Worcester State University
Information Security Awareness

 
Theft Protection

Encryption of laptops, desktops, and removable media

  • As of March 30, 2010, All University owned laptops have been encrypted.    All College owned desktop computers in key areas have been encrypted and any future new or reimaged desktop computer will be encrypted.
  • What is Encryption? Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood. 

Remember YOUR WSU Network Username/Password is key.  Don’t Give It Away!

The use of encryption/decryption is as old as the art of communication. In wartime, a cipher, often incorrectly called a code, can be employed to keep the enemy from obtaining the contents of transmissions. (Technically, a code is a means of representing a signal without the intent of keeping it secret; examples are Morse code and ASCII.) Simple ciphers include the substitution of letters for numbers, the rotation of letters in the alphabet, and the "scrambling" of voice signals by inverting the sideband frequencies. More complex ciphers work according to sophisticated computer algorithms that rearrange the data bits in digital signals.  In order to easily recover the contents of an encrypted signal, the correct decryption key is required. The key is an algorithm that undoes the work of the encryption algorithm. Alternatively, a computer can be used in an attempt to break the cipher. The more complex the encryption algorithm, the more difficult it becomes to eavesdrop on the communications without access to the key.

Report lost or stolen items immediately. 

  • The University is prepared to handle Lost or Stolen computer hardware but we must be made aware.  It is imperative that you contact Campus Police or the Information Technologies Help Desk if your computer or laptop has been lost or stolen.  When you report the issue you will be asked specific questions about the incident, please know that we are only trying to help recover the items, protect lost data, and inform as needed.  We understand things happen beyond our control.  The sooner we know the faster we can protect You and the University.

Lock offices; do not leave laptops unattended for even a short-time

  • As mentioned earlier, we are all responsible for Information Security Awareness.  Even if leaving your area for a short time be sure that you lock your door if you leave your office.  If you are in an open office be sure that there are other members of the staff who know that you are going to be away and secure your laptop in a locked drawer of your desk whenever possible.  At minimum use the Windows+L keyboard keys to secure your computer, which will require someone to login to view the open applications/documents.  If this does not seem feasible, please contact the Information Technologies Help Desk so that we can discuss your situation and provide assistance.

   




 
 
Points of Interest:
  UTS Policy Site
  Check PW Strength
  UTS Guides
  Social Network Cons
  ISA Presentation
  Spot a Craig's List scam
  State Ethics Compliance
  Spot a Phishing/Spam Scam
  Modern Malware for Dummies
  Visit Educause Data Privacy
  Visit Educause Cybersecurity Initiative
  National Cyber Security Awareness
  Examples of "good" security questions


DataBridge © WSU, 486 Chandler Street, Worcester, MA 01602
Phone: 508-929-8000