The encryption revolution

Messmer, Ellen
December 2007
Network World;12/10/2007, Vol. 24 Issue 48, p20
Trade Publication
The article reports on the efforts made by the U.S. Air Force and the 754th Electronic Systems Group to minimize data breach in Montgomery, Alabama. The group sets security policy for the 500,000 laptops used by the Air Force to allude the data breach fiascos. Because of the incident that happened at Veterans Affairs alluding to the data-breach fiascos that led to the exposition of millions of veterans personal information and stolen laptops, White House Office of Management and Budget, the U.S. Department of Defense and the civilian-side General Services Administration decided to investigate at governmentwide approaches for data-at-rest encryption.


Related Articles

  • Enforce your security plan.  // Computer Weekly;6/6/2006, p28 

    The article focuses on the computer security management with reference to the theft of data at the U.S. Department for Veterans Affairs. To lose a laptop may be regarded as a misfortune. To lose a laptop with 26.5 million IDs, including names, social security numbers and dates of birth, smacks...

  • PUTTING THE BRAKES ON insiders.  // Information Security;Apr2006, Vol. 9 Issue 4, p30 

    Discusses an information security breach incident that occurred at the Georgia Technology Authority (GTA) in April 2005. Information about the thief, Asif Siddiqui, who, incidentally, is an employee at GTA; Changes made by the organization in its hiring process and information security policy...

  • 30 seconds on….  // SC Magazine: For IT Security Professionals (UK Edition);Aug2006, p21 

    The article answers questions concerning personal data protection. Banks and other financial institutions asks for the maiden name of the client's mother for verification. This question is used as a way of recovering passwords and account details. Revealing mother's maiden name could compromise...

  • Data Dump. Shoop, Tom // Government Executive;Jul2006, Vol. 38 Issue 12, p66 

    The article presents information related to data theft in the federal government. Various administrative agencies began logging reports of their own data thefts when the U.S. Veterans Affairs Department reported that personal information on more than 26 million veterans and military service...

  • An Identity Heist The Size of Texas. Levy, Steven // Newsweek;6/12/2006, Vol. 147 Issue 24, p18 

    The article discusses a data theft within the United States Department of Veterans Affairs. The author mentions an incident concerning a Veterans Affairs employee who downloaded a database containing more than 26 million personal records onto his laptop computer and later discovered his...

  • Information Technology (IT). Lawson, Marci A. // Army Lawyer;Jan2007, Issue 404, p129 

    The article reports that the U.S. Department of Veterans Affair (VA) has awarded a $3.7 million contract for the installation of encryption software on all department computers and portable media. This action is a response to a series of theft of department laptop computers and computer security...

  • Microsoft's network coding plan. Duffy, Jim // Network World;12/10/2007, Vol. 24 Issue 48, p17 

    The article offers information about Microsoft's Security Content Distribution (MSCD) system in the U.S. The platform was in trial with customers who downloaded a new release of its Microsoft Visual Studio 2008 Beta-2. The company extended the testing of its system to assess the capabilities and...

  • JUST MAKE IT GO AWAY. Bennett, Brian // Time;6/5/2006, Vol. 167 Issue 23, p17 

    The article reports that 26.5 million veterans would not have to worry about the fate of their social security numbers if the Department of Veterans Affairs (V.A.) used data destroying software on their computers. Millions of personal records were stolen when a V.A. employee's laptop was taken...

  • Government Security. Wolfe, Daniel // American Banker;7/21/2006, Vol. 171 Issue 139, p7 

    The article reports that the U.S. federal government insists they did not lose any data despite two highly publicized security breaches. The laptop computer stolen from an employee of the U.S. Department of Veterans Affairs, which contained personal data on millions of people, was not accessed...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics