Get Help

Online: Request Help
Phone: (707) 826-HELP (4357)
Email: help@humboldt [dot] edu
In Person: Library 120 • Hours
Reset HSU Password
System Status

Services For

Security

Security :: 7-Zip Windows Encryption

7-Zip is an open source file archiver designed for Microsoft Windows. 7-Zip uses the 7z archive format, and can read and write to other popular archive formats. The program can be used from a command line interface, graphical user interface, or Windows shell integration. 

7-Zip may be used to create encrypted files or folder copies for moving information to a different device - for example copying and moving to an external flash drive, hard drive, or phone. It does not, however, replace the use of BitLocker for storing data on a fixed drive.

Security :: dm-crypt Encryption for Linux Ubuntu

Do not encrypt the only copy of protected data. Mobile devices have a greater exposure to damaging environments, and data on these devices, encrypted or not, can suddenly become unrecoverable. Please work closely with ITS to ensure that you create data security, not a data disaster.

Linux Ubuntu disk encryption capability is provided through DeviceMapper, a generic framework used to map one blockdevice into another. More information about DeviceMapper can be found on the Ubuntu documentation site.

Security :: Linux Fedora Disk Encryption

Fedora 11 uses dm-crypt/LUKS to perform Block Level encryption of a file system. LUKS (Linux Unified Key Setup) is a specification for block device encryption. It establishes an on-disk format for the data, as well as a passphrase/key management policy.

LUKS uses the kernel device mapper subsystem via the dm-crypt module. This arrangement provides a low-level mapping that handles encryption and decryption of the device's data. User-level operations such as creating and accessing encrypted devices are accomplished through the use of the cryptsetup utility.

Security :: Macintosh OS X Encryption

Before proceeding, seek the support of your ITC.

Do not encrypt the only copy of protected data. Mobile devices have a greater exposure to damaging environments, and data on these devices, encrypted or not, can suddenly become unrecoverable.

Encrypting your home folder with FileVault

You can turn on FileVault to encrypt the information in your home folder. Encryption scrambles the data in your home folder so that unauthorized users, applications, or utilities can’t access your data.

Security :: Encryption BitLocker :: Windows Vista

Before proceeding, seek the support of your ITC.

Do not encrypt the only copy of protected data. Mobile devices have a greater exposure to damaging environments, and data on these devices, encrypted or not, can suddenly become unrecoverable.

Requirements

A computer must meet the following requirements to support BitLocker

Security :: BitLocker Encryption for Windows 7/Windows 8/Windows Server 2012

BitLocker is included with Windows 7/Windows 8/Windows Server 2012 and provides Full Volume Encryption. By encrypting the entire hard drive, the operating system can provide a much higher level of security against offline attacks. BitLocker uses HSU's Active Directory to store keys and help manage data protection.

Security :: Protected Information Scan

The HSU Executive Memorandum on Protected Information requires that Level 1 and Level 2 data not be stored on electronic systems or devices unless absolutely necessary and should be removed when the business reason for storage is no longer required.

The Protected Information Scan is used to determine the likely locations of protected data for your further action. It does not determine whether you are authorized to store protected data on your campus computer.

Security :: Protected Information Discovery Tools

"Protected information", sometimes called Personally-Identifiable Information, or PII, is an umbrella term for information that is linked to an individual person's identity, such as Social Security Numbers, drivers' license data, and credit card or bank account information and which can be used to facilitate identity theft. Universities in particular have become attractive targets for hackers because of the freedom with which information is exchanged in an academic environment.

Security :: Data Classification Standards

 

Classification Description Examples

Level 1:
Need-to-know

 

 

Security :: Virtual Private Network

As part of the closed border firewall project, Humboldt State University deployed a Virtual Private Network (VPN) server. This ensures secure communications through a simple web interface for those staff and faculty members who use Remote Desktop or Virtual Network Computing (VNC) to connect to their office computers from off campus.