Limit this search to....

Guide to Storage Encryption Technologies for End User Devices
Contributor(s): U. S. Department of Commerce (Author)
ISBN: 1494755688     ISBN-13: 9781494755683
Publisher: Createspace Independent Publishing Platform
OUR PRICE:   $15.19  
Product Type: Paperback
Published: January 2014
Qty:
Additional Information
BISAC Categories:
- Technology & Engineering
Physical Information: 0.09" H x 8.5" W x 11.02" (0.28 lbs) 44 pages
 
Descriptions, Reviews, Etc.
Publisher Description:
In today's computing environment, there are many threats to the confidentiality of information stored on end user devices, such as personal computers, consumer devices (e.g., personal digital assistant, smart phone), and removable storage media (e.g., universal serial bus USB] flash drive, memory card, external hard drive, writeable CD or DVD). Some threats are unintentional, such as human error, while others are intentional. Intentional threats are posed by people with many different motivations, including causing mischief and disruption and committing identity theft and other fraud. A common threat against end user devices is device loss or theft. Someone with physical access to a device has many options for attempting to view or copy the information stored on the device. Another concern is insider attacks, such as an employee attempting to access sensitive information stored on another employee's device. Malware, another common threat, can give attackers unauthorized access to a device, transfer information from the device to an attacker's system, and perform other actions that jeopardize the confidentiality of the information on a device.