- » Account Request
- » Alumni Account Request
- » Calendar Request
- » Access Request
- » Disk Quota Increase
- » Exiting Employee
- » Request Forms and Processes
(ITS Staff only)
Encryption is the transformation of data into a form unreadable by anyone without the secret decryption key. Its purpose is to ensure confidentiality and privacy by keeping the information hidden from anyone for whom it is not intended. For example, one may wish to encrypt files on a hard drive to prevent an intruder from reading them. When an entire hard disk is encrypted, that data is protected if the computer is lost or stolen. Encryption can also be used to protect sensitive files that are sent through email or sensitive communications sent over the network.
Strong encryption is the term we use to describe the minimum strength of encryption appropriate for use with Level 1 protected data. Strong encryption is 256-bit encryption and complies with ICSUAM Policy Information Security Asset Management Section 8065: Information Security Asset Management, Standard 8065.S0.
The single most important thing to remember about any encryption process is that it is either extremely difficult or completely impossible to decrypt encrypted data if the password is lost.
Procedures, Guidelines, Other: