security • Questions • Next Steps
  • 3. Old vs. New Business Processes • UW-Madison has historically relied upon manual business processes • Transcripts, HR Data, Contracts, Research Data, Health Information, Financial and Accounting Information—all kept on paper • Physically secure • Difficult to access, replicate and distribute
  • 4. Old vs. New Business Processes • As the amount of information we manage has increased, we have turned to electronic information systems to help us organize and disseminate information in a more efficient manner
  • 5. Old vs. New Business Processes • Today, we send official documents as email attachments • We send email and documents to group mail lists • Access to information is much greater than it was in the days of manual processes • With new technologies there are new threats
  • 6. Protecting Your Personal Identity • When you send a document, how does the receiver know it came from you? • When you send an electronic document, wouldn’t you want the same assurance?
  • 7. Email Security • How secure is the email you sent this morning? • What happens to an email once you click the “send” button? • Network, Intermediary Servers, Receiving Email Server, End User’s Workstation • Laptops!
  • 8. Digital Certificates Defined • A digital certificate is NOT a software application • A digital certificate is an “electronic passport”, with special added features • Proves your identity • Allows you to protect your information with encryption • Functionality already built into existing applications on your compter
  • 9. What Digital Certificates Can Do For Your Department • Provide electronic equivalent of pen and paper signature • Proves that the document (Word, Excel, PDF, Powerpoint) came from you • Proves that the document has not been altered from origianl form
  • 12. Encryption • Protects your email from being read and/or altered from the moment it leaves your computer • Simple as “click and send” • In order to receive encrypted email, you must have a digital certificate • In order to encryption to work bi- directionally, both users must have digital certificates
  • 14. If The Encrypted Email Is Intercepted
  • 15. Uses • Signing official documents (and email) to prove authorship • Encrypting sensitive emails and attachments
  • 16. Think About This Could cause harm in a critical situation Case Scenario Multiple hoax emails sent with Chancellor’s name and email. When real crisis arrives, people might not believe the warning. It is all about trust!
  • 17. Case Scenarios To Be Avoided • HR related email concerning Nicholas Davis is intercepted by someone on the campus network and sent to newspaper • Laptop containing spreadsheet with SSN’s of all UW faculty is stolen at Moscow airport.
  • 18. The Technology Is Trustworthy • X.509 is the industry standard • Used by National Security Agency • Used in all Western European passports • Used by GE, Raytheon, J&J, P&G
  • 19. The Technology Is Managed • DoIT generates, distributes, supports and manages the digital certificate program • Our certificates are provided by Verisign, the most widely trusted issuer of digital certificates • We keep copies— just in case
  • 20. Questions, Comments • Nicholas Davis • ndavis1@wisc.edu (info)