TITLE

Coping with a major security breach?

AUTHOR(S)
Allen, Martin
PUB. DATE
June 2006
SOURCE
Management Services;Summer2006, Vol. 50 Issue 2, p22
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The article discusses the contingency plan of organisations in response to security breaches. In November 2005 a laptop belonging to an employee of the Boeing Corporation was stolen. Among the information on the machine was personal financial data about 161,000 current and former employees. It was said that none of the confidential information was encrypted therefore exposing employees to identity theft. It was found that companies around the world have always refused to reveal details of IT security breaches. Windows provides some encryption with its Encrypting File System, but EFS was said to be difficult to manage and impossible to enforce. An effective encryption policy needs to encompass every device onto which employees might wish to copy files. The choice of crypto algorithm was said to be vital.
ACCESSION #
21388922

 

Related Articles

  • Data Is Dynamic-- Is Your Defense? Mimoso, Michael S. // Information Security;Aug2005, Vol. 8 Issue 8, p20 

    Reports on the popularity of encryption technology as an approach for securing stored data, as of August 2005. Drawbacks to the technology; Other methods of managing data security.

  • SecurDataStor Professional. Millman, RenĂ© // SC Magazine: For IT Security Professionals (UK Edition);Jun2004, p48 

    This article presents an evaluation of the SecurDataStor Professional removable media encryption software from Encryptx Corporation. Encrypting sensitive information on removable media has allegedly been regarded as precious in relation to information technology security issues. While...

  • Assessing Your Endpoint Security Needs. Strom, David // Baseline;Jan/Feb2009, Issue 92, p44 

    This article examines information security issues that information technology managers should be monitoring. The author recommends installing VPN protection for smartphones and personal data assistants. A thorough understanding of the existing anti-virus and firewall program is important so any...

  • Keep out business spies.  // Management Services;Nov2001, Vol. 45 Issue 11, p31 

    Biodata Information Technology has launched BroadCipher ATM (asynchronous transfer mode), a hardware-based high speed encryption platform for data communications over ATM global networks. Given the right kit, ATM networks can readily be tapped to spy on companies' confidential data. BroadCipher...

  • Steps you can take now to help reduce data breaches.  // Network World;2/16/2009, Vol. 26 Issue 7, p8 

    The article offers tips to help reduce data breaches. It states that data protection is everyone's responsibility, particularly for information technology (IT) workers. Michael Argast, a security analyst with Sophos, highlights the steps necessary for network managers to do to prevent data...

  • The link between crypto and politics. Messmer, Ellen // Network World;10/24/2005, Vol. 22 Issue 42, p94 

    This article examines the link between cryptographic algorithms and world politics. For instance, information technology security company, Cybertrust Inc., is supporting the Russian Treasury's public-key infrastructure project, which is expected to result in about one million users of digital...

  • Tale of the tape: Encrypt data now. Synder, Joel // Network World;7/4/2005, Vol. 22 Issue 26, p13 

    This article focuses on the topic of data encryption. Data should be encrypted in transit. When a company ships a pile of back-up tapes from Point A to Point B, this is in transit. The data on those tapes should be encrypted. People connect to the network over the Internet through some kind of...

  • Security a Legitimate Fear of Participants.  // Retirement Market Insights;Feb2008, Vol. 4 Issue 2, p8 

    The article emphasizes the threat brought by identity theft in the online environment. The Patterns of Participant Use of Plan of Plan Websites reports that 85% of their respondents expressed their concern with the security of their personal information. Criminal tactics in the cyberspace are...

  • Encryption from a Management Perspective. Leja, Christine // Information Executive;Jan2008, Vol. 11 Issue 1, p6 

    The article focuses on the white paper "A Management Perspective of Encryption Today," written by the Association of Information Technology Professionals' (AITP) Research and Strategy Advisory Group (RASAG). The paper focuses on issues related to the security of static and dynamic data, building...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics