TITLE

Data Hardly Ever Dies: Encrypt Your Warriors' Laptops

AUTHOR(S)
Smith, Warren
PUB. DATE
February 2007
SOURCE
Security: Solutions for Enterprise Security Leaders;Feb2007, Vol. 44 Issue 2, p74
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article provides information on the need to encrypt laptop data in the U.S. In a recent survey conducted it revealed that business traveler face a risk when their laptops are stolen and many companies are sued in court for privacy breaches by consumers whose personal data are exposed to the public. According to the author electronic data never dies because they are stored in removable storage and data thieves base their selling price of the stolen laptops on the data it carries. INSET: Put that Data in a Vault.
ACCESSION #
24041045

 

Related Articles

  • Protecting Campus Data. Angelo, Jean Marie // University Business;Sep2006, Vol. 9 Issue 9, p75 

    The article focuses on how universities in the U.S. protect data in laptops. William Penn University in Iowa uses LoJack for Laptops, an IT security product from Absolute Software designed to secure data and track lost or stolen portable machines. The University of Toledo in Ohio and Brown...

  • A Context-aware Access Control Model for Pervasive Environments. Al-Rwais, Sumayah; Al-Muhtadi, Jalal // IETE Technical Review (Medknow Publications & Media Pvt. Ltd.);Sep/Oct2010, Vol. 27 Issue 5, p371 

    Pervasive environments are dynamically changing environments with enormous amounts of information available for access from anywhere. This paper presents a framework for context-aware access control using threshold cryptography (CAAC-TC) where the administration of access control is distributed...

  • PROBABILISTIC AND DETERMINISTIC CRYPTO ANALYSIS. Thiyagarajan, M.; Samundeeswari, S. // Journal of Theoretical & Applied Information Technology;2008, Vol. 4 Issue 5, p410 

    In Network Security various attacks have been identified at different stages of intrusion and attempts. Security measures are designed for overcoming individual attacks. These attacks are random in nature and an attempt is made to the multi scale autoregressive model to combine all attempts to...

  • Raising the Grade. Zoran, Ronen // Government Security;Jun2004, Vol. 3 Issue 4, p20 

    Presents five tips for more secure electronic information sharing. Data encryption; Establishment of an administrative password change policy; Multiple layers of security; Regular monitoring and auditing.

  • It's all about the data. Stephenson, Peter // SC Magazine: For IT Security Professionals (15476693);Oct2011, Vol. 22 Issue 10, p37 

    The article is an introductory section to the Group Test reports within the issue. It notes the security professional's job to devote attention to data protection through encryption tools, and data leakage protection. The author also offers information on the criteria used for testing and review...

  • Hierarchical time-based information release. Nali, Deholo; Adams, Carlisle; Miri, Ali // International Journal of Information Security;2006, Vol. 5 Issue 2, p92 

    Rapid distribution of newly released confidential information is often impeded by network traffic jams, especially when the confidential information is either crucial or highly prized. This is the case for stock market values, blind auction bidding amounts, many large corporations'strategic...

  • An efficient provably secure certificateless aggregate signature applicable to mobile computation. Hu Xiong; Qianhong Wu; Zhong Chen // Control & Cybernetics;2012, Vol. 42 Issue 2, p373 

    An aggregate signature scheme allows a public algorithm to aggregate n signatures on n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that the messages have been endorsed by all the signers. Certificateless aggregate...

  • Locking Down Mobile Workers. Smith, Brad // Wireless Week;2/15/2007, Vol. 13 Issue 4, p19 

    The article offers information on Evros, a data protection system developed by Alcatel-Lucent. The system allows information technology departments to deny access to information stored in wireless computers. Evros allows database administrators to manipulate the encryption code stored in a...

  • Keep Your Secrets: A Safe, Easy Way to Encrypt Files. Spector, Lincoln // PC World;Jan2007, Vol. 25 Issue 1, p130 

    The article presents questions and answers related to computer security. One person asks how to encrypt files and which files should he encrypt. Another questions if he could change the shortcuts on the Places Bar in Microsoft Office File Open and Save dialog boxes. INSET: CHECK OUT THIS TOOL...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics