Aegis Padlock for business
|
|
|
- Conrad Sanders
- 10 years ago
- Views:
Transcription
1 Aegis Padlock for business Problem: Securing private information is critical for individuals and mandatory for business. Mobile users need to protect their personal information from identity theft. Businesses are mandated by federal and state law to secure personal information stored in electronic format. Securing mobile storage devices has become a primary concern for most companies. One such concern involves the implication of losing a portable hard drive containing sensitive or personal customer information. Compliance legislation like Sarbanes-Oxley, HIPAA (Health Insurance Portability and Accountability Act) and other state legislation of personal information mandates the security of mobile devices must be considered when developing compliance strategies. Compliance and portable drives California s SB 1386 mandates the notification of California residents in the event of unauthorized acquisition of their personal information that is stored in an electronic format. Personal information includes the first and last name and either a social security number; drivers license number, account number, credit or debit card number, along with the security codes, passwords or access codes that would allow access to an individual s account. Fortunately, California s SB 1386 has made allowances when this sensitive data has been encrypted; this includes data on mobile devices like the Aegis Padlock. If users are issued an Aegis Padlock for storing sensitive or personal customer data and the drive is lost or stolen, reporting the security breach is not required. Compliance and networks The exposure of personal information is not limited to portable devices. Corporate networks are also at risk of unauthorized access to this information. When a breach of security occurs, consumers will ultimately lose confidence, the company suffering damage to their reputation and financial losses. Enterprises are faced with a multitude of attacks and must make funding decisions on how best to increase their security infrastructure. Therefore, security products like the Aegis Padlock that protect access to and encrypt data on portable drive should be considered when making budget decisions. Kurt Markley, Corporate Sales Manager To request an evaluation unit please call Direct: (858) [email protected] Apricorn, Inc Kirkham Road Poway, CA Apricorn, Inc. All rights reserved. Produced in the United States
2 Solutions for securing data on portable hard drives Apricorn Aegis Padlock Apricorn s Aegis Padlock is the ultimate portable hard drive and secure storage system. The Aegis Padlock s unique design features include an easy-to-use keypad and software free design that enable access to the drive with a unique personal identification number (PIN, aka password) on virtually any USB equipped system and is compatible with virtually any operating system. Simply plug in the Aegis Padlock into any powered USB port, enter the secret PIN and access the encrypted data. The Aegis Padlock incorporates a National Institute of Standards and Technology (NIST) certified 128- bit or 256-bit AES hardware encryption algorithm. The Aegis Padlock includes a standard SATA 2.5 hard drive and is housed in an enclosure that includes the user interface, encryption circuitry, integrated USB cable and shock mounting for the hard drive. The Aegis Padlock is formatted with a single encrypted partition that provides seamless on-the-fly encryption for keeping data safe and protected even if the hard drive is removed from its enclosure. The Aegis Padlock supports up to ten users and one administrator each with a unique PIN with a minimum of 6 characters and a maximum of 16 (This feature can be customized via firmware that allows for changes on various models). Target customer The Aegis Padlock is designed for corporate, government and personal users whose data should be accessible only by the designated users or system administrator. Business users are mandated by federal and state laws to protect customer s personal information and the penalties can be very costly in actual fines as well as damage to the company s reputation as customers are notified about the breach. No software installation is required for setup or operation, providing for a simplified deployment in corporate environments. The administrator feature allows enrollment of up to ten unique user ID s and one administrator, making it a useful business collaboration tool. Most government agencies require users to store all information on at least AES 128 bit encrypted hard drives for information that is considered secret level. Personal users need a safe harbor for personal data financial records and so forth. All three types of users can now store confidential information in a password protected, hardware encrypted portable storage device with AES 128 bit or 256 bit encryption. Only upon a successful authentication will the information become accessible. Encryption Types of Encryption There are many types of encryption and many good resources with a complete explanation of the history of cryptography. This article examines why one type of encryption may be considerer over another with respect to securing portable hard drives. If the primary objective is to have a solution that is seamless, readily adopted by users and meet the mandated encryption requirements then 128 or 256 Advanced Encryption Standard (AES) is the best choice.
3 Why choose the security of Aegis Padlock? According to the Committee on National Security Systems (CNSS) Policy Number 15, Fact Sheet Number 1; The design and strength of all key lengths of the AES algorithm (i.e., 128, 192 and 256) are sufficient to protect classified information up to the SECRET level. TOP SECRET information will require use of either the 192 or 256 key lengths. As well, 128 and 256 AES is sufficient for all of local, national and International mandates for protection of personal information. Aegis Padlock Hardware Encryption The Aegis Padlock offers 128 or 256 bit AES realtime encryption with the Initio 1607 cryptographic engine which is NIST (National Institute of Standards and Technology) and CSE (Communications Security Establishment) hardware AES (Advanced Encryption Standard) certified algorithm, certificate number #1174. It also creates a secure Trusted Path between the Aegis Padlock and host computer that protects all data on the drive. An additional security feature includes the way the Aegis Padlock is recognized by the operating system. Once the USB cable is connected, the operating system sees the Aegis Padlock as a removable device in media not present state, so accessing the drive is not even possible. After PIN login is completed the device is unlocked and the operating system invokes a media inserted event. Complete security is ensured with the data stored in AES encryption; even if the drive is removed the data will be completely inaccessible. Hardware Encryption vs. Software Encryption Software solutions for hard drives have been available for some time now. They have often been criticized for being inconvenient, slow and like any other software, prone to needing updates. In contrast, hardware encryption is very reliable, fast and convenient. Since hardware encrypted drives are not subject to updates, the costs related to traditional software solutions are eliminated. Another great advantage of hardware encrypted drives, they can be easily reset. This reduces the amount of time spent scrubbing the drive or erasing disk data, which in turn stretches the IT department budgets when redeployment of assets is necessary. Why choose the Aegis Padlock? 1) Access to the Aegis Padlock is protected via a secure PIN. The Aegis Padlock drive is only recognized by the host computer once unlocked by the user s unique PIN. Up to ten different PINs can be used, making the Padlock a secure business collaboration tool. 2) The Aegis Padlock s encrypted hard drive seamlessly encrypts data in real-time with 128 or 256 bit AES encryption. The data on the drive remains impenetrable, even if removed from its enclosure, ensuring the utmost in protection for even the most sensitive files. 3) Rugged and Compact. Perfect for taking on the road, the Aegis Padlock s compact design includes an integrated USB cable and shock mounted design
4 Protecting your data against the threat of attack Protecting Against Common Threats The most common scenario involves an act of opportunity to use or resell the device after finding or stealing the hard drive. In this case the data would be completely protected regardless of the intended use. The Aegis Padlock encryption would sufficiently protect the data stored on the drive from being accessed in the event of a stolen or found drive, even if the hard drive is removed from the enclosure. Without knowledge of the unique PIN, the drive could be redeployed by resetting the drive which erases the encryption key as well as all PINs and renders the data useless and inaccessible. The biggest concern for a user would be a theft targeting the data on the drive. Without knowledge of the PIN the thief may mount a cryptographic attack to unlock and access the data on the Aegis Padlock. One approach may be to attempt to determine the encryption key used to encrypt the data. With the aid of a high speed computer and state of the art decryption tools, the thief might copy all of the raw encrypted data from the drive and attempt to decipher the encryption by trying different encryption keys until the encryption key was discovered. 128 bit AES offers a total of 3.4 x 10^38 individual keys. It is estimated that if a DES key generator were able to discover 1 DES key per second, it would take 149 thousand-billion (149 trillion) years to crack a single 128 bit AES key. The likelihood of a successfully recovering the encryption key within several years is extremely unlikely. Only an extremely motivated thief with abundant resources and time would even consider this approach. Another brute force attack might be to determine the PIN and would require a thief trying possible combination of keys to discover the correct PIN. The number of possible PINs based on a minimum length of 6 characters and a maximum of 16 would range from 6^10 to 16^10 for each PIN. Without knowledge of the PIN length the thief would have to try all possible PIN lengths as well. The Aegis Padlock is designed to allow 6 PIN attempts before blocking additional attempts. Once the Aegis Padlock shuts down the user will need to unplug the drive by removing power, then plug in the drive again to have 6 more attempts. Once the total number of unsuccessful attempts reaches 50 the drive will lock and require a special PIN to allow another 50 attempts. When the total number of unsuccessful attempts reaches 100 the drive will lock and require a complete reset. The reset will also reset the encryption key making any data on the drive un accessible. Given the possible number of PIN combinations and built-in brute force protection a successful brute force attack via any method is extremely unlikely. However, social engineering of the owner of the drive (to get the PIN) would be the easiest way to discover the PIN. This would involve an attacker deceiving the user into revealing the PIN or the attacker finds the PIN written somewhere. Also, an attacker could just observe the user entering the PIN as they access the device. Additionally, common PINs such as phone numbers, address, names, etc. would be considered
5 by a motivated attacker. Electronic bugging of the target s home and office could also provide the PIN needed to access the device. Depending on the value of the data and motivation of the attacker, they may just choose to bypass the Padlock altogether and introduce malware into the target s PC as a way of acquiring sensitive data. There are many ways a motivated attacker may succeed against a targeted victim and many of them do not require a cryptographic attack. Using Secure Password Policies The device owner is the device administrator. He controls the PIN administration for the device for the administrator PIN as well as other users of the device. In a corporate environment, it is the owner s responsibility to follow company protocols for handling password administration including password length and password storage. However, all of the PINs stored on the device will be completely protected and may only be deleted or replaced with a new PIN if the PIN is lost or forgotten. For personal use it is important to follow some best practices when it comes to passwords. Don t share pass codes Exercise caution when entering the pass code Change the pass code regularly Don t use common pass codes names / birthdates Save the pass code in secure place Key Generation/Management Figure 1 illustrates the block diagram of the construction of the Aegis Padlock. The encryption chip encrypts and decrypts the data based on a 128-bit or 256-bit AES key. This AES key is only accessible by the encryption chip and not accessible by the user. The user would need to login with the correct PIN, using the keypad, before the drive is unlocked and recognized by the host system. At this point the encryption chip begins the encrypting and decrypting operations allowing access to the hard drive. The Apricorn Aegis Padlock handles authentication without sending any data to the computer. Once the correct PIN is entered in the keypad, the microcontroller allows access to the drive. Since the PIN is never sent to the computer, it is not possible for software on the computer to intercept the PIN Summary The Apricorn Aegis Padlock is the ideal solution for corporate, government and personal users whose data should be accessible only by the designated users or system administrator. The Aegis Padlock s low powered design is perfect for taking your data on the road. This ultimate secure hard drive features a compact robust design and a 16-point omni-directional shock mounting system, protecting the drive from drops and knocks. The convenient integrated USB cable eliminates the need to carry around cables and allows connection at the flick of a fingertip. Whether you need to protect highly sensitive corporate documents, personal information, photos, music or video files, the Aegis Padlock is the ideal hard drive to safely transport your data. Figure 1
SecureD Technical Overview
WHITEPAPER: SecureD Technical Overview WHITEPAPER: SecureD Technical Overview CONTENTS section page 1 The Challenge to Protect Data at Rest 3 2 Hardware Data Encryption Provides Maximum Security 3 3 SecureD
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
Full Disk Encryption Drives & Management Software. The Ultimate Security Solution For Data At Rest
Full Disk Encryption Drives & Management Software The Ultimate Security Solution For Data At Rest Agenda Introduction Information Security Challenges Dell Simplifies Security Trusted Drive Technology Seagate
GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey
GoldKey Product Info Detailed Product Catalogue for GoldKey Do not leave your Information Assets at risk Read On... GoldKey: Reinventing the Security Strategy The Changing Landscape of Data Security With
www.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon
Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Secure Windows and Mac login by USB key www.rohos.com Rohos Logon Key Secure two-factor
Innovative Secure Boot System (SBS) with a smartcard.
Managed Security Services Desktop Security Services Secure Notebook Desktop Security Services. Secure Notebook. Today s business environment demands mobility, and the notebook computer has become an indispensable
Table of Contents. What is Brute Force Attack? 13 How does the diskashur protect against brute force attack? 13
User s Manual Table of Contents About the istorage diskashur Secure Hard Drive 4 Package contents 4 istorage diskashur button panel 5 istorage diskashur - Getting Started 6 Before you begin 6 Connecting
Firmware security features in HP Compaq business notebooks
HP ProtectTools Firmware security features in HP Compaq business notebooks Embedded security overview... 2 Basics of protection... 2 Protecting against unauthorized access user authentication... 3 Pre-boot
Kaspersky Lab s Full Disk Encryption Technology
Kaspersky Lab s Full Disk Encryption Technology In the US alone, an estimated 12,000 laptops are lost or stolen each week. According to the Ponemon Institute, a laptop is stolen every 53 seconds; more
Recommended Approach to Encrypting GNL Files
Recommended Approach to Encrypting GNL Files 1 2 The Needs Identify a method to securely transport and store personal and/or confidential government information, which is readily accessible to government
ACER ProShield. Table of Contents
ACER ProShield Table of Contents Revision History... 3 Legal Notices... 4 Executive Summary... 5 Introduction... 5 Protection against unauthorized access... 6 Why ACER ProShield... 7 ACER ProShield...
Functional diagram: Secure encrypted data. totally encrypted. XOR encryption. RFID token. fingerprint reader. 128 bit AES in ECB mode Security HDD
Secure encrypted data Encryption Access Control XOR encryption RFID token 128 bit AES in ECB mode Security HDD fingerprint reader enter password by keyboard 256 bit AES in CBC mode 1-2-3-4-5-6-7-8 PIN
Digital Signatures on iqmis User Access Request Form
Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
Verbatim Secure Data USB Drive. User Guide. User Guide Version 2.0 All rights reserved
Verbatim Secure Data USB Drive User Guide User Guide Version 2.0 All rights reserved Table of Contents Table of Contents... 2 1. Introduction to Verbatim Secure Data USB Drive... 3 2. System Requirements...
Pointsec Enterprise Encryption and Access Control for Laptops and Workstations
Pointsec Enterprise Encryption and Access Control for Laptops and Workstations Overview of PC Security Since computer security has become increasingly important, almost all of the focus has been on securing
Navigating Endpoint Encryption Technologies
Navigating Endpoint Encryption Technologies Whitepaper November 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS
The virtual safe: A user-focused approach to data encryption
The virtual safe: A user-focused approach to data encryption Steganos GmbH, 2008 1 The hard disk: a snapshot of our lives The personal computer has never been more personal. We routinely trust it with
GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.
GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...
Security Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
Full Drive Encryption Security Problem Definition - Encryption Engine
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles
Enova X-Wall LX Frequently Asked Questions
Enova X-Wall LX Frequently Asked Questions Q: What is X-Wall LX? A: X-Wall LX is the third generation of Enova real-time hard drive cryptographic gateway ASIC (Application Specific Integrated Circuit)
Using End User Device Encryption to Protect Sensitive Information
Using End User Device Encryption to Protect Sensitive Information April 29, 2015 Mel Jackob, CISSP, GSEC, eplace Solutions, Inc. William Ewy, CIPP/US, eplace Solutions, Inc. William Ewy, BSEE, CIPP/US
FACT SHEET: Ransomware and HIPAA
FACT SHEET: Ransomware and HIPAA A recent U.S. Government interagency report indicates that, on average, there have been 4,000 daily ransomware attacks since early 2016 (a 300% increase over the 1,000
RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief
RSA Encryption and Key Management Suite The threat of experiencing a data breach has never been greater. According to the Identity Theft Resource Center, since the beginning of 2008, the personal information
FLASH USB 2. 0. Introduction ENGLISH
ENGLISH FLASH RED LED (LOCKED) GREEN LED (UNLOCKED) KEY BUTTON PIN KEYS BLUE LED (ACTIVITY) Introduction Thank you for purchasing the Corsair Your new Flash Padlock 2 is a 256-bit hardware encrypted USB
USER MANUAL DataLocker Enterprise
USER MANUAL DataLocker Enterprise ------------------------ March 2014 ------------------------ 1 Contents At a Glance Advanced 3 Introduction 17 Special features 5 About the Enterprise 19 Master admin
Guidelines on use of encryption to protect person identifiable and sensitive information
Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted
Smart TPM. User's Manual. Rev. 1001 12MD-STPM-1001R
Smart TPM User's Manual Rev. 1001 12MD-STPM-1001R We recommend that you download the latest version of the Smart TPM utility from GIGABYTE's website. If you have installed Ultra TPM earlier, you can install
Table of Contents. TPM Configuration Procedure... 2. 1. Configuring the System BIOS... 2
Table of Contents TPM Configuration Procedure... 2 1. Configuring the System BIOS... 2 2. Installing the Infineon TPM Driver and the GIGABYTE Ultra TPM Utility... 3 3. Initializing the TPM Chip... 4 3.1.
Are your multi-function printers a security risk? Here are five key strategies for safeguarding your data
Are your multi-function printers a security risk? Here are five key strategies for safeguarding your data Printer Security Challenges Executive Summary Security breaches can damage both your operations
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
TPM. (Trusted Platform Module) Installation Guide V3.3.0. for Windows Vista
TPM (Trusted Platform Module) Installation Guide V3.3.0 for Windows Vista Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM...
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models
A Cyphertite White Paper February, 2013 Cloud-Based Backup Storage Threat Models PG. 1 Definition of Terms Secrets Passphrase: The secrets passphrase is the passphrase used to decrypt the 2 encrypted 256-bit
Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer
Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer The Data Breach Epidemic Continues.. 1 Data Encryption Choices for Businesses................... 2 The Hardware
CONTENT SECURITY KRAMER S APPROACH TO SECURING DATA WITHIN WIRELESS TRANSMISSION KRAMER WHITE PAPER WWW.KRAMERUS.COM
CONTENT SECURITY KRAMER S APPROACH TO SECURING DATA WITHIN WIRELESS TRANSMISSION KRAMER WHITE PAPER WWW.KRAMERUS.COM Executive Summary There has been a fundamental shift in how people collaborate in today
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices
10 steps to better secure your Mac laptop from physical data theft
10 steps to better secure your Mac laptop from physical data theft Executive summary: This paper describes changes Mac users can make to improve the physical security of their laptops, discussing the context
eztechdirect Backup Service Features
eztechdirect Backup Service Features Introduction Portable media is quickly becoming an outdated and expensive method for safeguarding important data, so it is essential to secure critical business assets
Don't Be The Next Data Loss Story
Don't Be The Next Data Loss Story Data Breaches Don t Discriminate DuPont scientist downloaded 22,000 sensitive documents as he got ready to take a job with a competitor Royal London Mutual Insurance Society
How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization
How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization Alertsec offers Cloud Managed - Policy Controlled - Security Modules for Ensuring Compliance at the Endpoints Contents
PENN. Social Sciences Computing a division of SAS Computing. SAS Computing SSC. File Security. John Marcotte Director of SSC.
Social Sciences Computing a division of File Security John Marcotte Director of February 2008 File Security Review security issues Overview of encryption Software Data Security Plan Questions Reasons for
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:
LOK-IT ENCRYPTED USB User Instructions
LOK-IT ENCRYPTED USB User Instructions LOK-IT USB Drives are supplied by the University to safely allow a method to transport data. They are not intended to be used for primary data storage. The LOK-IT
SAMPLE TEMPLATE. Massachusetts Written Information Security Plan
SAMPLE TEMPLATE Massachusetts Written Information Security Plan Developed by: Jamy B. Madeja, Esq. Erik Rexford 617-227-8410 [email protected] Each business is required by Massachusetts law
Adopt and implement privacy procedures, train employees on requirements, and designate a responsible party for adopting and following procedures
Whitesheet Navigate Your Way to Compliance The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is an American federal law that requires organizations that handle personal health information
IronKey Data Encryption Methods
IronKey Data Encryption Methods An IronKey Technical Brief November 2007 Information Depth:Technical Introduction IronKey is dedicated to building the world s most secure fl ash drives. Our dedication
Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services
Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services Introduction Patient privacy has become a major topic of concern over the past several years. With the majority of
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device
CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge
Research Information Security Guideline
Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
BANKING SECURITY and COMPLIANCE
BANKING SECURITY and COMPLIANCE Cashing In On Banking Security and Compliance With awareness of data breaches at an all-time high, banking institutions are working hard to implement policies and solutions
TPM. (Trusted Platform Module) Installation Guide V2.1
TPM (Trusted Platform Module) Installation Guide V2.1 Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM... 6 2.2 Installing
Perceptions about Self-Encrypting Drives: A Study of IT Practitioners
Perceptions about Self-Encrypting Drives: A Study of IT Practitioners Executive Summary Sponsored by Trusted Computing Group Independently conducted by Ponemon Institute LLC Publication Date: April 2011
etoken Single Sign-On 3.0
etoken Single Sign-On 3.0 Frequently Asked Questions Table of Contents 1. Why aren t passwords good enough?...2 2. What are the benefits of single sign-on (SSO) solutions?...2 3. Why is it important to
Securing Data on Portable Media. www.roxio.com
Securing Data on Portable Media www.roxio.com Contents 2 Contents 3 Introduction 4 1 The Importance of Data Security 5 2 Roxio Secure 5 Security Means Strong Encryption 6 Policy Control of Encryption 7
Remote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
2. To encrypt the drive for future use, click Yes (Fig 1, 2). This will start the encryption process.
Dell Data Protection USB Drive Encryption Introduction To further protect PC s that have access to sensitive data, the Dell Data Protection (DDP) client detects and encrypts USB/Flash drives when they
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
Samsung SED Security in Collaboration with Wave Systems
Samsung SED Security in Collaboration with Wave Systems Safeguarding sensitive data with enhanced performance, robust security, and manageability Samsung Super-speed Drive Secure sensitive data economically
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Sectra Communications ensuring security with flexibility
Panthon Sectra Communications ensuring security with flexibility Sectra has more than 30 years of experience in developing secure communications. We know what is required to meet the toughest demands.
Healthcare Compliance Solutions
Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
FAQ for USB Flash Drive
FAQ for USB Flash Drive 1. What is a USB Flash Drive? A USB Flash Drive consists of a flash memory data storage device integrated with a USB interface. USB Flash Drives are typically removable and rewritable.
A practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
BEST PRACTICES. Encryption. www.kaspersky.com
BEST PRACTICES www.kaspersky.com 2 YOUR GUIDE TO ENCRYPTION BEST PRACTICES. Data Protection. Act. Proactive data protection is a global business imperative. Kaspersky Lab can help you implement many of
Securing Data Stored On Tape With Encryption: How To Choose the Right Encryption Key Management Solution
Securing Data Stored On Tape With Encryption: How To Choose the Right Encryption Key Management Solution NOTICE This Technology Brief may contain proprietary information protected by copyright. Information
Guide how to protect your private data with Rohos Disk Encryption
Guide how to protect your private data with Rohos Disk Encryption 1 Content 1. Encrypt USB drive - Portable Application 2. Encrypt HDD 3. Hide folder 4. Have USB Key for access control 5. Rohos disk options
HP ProtectTools Embedded Security Guide
HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded
Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216
Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 2013 TeamDrive Systems GmbH Page 1 Table of Contents 1 Starting TeamDrive for Android for the First
Encrypting with BitLocker for disk volumes under Windows 7
Encrypting with BitLocker for disk volumes under Windows 7 Summary of the contents 1 Introduction 2 Hardware requirements for BitLocker Driver Encryption 3 Encrypting drive 3.1 Operating System Drive 3.1.1
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Flexible Identity. Tokenless authenticators guide. Multi-Factor Authentication. version 1.0
Flexible Identity Multi-Factor Authentication Tokenless authenticators guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services
Self-Encrypting Hard Disk Drives in the Data Center
Technology Paper Self-Encrypting Hard Disk Introduction At least 35 U.S. states now have data privacy laws that state if you encrypt data-at-rest, you don t have to report breaches of that data. U.S. Congressional
SecureLock Tool Functions:
The SecureLock utility allows users to manage the Axiom EHP Flash disk by setting passwords to the secure partition and adjust the partition size. This guide will illustrate the steps required in order
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services
Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services 1 Contents 3 Introduction 5 The HIPAA Security Rule 7 HIPAA Compliance & AcclaimVault Backup 8 AcclaimVault Security and
Solid-State Drives with Self-Encryption: Solidly Secure
Solid-State Drives with Self-Encryption: Solidly Secure 09/22/2011 Michael Willett Storage Security Strategist SAMSUNG SOLID STATE DRIVES Solid-State Drives SSD ADVANTAGES SOLID STATE DRIVES Save $$ on
Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services
Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services Page 2 of 8 Introduction Patient privacy has become a major topic of concern over the past several years. With the majority
