Encryption of laptops, desktops, and
- As of March 30, 2010, All University owned laptops have been
All College owned desktop computers in key areas have
been encrypted and any future new or reimaged desktop computer
will be encrypted.
What is Encryption? Encryption is the conversion of data into a form,
called a ciphertext, that cannot be easily understood by
unauthorized people. Decryption is the process of converting
encrypted data back into its original form, so it can be understood.
Remember YOUR WSU Network
Username/Password is key.
Don’t Give It Away!
The use of encryption/decryption is as old as the art of
communication. In wartime, a
cipher, often incorrectly called a code, can be employed
to keep the enemy from obtaining the contents of transmissions.
(Technically, a code is a means of representing a signal without the
intent of keeping it secret; examples are
Morse code and
ASCII.) Simple ciphers include the substitution of
letters for numbers, the rotation of letters in the alphabet, and
the "scrambling" of voice signals by inverting the
sideband frequencies. More complex ciphers work according
to sophisticated computer
that rearrange the data bits in digital signals.
In order to easily recover the contents of an encrypted
signal, the correct decryption
key is required. The key is an algorithm that undoes the
work of the encryption algorithm. Alternatively, a computer can be
used in an attempt to break the cipher. The more complex the
encryption algorithm, the more difficult it becomes to eavesdrop on
the communications without access to the key.
Report lost or stolen items immediately.
- The University is prepared to handle
Lost or Stolen computer hardware but we must be made aware.
It is imperative that you contact Campus Police or the
Information Technologies Help Desk if your computer or laptop
has been lost or stolen.
When you report the issue you will be asked specific
questions about the incident, please know that we are only
trying to help recover the items, protect lost data, and inform
as needed. We
understand things happen beyond our control.
The sooner we know the faster we can protect You and the
Lock offices; do not leave laptops unattended for even a
As mentioned earlier, we are all
responsible for Information Security Awareness.
Even if leaving your area for a short time be sure that
you lock your door if you leave your office.
If you are in an open office be sure that there are other
members of the staff who know that you are going to be away and
secure your laptop in a locked drawer of your desk whenever
possible. At minimum
use the Windows+L keyboard keys to secure your computer, which
will require someone to login to view the open
If this does not seem feasible, please contact the
Information Technologies Help Desk so that we can discuss your
situation and provide assistance.