Encryption | California State University, Northridge

Bluetooth itself as a technology isn't secure, it's not only about the implementation, there are some serious flaws in the design itself. Bluetooth isn't a short range communication method - just because you're a bit far doesn't mean you're safe.Class I Bluetooth deviceshave a range up to 100 meters. Bluetooth isn't a mature communicate method (security-wise). With smart phones, it has turned into something totally different from what it was meant to be. It was created as a way to connect phones to peripherals. Please don't use Bluetooth for accessing Level 1 data.

If you do need to use Bluetooth devices please do the following

Here is theWindows documentation.

Here is theMacintosh documentation

Disk encryption safely protects all the data stored on a hard drive. When the entire hard disk is encrypted, everything on that disk is protected if the computer is lost or stolen. CSUN recommends the following drive encryption programs for non-portable storage devices. Select the appropriate link for more information on how to use each program:

E-mails may be encrypted and/or authenticated to prevent the contents from being read by unintended recipients. Please ask your local tech if you believe you need to encrypt e-mail messages.

The following encryption methods are available for protecting files and folders stored on portable storage devices such as, USB sticks, external hard drives and other mobile devices. Select the appropriate link below for more information on how to use each program:

There are storage devices that use hardware based encryption.

File encryption is designed to protect stored (at rest) files or folders.

Additional information is available by clicking on each product name.

Caution: Data in encrypted files are not retrievable if the encryption key is lost.

Following are examples of file encryption software to use when encrypting your data:

The following productivity tools let you password-protect and/or encrypt individual files:

It is possible to encrypt entire networks, which may be desirable in certain situations. If you think this may be relevant to you, please contact your local tech for assistance.

Visit link:
Encryption | California State University, Northridge

Related Posts
This entry was posted in $1$s. Bookmark the permalink.