- » Account Request
- » Alumni Account Request
- » Calendar Request
- » Access Request
- » Disk Quota Increase
- » Exiting Employee
- » Request Forms and Processes
(ITS Staff only)
Fedora 11 uses dm-crypt/LUKS to perform Block Level encryption of a file system. LUKS (Linux Unified Key Setup) is a specification for block device encryption. It establishes an on-disk format for the data, as well as a passphrase/key management policy.
LUKS uses the kernel device mapper subsystem via the dm-crypt module. This arrangement provides a low-level mapping that handles encryption and decryption of the device's data. User-level operations such as creating and accessing encrypted devices are accomplished through the use of the cryptsetup utility.
Before proceeding, seek the support of your ITC.
Do not encrypt the only copy of protected data. Mobile devices have a greater exposure to damaging environments, and data on these devices, encrypted or not, can suddenly become unrecoverable.
You can turn on FileVault to encrypt the information in your home folder. Encryption scrambles the data in your home folder so that unauthorized users, applications, or utilities can’t access your data.
BitLocker is included with Windows 7/Windows 8/Windows Server 2012 and provides Full Volume Encryption. By encrypting the entire hard drive, the operating system can provide a much higher level of security against offline attacks. BitLocker uses HSU's Active Directory to store keys and help manage data protection.
Encryption is the transformation of data into a form unreadable by anyone without a secret decryption key. Its purpose is to ensure confidentiality and privacy by keeping the information hidden from anyone for whom it is not intended. For example, one may wish to encrypt files on a hard drive to prevent an intruder from reading them. When an entire hard drive is encrypted, all the data on the drive is protected from unauthorized access if the computer is lost or stolen.
The HSU Executive Memorandum on Protected Information requires that Level 1 and Level 2 data not be stored on electronic systems or devices unless absolutely necessary and should be removed when the business reason for storage is no longer required.
The Protected Information Scan is used to determine the likely locations of protected data for your further action. It does not determine whether you are authorized to store protected data on your campus computer.
"Protected information", sometimes called Personally-Identifiable Information, or PII, is an umbrella term for information that is linked to an individual person's identity, such as Social Security Numbers, drivers' license data, and credit card or bank account information and which can be used to facilitate identity theft. Universities in particular have become attractive targets for hackers because of the freedom with which information is exchanged in an academic environment.
What is Protected Information?
Computer viruses used to be very obvious - you'd know that your computer was infected because threatening messages would appear on your screen, or applications stopped working. Today's malware instead tries to be as secretive as possible - the goal is to get onto your machine and start stealing valuable information, not to show off programming tricks. Many of today's attacks come wrapped in a cloak of pseudo-legitimacy, appearing as a message or request for information from an official source, such as your bank, eBay, even the Humboldt State University Technology Help Desk.