FRCC Secure Transfer & Storage Infrastructure. Training for new data transfer process
|
|
- Cora Terry
- 6 years ago
- Views:
Transcription
1 FRCC Secure Transfer & Storage Infrastructure Training for new data transfer process
2 Training Objects Understand the changes in regards to the data transfer process using PKI Installation Key management Preparation of Evidence Creating the encrypted file Transfer of file(s) to FRCC using new website 2
3 Installation Software Installation: Installing GNU Privacy Guard for Windows Gpg4Win 3
4 The program needs to be downloaded from Gpg4Win Web site Download the Current Release (top of the listing) 4
5 Double Click the downloaded file. Click OK, Click Next, 5
6 Click next on the license agreement page 6
7 Change the default selection to the following (Next Slide). 7
8 The only ones checked are Kleopatra, GpgEX, Gpg4Win Compendium. Click Next, More information on these option later in the presentation. 8
9 Click Next, 9
10 Select the options you would like, click next 10
11 Click Install 11
12 Completed, Click Next 12
13 Your choice, click finish 13
14 Key Ring/Manager Once the Gpg4Win has completed the installation process, you will find the following icons on your desktop, if you selected this option during installation. If not just use the windows menu. 14
15 Gpg4win is an installer for Windows and contains several Free Software components: GnuPG The core; this is the actual encryption tool. Kleopatra A certificate manager for OpenPGP and X.509 (S/MIME) and common crypto dialogs. This is your Key Ring/Manager GPA An alternative certificate manager for OpenPGP and X.509 (S/MIME). GpgOL A plugin for Microsoft Outlook 2003/2007/2010 ( encryption). * Rudimentary support Outlook 2010/2013 GpgEX A plugin for Microsoft Explorer (file encryption). Claws Mail A complete application with crypto support. Gpg4win Compendium The documentation (for beginner and advanced users), available in English and German. 15
16 16 Questions?
17 Key management Creation of your Public/Private key pair Accessing the FRCC Key Repository Public Key Storage Import FRCC Public Key Owner Trust & Certify Certificate on import 17
18 Key Management Creation of your key pair Kleopatra Select File then New Certificate 18
19 Key Management Select Create a personal OpenPGP key pair 19
20 Key Management Enter in all required information, click next when ready 20
21 Key Management Review information, if correct click create key 21
22 Key Management Having clicked the Create Key you will need to enter in a password/passphrase Needs to be as strong as possible Needs to be safe guarded 22
23 Key Management Key pair has been created Highly suggested to backup you public/private keys 23
24 Key Management Next step is to import FRCC public key, you can access our public key from here ompliance/frcc Public Key Storage 24
25 Key Management Must be signed in to access the files and/or folders Access the folder, download the key to your system for the import process, site will active in June
26 Key Management Import a public key 26
27 Key Management Find and import public key 27
28 Key Management Once import has completed, you will see confirmation that 1 key has been imported 28
29 Key Management Once a public key has been imported into your key manager, you must validate trust and certify the key. 29
30 Key Management Return to your key management program - Kleopatra, right click the key that has been imported. The menu will provided 2 selections (both are required) Change Owner Trust Certify Certificate 30
31 Key Management Menu selections Step #1 Step #2 31
32 Key Management Change Owner Trust 32
33 Key Management Certify Certificate Select the highlighted items to certify the certificate (key), click next when ready 33
34 Key Management Defaults are fine, click certify 34
35 Key Management You will be prompted for your password / passphrase, enter it and continue 35
36 Key Management Suggestions Backup your key pair to a very secure location Limit access to the private part of the key pair password/passphrase (this can be changed as needed by you) 36
37 37 Questions?
38 Preparation of Evidence Some key points: Understanding and the importance of sensitivity levels of data being sent New file naming convention of encrypted file Always include FRCC public key in all encrypted files sent 38
39 Preparation of Evidence Packaging Identify the sensitivity level of the data being transferred to FRCC Most Sensitive Sensitive General Transfer - includes uploading and downloading 39
40 Secure Transfer Most Sensitive evidence/information such as Firewall Rules (redacted) Network topologies including IP s or other documentation with extensive network address information Cyber vulnerability assessment results or reports containing specific vulnerabilities Physical Security Perimeter drawings Read only access, data will not be removed from the vault 40
41 Secure Transfer Sensitive evidence/information such as All other sensitive/confidential evidence/information submitted by registered entity Includes both O&P and CIP information Can be transferred and used on encrypted laptops etc. Will be removed/deleted from laptops etc. after use 41
42 Preparation of Evidence Packaging Use proper naming conventions of encrypted file prior to transfer XXXXX.ONP.YYYY-MM-DD.001.gpg File extension is added during creation Package number of file (001 to 999) Evidence, Audit, or Request Date Evidence Type (CIP, ENF, ONP, TFE, RAM, DTR) The first 5 characters of the file name are for the Entity Acronym, also known as short name. Proper naming allows for automation of FRCC data/evidence handling 42
43 Examples for file names With 3 character short name DEF.ONP gpg With a 4 character short name FMPA.ENF gpg With a 5 character short name COVPA.RAM gpg 43
44 Secure Evidence Packaging Step #1 Identify the evidence data to be sent, Create folder(s) based on sensitivity, place requested data in each folder as needed. ** Please note the individual file name(s) cannot exceed 99 characters in total, this includes dots, spaces, dashes, etc. The compression process used Gpg4Win will omit the file and the program doesn t provide any warning when doing this. 44
45 Secure Evidence Packaging Example: 45
46 Secure Evidence Packaging Step #2 - Check Sum/ Hash File Create a hash/check sum of your evidence and perform a virus check on all files Select evidence files and perform a virus check using your local anti-virus scan software. Include a copy of the anti-virus scan report in a TEXT file antivirus-check.txt as part of the evidence package Create a hash listing of all your evidence using SHA1 hashing. With the installation of Gpg4Win a set of tools are installed along with the software. One of the features is the ability is to produce a check sum file or hash of all files within a folder 46
47 Secure Evidence Packaging Step #3 Using the Gpg4Win checksum tool Select or highlight the evidence folder that contains all files to be encrypted, right click to access windows content menu. Select the menu option More GpgEX options, then select Create checksums. 47
48 Secure Evidence Packaging Once completed it will display where the check sum file has been placed. Step #3 Cont. 48
49 Secure Evidence Packaging Another tool that can produce the check sum/hash file is a utility called Multi-hasher which can be used to perform the hashing function. Execute Multihasher and select SHA-1 as the hashing algorithm and select folder or files of your target files. A copy of MultiHasher software can be downloaded from website: Step #3 Cont. 49
50 Secure Evidence Packaging Select the hash listing of the files and copy/paste it in a text file titled hash.txt. Include the text file with the evidence information you are packaging. Step #3 Cont. 50
51 Secure Evidence Packaging Step #4 Encryption The next steps will guide in the use of Gpg4Win to encrypt all the files into one encrypted file for sending to the FRCC 51
52 Secure Evidence Packaging Right click the evidence folder containing the files for encryption From the content menu select the Sign & encrypt Step #4 Cont. 52
53 Secure Evidence Packaging Default dialog menu, see next step for changes needed Click on button next to the Archive name (OpenPGP): To enter correct file name Step #4 Cont. 53
54 Secure Evidence Packaging Follow steps outlined below in the image, once ready click save Step #4 Cont. 54
55 Secure Evidence Packaging Using the image as a guide, check the settings on this menu, Then click next Step #4 Cont. 55
56 Secure Evidence Packaging Select the required certificates to use Step #4 Cont. 56
57 Secure Evidence Packaging Step #4 Cont. 57
58 Secure Evidence Packaging Signing Step #4 Cont. 58
59 Secure Evidence Packaging Once encryption completes you will see this dialog on the screen. The process has completed successfully Step #4 Cont. 59
60 Secure Evidence Packaging Checking our save folder we ll find the newly created file (note file extension has been added) Step #4 Cont. 60
61 61 Questions?
62 Secure Transfer Access to the new transfer site Signing in and Access Selecting the correct folder New Entity Secure File Transfer 62
63 Secure Transfer To access the site use the following url The direct link from the FRCC.COM compliance sidebar/menu OR Sign-in using your FRCC.COM website account name and password. 63
64 Secure Transfer 64
65 Secure Transfer After signing in you ll receive a welcome message 65
66 JAVA Security Warning When you sign in you may be prompted with a security warning from java. Follow your company policy in regards to these type of warnings. Default response is to check the Do not show this again for this app and web site and click the allow button. 66
67 Secure Transfer 67
68 Secure Transfer When accessing FRCC s Transfer site Select correct transfer folder Selection based on data sensitivity m XYZ FileArea XYZ File Area Entity Secure File Transfer Folder Secure Vault Secure Vault For Most Sensitive Data Secure Working Secure Working For Sensitive Data 68
69 Secure Transfer Folder Labeled XYZ File Area NEW Entity Secure File Transfer Folder Primarily used for FRCC to provide info to the registered entity, but could be used to submit general correspondence to the FRCC 69
70 Secure Transfer Folder Labeled Secure Vault Most Sensitive evidence/information such as Firewall Rules (redacted) Network topologies including IP s or other documentation with extensive network address information Cyber vulnerability assessment results or reports containing specific vulnerabilities Physical Security Perimeter drawings Read only access, data will not be removed from the vault 70
71 Secure Transfer Folder Labeled Secure Working Sensitive evidence/information such as All other sensitive/confidential evidence/information submitted by registered entity Includes both O&P and CIP information Can be transferred and used on encrypted laptops etc. Will be removed/deleted from laptops etc. after use 71
72 Secure Transfer Enabling Web Client Pro - Option Its recommend for easier uploading and navigation to switch to the Web Client Pro version of the interface. To enable this feature, access the Tools drop down menu, then click on the Enable Web Client Pro. You can receive additional JAVA Security Warnings when you enable this 72
73 Secure Transfer Additional Message(s) for Web Client Pro 73
74 Secure Transfer Web Pro Enabled 74
75 Secure Transfer Once you have web pro enabled Open (double click the folder for upload) 75
76 Secure Transfer Drag and Drop Files Once file is dropped into window transfer starts 76
77 Secure Transfer Once the transfer has completed successfully, a confirmation is sent FRCC will review received data and it has been correctly received based established policy and procedures using the sensitivity definitions provided, any data received incorrectly, a request will be made to resubmit by the entity 77
78 In Summary We have covered Installation Creation and import Public/Private Keys Packaging of Evidence Transfer of encrypted files to FRCC 78
79 Questions? If you have additional questions please send them to the following address, with subject line of PKI Training 79
FRCC Secure Data Transfer. Users Guide V1.5
FRCC Secure Data Transfer Users Guide V1.5 Table of Contents I. Introduction... 2 II. Part 1 - Software Installation... 3 III. Part 2 - Creating Your PKI Certificate... 7 IV. Part 3 - Importing FRCC Public
More informationSubmitting Evidence to the Vault. FRCC CIP Spring Compliance Workshop May 13-16, 2013
Submitting Evidence to the Vault FRCC CIP Spring Compliance Workshop May 13-16, 2013 Objectives Explain the step-by-step process for submitting evidence to FRCC Vault Share what happens to the evidence
More informationECE 646 Fall Lab 1: Pretty Good Privacy Setup
ECE 646 Fall 2017 Lab 1: Pretty Good Privacy Setup This setup should be completed before the lecture on Tuesday, October 3. Please read the general information about GNU Privacy Guard from Wikipedia available
More informationLAB :: PGP (Pretty Good Privacy)
LAB :: PGP (Pretty Good Privacy) GnuPG : GnuPG forms the heart of Gpg4win the actual encryption software. Kleopatra : The central certificate administration of Gpg4win, which ensures uniform user navigation
More informationECE646 Fall Lab 1: Pretty Good Privacy. Instruction
ECE646 Fall 2012 Lab 1: Pretty Good Privacy Instruction PLEASE READ THE FOLLOWING INSTRUCTIONS CAREFULLY: 1. You are expected to address all questions listed in this document in your final report. 2. All
More informationECE646 Fall Lab 1: Pretty Good Privacy. Instruction
ECE646 Fall 2015 Lab 1: Pretty Good Privacy Instruction PLEASE READ THE FOLLOWING INSTRUCTIONS CAREFULLY: 1. You are expected to address all questions listed in this document in your final report. 2. All
More informationCryptography: Practice JMU Cyber Defense Boot Camp
Cryptography: Practice 2013 JMU Cyber Defense Boot Camp Prerequisites This unit assumes that you have already known Symmetric-key encryption Public-key encryption Digital signature Digital certificates
More informationReadyDoc Client Application Installation Instructions
ReadyDoc Client Application Installation Instructions Redtail Integration The ReadyDoc Cloud application is available at https://users.readydoc.com. ReadyCapture and ReadyDoc Control Center are two desktop-based
More informationFedLine Web Certificate Retrieval Procedures
Version 2.0 Contents Federal Reserve Bank Certificate Retrieval Overview and Preparation Procedures... 2 Certificate Creation Procedures... 3 Installing the Federal Reserve Banks Certificate Authority
More informationCertificate Retrieval Procedures
`` Certificate Retrieval Procedures Version 2.2 2018 Federal Reserve Banks Contents Federal Reserve Bank Certificate Retrieval Overview and Preparation Procedures... 2 Certificate Creation Procedures...
More informationCyberLynk FTP Service Functional Description
CyberLynk FTP Service Functional Description - November 3, 2005 - Version 2.7 Presented by CyberLynk Network 10125 S. 52 nd Street Franklin, WI 53132 P: 414.858.9335 - F: 414.858.9336 www.cyberlynk.net
More informationDue: October 8, 2013: 7.30 PM
Jackson State University Department of Computer Science CSC 437-01/539-01 Computer Security Fall 2013 Instructor: Dr. Natarajan Meghanathan Lab Project # 1: Lab Project on using PGP GNU Privacy Guard (GPG)
More informationHow-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018
How-to Guide: Tenable.io for Microsoft Azure Last Updated: November 16, 2018 Table of Contents How-to Guide: Tenable.io for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment
More informationSECURE DATA EXCHANGE
POLICY-DRIVEN SOLUTIONS FOR SECURE DATA EXCHANGE Sending and receiving data is a fundamental part of daily business for nearly every organization. Companies need to share financial transaction details,
More informationDocument Signing Certificate Getting Started Guide
Certificate Services Document Signing Certificate Getting Started Guide Using the SafeNet Authentication Client: 8.3 Document issue: 1.0 Date of issue: March 2017 For software release 12.1 Document Signing
More informationComodo LoginPro Software Version 1.0
Comodo LoginPro Software Version 1.0 User Guide Guide Version 1.0.102512 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo LoginPro... 3 1.1.System
More informationFile Reputation Filtering and File Analysis
This chapter contains the following sections: Overview of, page 1 Configuring File Reputation and Analysis Features, page 5 File Reputation and File Analysis Reporting and Tracking, page 14 Taking Action
More informationInfoTransfer v2 Upload Guide
InfoTransfer v2 Upload Guide pressganey.com 800.232.8032 InfoTransfer v2 Upload Guide FEATURES Advantages over InfoTransfer v1 Uses a.net implementation of OpenPGP for encryption, removing dependency upon
More informationCIP 007 Compliance. Kevin B. Perry Dir, Critical Infrastructure Protection
CIP 007 Compliance Kevin B. Perry Dir, Critical Infrastructure Protection kperry@spp.org 501.614.3251 Agenda CIP 007 Purpose CIP 007 Requirement Overview Past Non Compliance Potential Non Compliance Concerns
More informationCOURSE FILES. BLACKBOARD TUTORIAL for INSTRUCTORS
OVERVIEW: Course Files provides file storage on the Blackboard server for a single course. Course Files within each course displays content for that specific course, not for other courses you teach. You
More informationUsing Expressions Web to Edit an FCNet Department Web Site
Using Expressions Web to Edit an FCNet Department Web Site Here are the steps to open and edit a site on the new FcWebDept shared department web site server using Microsoft Expression Web 4. The steps
More informationand File Encryption on ios with S/MIME and PGP
Email and File Encryption on ios with S/MIME and PGP Peter Tondl Email and file encryption are no longer an issue in the desktop world. Either you do it or not. In any case, technology rarely fails. All
More informationrat Comodo Valkyrie Software Version 1.1 Administrator Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013
rat Comodo Valkyrie Software Version 1.1 Administrator Guide Guide Version 1.1.122415 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo Valkyrie...
More informationSecurity+ SY0-501 Study Guide Table of Contents
Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators
More informationMetasploit. Installation Guide Release 4.4
Metasploit Installation Guide Release 4.4 TABLE OF CONTENTS About this Guide Target Audience...1 Organization...1 Document Conventions...1 Support...2 Support for Metasploit Pro and Metasploit Express...2
More informationChancellor s Office Information Technology Services Corporate Information Management FIRMS Budget Review Hyperion Process
Step Open Internet Explorer and type in the following URL: http://peterson.calstate.edu:8080/hyperion/browse/login The Hyperion Login screen will display. Enter your User Id and Password > click on the
More informationAmazon WorkMail. User Guide Version 1.0
Amazon WorkMail User Guide Amazon WorkMail: User Guide Copyright 2017 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection
More informationComodo APT Assessment Tool
rat Comodo APT Assessment Tool Software Version 1.1 Administrator Guide Guide Version 1.1.102815 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo
More informationInstallation Instructions for Free Scheduler Plus Software IBS Show Promotion
Installation Instructions for Free Scheduler Plus Software IBS Show Promotion Offer ends 1/12/17 limited copies available! Thank you for your decision to use our Free copy of Scheduling Plus to help streamline
More informationHow to install Internet Security for Android app
How to install Internet Security for Android app 1. Go to Google Play Store app. 2. In the dialog window enter Kaspersky Mobile Antivirus: Web Security & AppLock. Tap INSTALL to allow the app to install
More informationAdditional Network Workstation Windows XP Installation Guide
Additional Network Workstation Windows XP Installation Guide 1 Table of Contents I. Verify Hardware and Optimize Work Station 3 II. Download Software 10 III. Install Software 13 2 I. Verify Hardware and
More informationKaseya 2. Installation guide. Version R8. English
Kaseya 2 Kaseya Server Setup Installation guide Version R8 English October 24, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
More informationHow-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018
How-to Guide: Tenable Nessus for Microsoft Azure Last Updated: April 03, 2018 Table of Contents How-to Guide: Tenable Nessus for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment
More informationPGP(R) Desktop Version 10.1 for Mac OS X Release Notes
Page 1 of 8 PGP(R) Desktop Version 10.1 for Mac OS X Release Notes Thank you for using this PGP Corporation product. These Release Notes contain important information regarding this release of PGP Desktop
More informationTREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide
TREENO ELECTRONIC DOCUMENT MANAGEMENT Administration Guide February 2012 Contents Introduction... 8 About This Guide... 9 About Treeno... 9 Managing Security... 10 Treeno Security Overview... 10 Administrator
More informationRegulatory Reporting Hub SFTP Connection How to connect via SFTP & upload Files
SFTP Connection How to connect via SFTP & upload Files Version 1.3 November 2017 Table of Content 1. Introduction... 2 2. Technical Pre-Conditions... 2 2.1. Hardware requirements... 2 2.2. Software requirements...
More informationOdette CA Help File and User Manual
How to Order and Install Odette Certificates For a German version of this file please follow this link. Odette CA Help File and User Manual 1 Release date 31.05.2016 Contents Preparation for Ordering an
More informationDSS User Guide. End User Guide. - i -
DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...
More informationSymantec Endpoint Protection Installation Guide
Symantec Endpoint Protection 11.0 Installation Guide SYMANTEC ENDPOINT PROTECTION 11.0 TABLE OF CONTENTS A NEW SECURITY APPLICATION... 1 INTRODUCTION... 1 WHAT IS SYMANTEC ENDPOINT PROTECTION (SEP) 11.0?...
More informationExostar LDAP Proxy/Secure Setup Guide September 2017
Exostar LDAP Proxy/Secure Email Setup Guide September 2017 Copyright 2017 Exostar, LLC All rights reserved. 1 Table of Contents Email Encryption Set-up Outlook 2003... 4 Digitally Signing an Email... 4
More informationCleanMyPC User Guide
CleanMyPC User Guide Copyright 2017 MacPaw Inc. All rights reserved. macpaw.com CONTENTS Overview 3 About CleanMyPC... 3 System requirements... 3 Download and installation 4 Activation and license reset
More informationLaserfiche Agenda Workflow Training. Submitting an Agenda Item Through Laserfiche Web Access Version 10.2
Laserfiche Agenda Workflow Training Submitting an Agenda Item Through Laserfiche Web Access Version 10.2 May 2017 Contents LASERFICHE LASERFICHE AGENDA REVIEW WORKFLOW... 3 IMPORTING DOCUMENTS INTO WEB
More informationCentrify for Dropbox Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Centrify for Dropbox Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of
More informationWorkshare Professional 10. Getting Started Guide
Workshare Professional 10 Getting Started Guide Introducing Workshare Professional 10 Workshare is dedicated to helping professionals compare, protect and share their documents. New features Compare Excel
More informationUser Guide. BlackBerry Workspaces for Windows. Version 5.5
User Guide BlackBerry Workspaces for Windows Version 5.5 Published: 2017-03-30 SWD-20170330110027321 Contents Introducing BlackBerry Workspaces for Windows... 6 Getting Started... 7 Setting up and installing
More informationHow to Submit Settlement Inquiry Remedy Tickets
How to Submit Settlement Inquiry Remedy Tickets Defense Finance and Accounting Service Integrity - Service - Innovation BMC REMEDY AR SYSTEM First log into Web Remedy: https://dcii-cat- web.dfas.mil/arsys/forms/fin-ss72z2/home-
More informationUser Guide For Version 4.0
User Guide For Version 4.0 Easy-to-use, Complete Cyber Cafe Management Software by icafe Manager User Guide Contents Chapter 1: Introduction 7 1.1 About the Manual 7 1.2 Intended Audience 7 1.3 Conventions
More informationQualys Cloud Platform (VM, PC) v8.x Release Notes
Qualys Cloud Platform (VM, PC) v8.x Release Notes Version 8.18.1 April 1, 2019 This new release of the Qualys Cloud Platform (VM, PC) includes improvements to Vulnerability Management and Policy Compliance.
More informationINSTALLATION AND CONFIGURATION
INSTALLATION AND CONFIGURATION filesmart - Installation and Configuration Table of Contents filesmart - Installation and Configuration... 2 Table of Contents... 2 Server Installation Instructions... 3
More informationSelect the Akeni Pro Server installation file that matches your operating system and double-click on the file.
Akeni Pro Server Administration Guide (Version 2) Contents Chapter 1 Chapter 2 Chapter 3 Getting Started.: 1 Pro Server Installation.: 2 Launching Akeni Pro Server.: 3 Pro Client Installation.: 4 Launching
More informationParticipant User Guide, Version 2.6
Developers Integration Lab (DIL) Participant User Guide, Version 2.6 3/17/2013 REVISION HISTORY Author Date Description of Change 0.1 Laura Edens Mario Hyland 9/19/2011 Initial Release 1.0 Michael Brown
More informationSophos Mobile in Central
startup guide Product Version: 8.1 Contents About this guide... 1 What are the key steps?... 2 Activate Mobile Advanced licenses... 3 Configure settings... 4 Configure personal settings...4 Configure technical
More informationMend for Eclipse quick start guide local analysis
The Semmle Mend for Eclipse plugin allows users to view Semmle results in Eclipse. This document describes how to install and use the plugin for local analysis. You can install the plugin using a Semmle
More informationColligo Briefcase. for Good Technology. Administrator Guide
for Good Technology Administrator Guide Contents Introduction... 2 Target Audience... 2 Overview... 2 Key Features... 2 Platforms Supported... 2 SharePoint Security & Privileges... 3 for Good Technology...
More informationW H IT E P A P E R. Salesforce Security for the IT Executive
W HITEPAPER Salesforce Security for the IT Executive Contents Contents...1 Introduction...1 Background...1 Settings Related to Security and Compliance...1 Password Settings... 1 Session Settings... 2 Login
More informationIMPORTANT. Installing your EASE Scan Tool Software
Thank You for purchasing the EASE Diagnostics Scan Tool! Video install instructions to supplement these print instructions are available, if necessary, at www.fixcarsfaster.com. The videos are broken down
More informationComprehensive Mitigation
Comprehensive Mitigation Jenny Anderson Compliance Engineer - CIP janderson.re@spp.org 501.614.3299 July 25, 2013 Goals and Benefits of Mitigation Mitigation should lessen the risk of unintended consequences
More informationRegulatory Reporting Hub SFTP Connection How to connect via SFTP & upload Files
SFTP Connection How to connect via SFTP & upload Files Version 1.2 October 2017 Table of Content 1. Introduction... 2 2. Technical Pre-Conditions... 2 2.1. Hardware requirements... 2 2.2. Software requirements...
More informationRalph Durkee Independent Consultant Security Consulting, Security Training, Systems Administration, and Software Development
Ralph Durkee Independent Consultant www.rd1.net Security Consulting, Security Training, Systems Administration, and Software Development PGP and GnuPG Rochester OWASP Agenda: Generic Public Key Encryption
More informationDesktop & Laptop Edition
Desktop & Laptop Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion
More informationGUIDE. MetaDefender Kiosk Deployment Guide
GUIDE MetaDefender Kiosk Deployment Guide 1 SECTION 1.0 Recommended Deployment of MetaDefender Kiosk(s) OPSWAT s MetaDefender Kiosk product is deployed by organizations to scan portable media and detect
More informationCLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1
CLIQ Web Manager User Manual V 6.1 The global leader in door opening solutions Program version: 6.1 Document number: ST-003478 Date published: 2016-03-31 Language: en-gb Table of contents 1 Overview...9
More informationPKI Credentialing Handbook
PKI Credentialing Handbook Contents Introduction...3 Dissecting PKI...4 Components of PKI...6 Digital certificates... 6 Public and private keys... 7 Smart cards... 8 Certificate Authority (CA)... 10 Key
More informationVSP18 Venafi Security Professional
VSP18 Venafi Security Professional 13 April 2018 2018 Venafi. All Rights Reserved. 1 VSP18 Prerequisites Course intended for: IT Professionals who interact with Digital Certificates Also appropriate for:
More informationHow to Download and Re-upload a PDF File in WCMS
How to Download and Re-upload a PDF File in WCMS Login to WCMS. Click on the folder icon to expand it. (Icon is the left of the folder name). Select the folder that contains the file. Select the document
More informationOneSecure VPN Remote User Installation & Configuration Guide
OneSecure VPN Remote User Installation & Configuration Guide 3/11/2015 CONTENTS Download Client Software 02 Install Client Software 03 Enable Client Software 07 Configure the Connection 08 WELCOME Welcome
More informationDatasheet - Sitekit CMS Secure Forms
Datasheet - Sitekit CMS Secure Forms Registered Office Business Unit Role Document Type Document Author Document Checked by Sitekit Ltd Sitekit House Broom Place Portree Isle of Skye IV51 9HL Sitekit.Solutions
More informationPCI Compliance Assessment Module with Inspector
Quick Start Guide PCI Compliance Assessment Module with Inspector Instructions to Perform a PCI Compliance Assessment Performing a PCI Compliance Assessment (with Inspector) 2 PCI Compliance Assessment
More informationTier II Portal Tutorial. Latest Revision January
Tier II Portal Tutorial Latest Revision January 2018 2018 Topics to be covered 1. Creating the Tier2Submit file 2. Accessing the portal 3. Populating the input fields on the portal 4. Uploading your Tier2Submit
More informationMyFloridaNet-2 (MFN-2) Remote Access VPN Reference Guide
MyFloridaNet-2 (MFN-2) Remote Access VPN Reference Guide Document Control Number: 7055011 Contract Number: DMS-13/14-024 Prepared for: Florida Department of Management Services Division of Departmental
More informationJunos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 2.1 November 2011 R3 Copyright 2011, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
More informationCloud Security Whitepaper
Cloud Security Whitepaper Sep, 2018 1. Product Overview 3 2. Personally identifiable information (PII) 3 Using Lookback without saving any PII 3 3. Security and privacy policy 4 4. Personnel security 4
More informationDoubleTime 8.0 Standalone & Workstation Server. Installation Guide
DoubleTime 8.0 Standalone & Workstation Server Page 2 Table of Contents Minimum System Requirements... 3 Preparing to Install/Upgrade DoubleTime... 4 Installing the Stand-Alone version of DoubleTime -
More informationConfiguring Funk Odyssey Software, Avaya AP-3 Access Point, and Avaya
Configuring Funk Odyssey Software, Avaya AP-3 Access Point, and Avaya 802.11a/b Wireless Client for User Authentication (802.1x) and Data Encryption - Issue 1.0 Abstract These Application Notes describe
More informationVersion: 4.0. Quatrix Data Sheet. January 2018 Author: Maytech
Version: 4.0 Quatrix Data Sheet January 2018 Author: Maytech Problem Consumer file sharing services such as Hightail, WeTransfer and Dropbox are causing a massive headache for enterprise IT as BYOFT (bring
More informationAzure for On-Premises Administrators Practice Exercises
Azure for On-Premises Administrators Practice Exercises Overview This course includes optional practical exercises where you can try out the techniques demonstrated in the course for yourself. This guide
More informationSecurity Architecture
Security Architecture RDX s top priority is to safeguard our customers sensitive information. Introduction RDX understands that our customers have turned over the keys to their sensitive data stores to
More informationThe PKI Certificate Manager will require to be upgraded before renewing your certificates:
HCN Technical Support KBA: This article applies to Product(s): Blue Chip 2.1 (Medicare Australia Online) Summary: PKI certificates are the basis of an encryption technology used for the secure transmission
More informationMy Documentum for the Desktop (MDD)
My Documentum for the Desktop (MDD) Learning Objectives In this Job Aid, you will learn how to: 1 Launch MDD page 3 2 Connect and login page 5 3 Link Image Files in Documentum page 8 to InDesign Files
More informationSECARDEO. certbox. Help-Manual. Secardeo GmbH Release:
certbox Help-Manual Secardeo GmbH Release: 02.12.2014 certbox Help Manual 02.12.2014 Table of Contents 1 Search and retrieve Public Key Certificates... 1 1.1 Search by an e-mail address... 1 1.2 Download
More informationThe following security and privacy-related audits and certifications are applicable to the Lime Services:
LIME SECURITY, PRIVACY, AND ARCHITECTURE Last Updated: September 26, 2016 FinAccel s Corporate Trust Commitment FinAccel (FinAccel Pte Ltd) is committed to achieving and maintaining the trust of our customers.
More informationOracle Hospitality Simphony Cloud Services Post-Installation or Upgrade Guide Release 2.10 E July 2018
Oracle Hospitality Simphony Cloud Services Post-Installation or Upgrade Guide Release 2.10 E89810-04 July 2018 Copyright 2010, 2018, Oracle and/or its affiliates. All rights reserved. This software and
More informationManaging AON Security
CHAPTER 4 This chapter describes AON functions relating to security, authentication, and authorization. It includes the following topics. Managing Keystores, page 4-1 Configuring Security Properties, page
More informationCyber Essentials Questionnaire Guidance
Cyber Essentials Questionnaire Guidance Introduction This document has been produced to help companies write a response to each of the questions and therefore provide a good commentary for the controls
More informationComodo Offline Updater Utility Software Version
Comodo Offline Updater Utility Software Version 1.2.30701.2 i User Guide Guide Version 1.2.011811 Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Introduction to
More informationLab: Securing with PGP
Objectives Understand the concept of public keys, signing, and encrypting email with PGP. Background GNUPG (or GNU Privacy guard) is a free implementation of the OpenPGP standard (RFC 4880) as a tool for
More informationAT&T Toggle. 2/3/2014 Page i
Page i GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 1: Toggle Overview... 1 Personal Icon... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Data Usage App... 3 Media... 4 AT&T
More informationWorkspace ONE UEM Integration with OpenTrust CMS Mobile 2. VMware Workspace ONE UEM 1811
Workspace ONE UEM Integration with OpenTrust CMS Mobile 2 VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you
More informationPKI Services. Text PKI Definition. PKI Definition #1. Public Key Infrastructure. What Does A PKI Do? Public Key Infrastructures
Public Key Infrastructures Public Key Infrastructure Definition and Description Functions Components Certificates 1 2 PKI Services Security Between Strangers Encryption Integrity Non-repudiation Key establishment
More informationKNOXPLANS for New Users
KNOXPLANS for New Users Version 9.1, October 2018 Contents KNOXPLANS for New Users... 1 Welcome to KnoxPlans, Version 9.1... 2 Recommended Client Hardware and O/S Specifications... 2 Browser Requirements...
More informationJuly 18, (Revision 3)
3D Tool 2.0 User Guide July 18, 2011 (Revision 3) Copyright 2011. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security,
More informationBEST PRACTICES FOR PERSONAL Security
BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple
More informationBackupVault Desktop & Laptop Edition. USER MANUAL For Microsoft Windows
BackupVault Desktop & Laptop Edition USER MANUAL For Microsoft Windows Copyright Notice & Proprietary Information Blueraq Networks Ltd, 2017. All rights reserved. Trademarks - Microsoft, Windows, Microsoft
More informationVMware AirWatch: Directory and Certificate Authority
Table of Contents Lab Overview - HOL-1857-06-UEM - VMware AirWatch: Directory and Certificate Authority Integration... 2 Lab Guidance... 3 Module 1 - Advanced AirWatch Configuration, AD Integration/Certificates
More informationAT&T Toggle. 12/12/2013 Page i
Page i GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 1: Toggle Overview... 1 Personal Icon... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Media... 3 AT&T Toggle Messaging...
More informationSecurity Information & Policies
Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER
More informationKerio Cloud. Adam Bielawski. Cloud Hosted Enterprise-Class , Calendars, Contacts, Tasks, and Instant Messaging. Twitter LinkedIn Facebook
Kerio Cloud Cloud Hosted Enterprise-Class Email, Calendars, Contacts, Tasks, and Instant Messaging Twitter LinkedIn Facebook Presented by Adam Bielawski June 15, 2016 Why Kerio? Kerio provides safe, simple,
More informationBetter Practice Elements for Audit Preparation
Better Practice Elements for Audit Preparation David Cerasoli, CISSP Manager, CIP Audits John Muir Director, Compliance Monitoring 3/23/2018 1 This presentation will cover the major milestones of an audit,
More informationAbila Nonprofit Online. Connection Guide
Abila Nonprofit Online This is a publication of Abila, Inc. Version 1.x 2014 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names
More informationEntraPass Installation Guide Kantech-OnBoard systems
EntraPass Installation Guide Overview Purpose ExacqVision recorders now include Kantech EntraPass Corporate Edition software. The purpose of this document is to guide the technician or installer through
More information