TITLE

Scramble that data!

AUTHOR(S)
Castagna, Rich
PUB. DATE
September 2007
SOURCE
Storage Magazine;Sep2007, Vol. 6 Issue 7, p4
SOURCE TYPE
Periodical
DOC. TYPE
Editorial
ABSTRACT
The author emphasizes the importance of data encryption. According to the author, the main reasons for not encrypting are money and key management. However, the author says companies should have to find a way around them if they are serious about safeguarding their data. He adds that even if technical support can get over the cost justification and key management hurdles, encryption will have an effect on other storage management processes.
ACCESSION #
26685571

 

Related Articles

  • Wave Systems unveils encryption software. Messmer, Ellen // Network World;9/26/2005, Vol. 22 Issue 38, p28 

    This article reports that Wave Systems Corp. (WS) launched an upgrade to its personal computer (PC)-based encryption and authentication software that adds a way for customers to remotely manage security policy and receive copies of user-generated keys as a corporate backup. Embassy Trust Suite...

  • Laptop Encryption is Now Mandatory. Sisk, Michael // Bank Technology News;Sep2006, Vol. 19 Issue 9, p14 

    The article reports on issues concerning the recommendation by the Office of Management and Budget that all federal agencies encrypt data on mobile devices. Consumer advocates are frustrated on the lack of basic safeguard on data encryption. The recommendation is seen to be a good rule but the...

  • Has Anyone Seen My Data? Harris, Daniel // Electronic Design;4/27/2007, Vol. 55 Issue 9, p41 

    The article offers information on various algorithms in Internet protocol (IP) form that ensure the security of programmed and stored data in a computer system. These algorithms are provided to prevent viruses, financial fraud, computer theft and network intrusion cost. Among these include the...

  • Encryption Quality and Performance Analysis of GKSBC Algorithm. Aruljothi, S.; Venkatesulu, M. // Journal of Information Engineering & Applications;2012, Vol. 2 Issue 10, p26 

    In the age of intensive data exchanges, security of data poses a major challenge to the existing communication arrangement. In this context the evolution and evaluation of new encryption system is inextricably linked to the process of realizing ever increasing network security needs. Recently a...

  • ASC - A Stream Cipher with Built-In MAC Functionality. Wirt, Kai-Thorsten // International Journal of Computer Science;2007, Vol. 2 Issue 2, p131 

    In this paper we present the design of a new encryption scheme. The scheme we propose is a very flexible encryption and authentication primitive. We build this scheme on two relatively new design principles: t-functions and fast pseudo hadamard transforms. We recapitulate the theory behind these...

  • Six ways to limit your exposure to cyber attacks. Pierson, Christopher T. // Inside Tucson Business;1/24/2005, Vol. 14 Issue 33, Special section p1 

    This article focuses on cyber security. Businesses that store data in a digital format should have their security assessed by legal and information technology professionals. Using a firewall is much like closing and locking the doors to your home or office. Entry and exit are only allowed to...

  • Chaotic Image Encryption via Convex Sinusoidal Map. ABU-AMARA, F.; ABDEL-QADER, I. // WSEAS Transactions on Signal Processing;Oct2013, Vol. 9 Issue 4, p177 

    A new image encryption scheme is proposed based on one-dimensional Convex-Sinusoidal Map (CSM). The dynamics of this chaotic map are analyzed and used to develop a two-phase image encryption framework. In the first phase, the image-permutation, a pseudorandom number generator is proposed to...

  • ENCRYPT YOUR SENSITIVE DATA.  // Techlife Australia (Bauer Media Group);May2014, Issue 24, p82 

    The article offers tips on how to encrypt sensitive data through TrueCrypt software. An overview about the software and its capability of encrypting the files and documents is provided. Also offered are steps in creating an encrypted file container using the application, with details on the...

  • Towards a common key management standard: making encryption work.  // MarketWatch: Global Round-up;Apr2009, Vol. 8 Issue 4, p228 

    The article presents an analysis on the possibility to implement encryption that would serve as information assets and standard in key management in business. Accordingly, the growing trend when it comes to remote and mobile working has made an essential increase in the channels in which data...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics