Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
🎓

Purpose

Encryption encodes information in such a way that unauthorized parties should be unable to read it. This helps to prevent compromises to the confidentiality and integrity of your data and is a part of robust, multi-layered security approach. Whether it is a compromised desktop, or a lost mobile or storage devices, encryption ensures that your data remains accessible to only you and your team.


👥Audience

Status
titlefaculty
Status
colourBlue
titleresearchers
Status
colourRed
titleAdmin staff
Status
colourPurple
titleIT staff
Status
colourGreen
titlestudents

🔖 Contents


On this page

Expand
titleExpand to view table of contents.
Table of Contents
minLevel1
maxLevel
3
4
include
outlinefalse
indent
styledefault
excludePurpose|Audience|
Contents
On this page|Search|Additional help|Related articles
typelist
class
printablefalse

(question)Initial considerations

Note

Not all encryption algorithms are the same. AES-128 bit (or equivalent) is the absolute minimum you should consider. AES-256 bit or greater is preferred.

Determine your data's classification.

  • Classifying your data is the first step to knowing what safeguards are required to securely store your data.

    • Classify data

    • Level 3 and level 4 data must be stored on a secure server or must be encrypted at rest on a laptop, mobile device, or removeable storage.

Consult with your local IT group.


\uD83D\uDCD8 What What can I do?

Enable or install full-disk encryption packages.

Windows (institutionally managed)

.

Windows (self-managed)

.

MacOS (self-managed)

.

Linux (self-managed)

.

Android (self-managed)

.

iOS (self-managed)

.

Cross-platform

.

Encrypt at the file or folder level.

Info

ZIP files can be transferred across platforms.

Windows

.

MacOS

.

Linux

.

Cross-platform

.

Use a self-encrypting device (SED)

to supplement full-disk or file level encryption

.

Servers

.

  • Where possible, order SED storage drives and motherboards supporting Trusted Platform Module (TPM).

Storage

.


Page Properties
hiddentrue

Name

Role

Date

Michael Laurentius

Author

Carl Chan

Approver (Manager)

Reviewer

Live Search
spaceKeyISH
sizelarge
additionalpage excerpt
placeholderHow do I...
typepage
labelskb-how-to-article,kb-general-concepts,kb-spec-how-to-article


✉️Additional help

General

https://uoft-infosec-cf.atlassian.nethandbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/AdditionalContact+help#%F0%9F%9B%A1%EF%B8%8F-Informationus#Information-Security-(IS)

https://uoft-infosec-cf.atlassian.nethandbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/AdditionalContact+help#%F0%9F%96%A5%EF%B8%8Fus#Information-Information-Technology-(IT)

Researchers

https://security.utoronto.ca/services/research-information-security-program/


Filter by label (Content by label)
showLabelsfalse
maxCheckboxfalse
showSpacefalse
reversefalse
excerptTypesimple
cqllabel in ( "encrypt" , "secure" ) and title !~ "Encrypt my devices or dataencrypt"