Data Hardly Ever Dies: Encrypt Your Warriors' Laptops

Smith, Warren
February 2007
Security: Solutions for Enterprise Security Leaders;Feb2007, Vol. 44 Issue 2, p74
Trade Publication
The article provides information on the need to encrypt laptop data in the U.S. In a recent survey conducted it revealed that business traveler face a risk when their laptops are stolen and many companies are sued in court for privacy breaches by consumers whose personal data are exposed to the public. According to the author electronic data never dies because they are stored in removable storage and data thieves base their selling price of the stolen laptops on the data it carries. INSET: Put that Data in a Vault.


Related Articles

  • Security by typing. Debbabi, Mourad; Durgin, Nancy; Mejri, Mohamed; Mitchell, John C. // International Journal on Software Tools for Technology Transfer;Aug2003, Vol. 4 Issue 4, p472 

    We present an approach for analyzing cryptographic protocols that are subject to attack from an active intruder who takes advantage of knowledge of the protocol rules. The approach uses a form of type system in which types are communication steps and typing constraints characterize all the...

  • Protecting Campus Data. Angelo, Jean Marie // University Business;Sep2006, Vol. 9 Issue 9, p75 

    The article focuses on how universities in the U.S. protect data in laptops. William Penn University in Iowa uses LoJack for Laptops, an IT security product from Absolute Software designed to secure data and track lost or stolen portable machines. The University of Toledo in Ohio and Brown...

  • UTILIZING FRACTAL STRUCTURES FOR THE INFORMATION ENCRYPTING PROCESS. TRIVEDI, UDAI BHAN; BHARTI, R C // International Journal of Research in Commerce, IT & Management;Oct2012, Vol. 2 Issue 10, p85 

    Information security is the process which describes all measures taken to prevent unauthorized use of electronic data, whether this unauthorized use takes the form of destruction, disclosure, modification, or disruption. Information security and Cryptography are interconnected and share the...

  • CipherOptics series.  // SC Magazine: For IT Security Professionals (15476693);Nov2010, Vol. 21 Issue 11, p46 

    The article evaluates the series of network encryption devices from CipherOptics including CipherEngine, CEP10-R and CEP100.

  • A Context-aware Access Control Model for Pervasive Environments. Al-Rwais, Sumayah; Al-Muhtadi, Jalal // IETE Technical Review (Medknow Publications & Media Pvt. Ltd.);Sep/Oct2010, Vol. 27 Issue 5, p371 

    Pervasive environments are dynamically changing environments with enormous amounts of information available for access from anywhere. This paper presents a framework for context-aware access control using threshold cryptography (CAAC-TC) where the administration of access control is distributed...

  • The Simple Way to Keep Your Private Files Private. Dunn, Scott; Spanbauer, Scott // PC World;May2007, Vol. 25 Issue 5, p115 

    This article explains that there is only one way to one's files really confidential and that is by encrypting them. It says that most Windows versions' Encrypting File System (EFS) in Vista, XP and 2000 scrambles the contents of files and folders, thus making it really difficult for other people...

  • Better Security Through Zip.  // InfoWorld;5/10/2004, Vol. 26 Issue 19, p14 

    This article evaluates the line of security-related products from PKWare, the company that originated the venerable Zip archive format. The product, debuting as Version 8, SecureZip for Windows, allegedly combines Zip compression with strong Rivest, Shamir, and Adelman encryption in a secure...

  • PROBABILISTIC AND DETERMINISTIC CRYPTO ANALYSIS. Thiyagarajan, M.; Samundeeswari, S. // Journal of Theoretical & Applied Information Technology;2008, Vol. 4 Issue 5, p410 

    In Network Security various attacks have been identified at different stages of intrusion and attempts. Security measures are designed for overcoming individual attacks. These attacks are random in nature and an attempt is made to the multi scale autoregressive model to combine all attempts to...

  • Constructing Cryptographic Definitions. Rogaway, Philip // ISeCure;Jul2011, Vol. 3 Issue 2, p69 

    This paper mirrors an invited talk to ISCISC 2011. It is not a conventional paper so much as an essay summarizing thoughts on a little-talked-about subject. My goal is to intermix some introspection about definitions with examples of them, these examples drawn mostly from cryptography....


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics