|
Although it could have been condensed a bit - several elements seem to overlap - pewee has published a nice problem to the presentation of the safety of the laptop. In this case, " good " refers to the clarity of the presentation , not the feeling that the message is likely to cause . This message is that there are many ways that a laptop can become a problem.
Ways laptops are in danger: Hard drives are not encrypted USB keys are not disabled , people use devices simultaneously for personal and professional tasks , users do not pay attention to safety, no security measures are physical used , people do stupid things , the devices are not labeled and therefore can not be returned by the rare person who is honest , research programs are not sufficiently used , and the systems are not corrected .
Lack of encryption is number one on the list pewee . It is not an accident. Encryption is one of The laptop encryption is key strategies for data protection of the machine, and makes largely inaccessible to people who steal or find data devices .
There is good news on this front. Network World reports that federal agencies have purchased 800,000 licenses for encryption of the last year, laptop encryption although federal data at rest (DAR) encryption program , which is managed by the General Services Administration and the Department of Defense. The piece says that the total number of federal laptops think they should worry is believed that nearly 2 million ,laptop encryption divided almost equally between devices belonging to the federal government and private companies that have access to government data. History offers two interesting links to human Privacy Information Center - which, among other things , maintains an updated list of offenses - and laptop encryptiona list of the top 10 providers of encryption for the federal program.
On paper ( or computer screen) , the idea of awfully disk encryption - as its name suggests, the encryption of any machine in a soup to nuts - sounds good. That is , everyone except some people in the department . In a recent message said full disk encryption laptop encryption Tech Republic tests the device beyond the hard material . Full Disk Encryption , says the author , can also lead to situations management difficult passwords .
The author suggests that most people do not really need full disk encryption . laptop encryption There is a large amount of data on a computer that is left clear. The best alternative is to use encrypted disk images to store sensitive data and leaving everything else . More specifically , the author recommends True Crypt an open source utility that can seamlessly switch between Windows , Mac OS and Linux.laptop encryption
Laptop encryption is not a task of one size. There are different approaches and the processor examines the variables and tradeoffs of each. Perhaps the most important decision is whether to use the entire disk or file-based encryption . The first offers a higher level of security, but , as noted Tech Republic is heavier. Based approaches files are easier to use, but rely on the user to implement . Even if he or she does, sensitive data may be out of place in non- encrypted drives . Another decision is whether to use encryption for free or commercial . The free versions can be open source or a utility that comes with the operating system . A sidebar suggests beginning with complementary approaches until proven insufficient and laptop encryption creating a plan of implementation.
This piece was published in Alert Boot tells the story of the disappearance of a laptop in an office healthcare in eastern Hemp field Township, Pennsylvania. laptop encryption The machine file database and apparently was used to scan documents into the system. The person who does the work , apparently left the room for a moment and stole the machine.laptop encryption
The point of the story is that the full disk encryption is vulnerable if the machine is running when taken and the thief goes to work before turning it off . This problem is eliminated if the machine also has a level encryption of files - assuming , of course, that the file opens with sensitive data when taking the machine. This shows the limits of encryption - and suggests that more than one method to fix a really needed machine |
|