วันจันทร์ที่ 16 พฤศจิกายน พ.ศ. 2552

For Laptops, Encryption Isn't Everything - But It's a Fine Start

Although it might have something shorter - some of the points to overlap - eWEEK has published a beautiful slide show on the problems of laptop security. In this case, "nice" refers to the clarity of presentation, not the feeling that the message is likely to elicit. That message is that there are quite a few ways that a laptop can become a problem.

The way laptops are in danger are not encrypted hard drives, USB drives are not disabledwhile using equipment for personal and business tasks that users do not pay attention to security, physical security measures are not used, people stupid things, are devices, not labeled and therefore can not honorable by the rare man who finds it will be returned not enough tracing programs are used, and are not patched.

Lack of encryption is the number one on eWEEK's list. This is no accident. Encryption is a key strategy for protecting data on computers, as itmakes that data is largely inaccessible to people to find the devices or steal.

There is good news in this area. Network World reports that federal agencies have purchased 800,000 licenses encryption last year, although the federal Data at Rest (DAR) encryption program written by the General Services Administration and the Defense Department operates. The piece, says the total number of laptops the feds think they must ensure it is assumed that about 2 million, about evenly dividedbetween federally owned facilities and private companies access to public records. The story features two very interesting links to The Privacy Rights Clearinghouse - which, among other things, holds a current listing of injuries - and a list of the top 10 providers of encryption to the federal program.

On paper (or computer screen), says the idea of "full-disk encryption - as the name suggests, the encryption of all data on the computer from soup to nuts listening - are mad at. That is, for allwith the exception of some people in the IT department. A recent post Techrepublic says full-disk encryption, try using the hardware makes the instrument difficult. Full-disk encryption, the writer says, can also lead to very difficult, password management situations.

The author suggests that most people do not really need full-disk encryption. There are a lot of data on a machine, the fine will be left in the clear. The better alternative is using encrypted disk images to store sensitive data and leaveeverything else. Specifically, the authors recommend TrueCrypt, an open-source program to switch fluently between Windows, Mac OS and Linux can.

Laptop encryption is no one-size-fits-all enterprise. There are different approaches, processor and looks variables and disadvantages of each. Perhaps the most important decision is whether to use full-disk or file encryption. The former provides a higher level of security but, as mentioned by TechRepublic, morecumbersome. File-based approaches are easier to use, but rely on the user that implement them. Even if he or she is doing, sensitive data unencrypted on disk drives are installed. Another decision is whether to use free or commercial encryption. The free open-source versions may or utility that comes with the operating system. A sidebar suggests starting with free approaches until they are demonstrably inadequate, and the creation of a plan.

This piece posted at boat alert tells the story ofDisappearance of a laptop from a health insurance in East Hempfield Township, Penn. The machine has a file database, and it seems, was used to make paper documents are scanned into the system. The person who seems to work temporarily left the room and the computer was stolen.

The point of the story is that full-disk encryption is vulnerable if the machine is in operation when it is taken and the thief goes before him from work. This problem is eliminated if the machine is alsohas file-level encryption - provided of course that open a file containing confidential data if the machine is taken. Clearly, this shows the limits of encryption - and suggests that more than one approach is needed to truly secure a machine.



leather bag purse

ไม่มีความคิดเห็น:

แสดงความคิดเห็น