![Information security: federal agency efforts to encrypt sensitive information are under way, but work remains: report to congressional requesters](//coverdb.com/reviewUS/w100/719/9781234105969.jpg) |
|
Information security: federal agency efforts to encrypt sensitive information are under way, but work remains: report to congressional requesters
United States. Government
Paperback. Books LLC, Reference Series 2011-09-29.
ISBN 9781234105969
|
|
|
Buy from Amazon.com
|
Publisher description
Original publisher: [Washington, D.C.] : U.S. Govt. Accountability Office, [2008] OCLC Number: (OCoLC)319533941 Subject: Administrative agencies -- Data processing -- Security measures -- United States -- Evaluation. Excerpt: ... For example, one product that encrypts a laptop's hard drive may not provide any protection for files copied to portable media, attached to an e-mail, or transmitted over a network. Agencies have several options available when selecting an encryption Encryption Technologies technology for protecting stored data. According to NIST guidance on to Protect Stored 11 encrypting stored information, these include full disk, hardware-based, Information Are Available file, folder, or virtual disk encryption. Through the use of these technologies, encryption can be applied granularly, to an individual file that contains sensitive information, or broadly, by encrypting an entire hard drive. The appropriate encryption technology for a particular situation depends primarily on the type of storage, the amount of information that needs to be protected, and the threats that need to be mitigated. Storage encryption technologies require users to authenticate successfully before accessing the information that has been encrypted. The combination of encryption and authentication controls access to the stored information. Full disk encryption software encrypts all data on the hard drive used to Full Disk Encryption boot a computer, including the computer's operating system, and permits access to the data only after successful authentication to the full disk encryption software. The majority of current full disk encryption products are implemented entirely within a software application. The software encrypts all information stored on the hard drive and installs a special environment to authenticate the user and begin decrypting the drive. Users enter their user identification and password before decrypting and starting the operating system. Once a user auth
More books by United States. Government
Similar booksMicrosoft Windows File System Technology, Including: Drive Letter Assignment, Encrypting File System, Xcopy, Chkdsk, Scandisk, Long Filename, Subst, 32-Bit Disk Access, Logical Disk Manager, 32-Bit File Access, Readyboost, Microsoft Reserved PartitionPaperback 2024
Rate the book
Write a review and share your opinion with others. Try to focus on the content of the book. Read our instructions for further information.
Information security: federal agency efforts to encrypt sensitive information are under way, but work remains: report to congressional requesters
Book reviews » Information security: federal agency efforts to encrypt sensitive information are under way, but work remains: report to congressional requesters
|
|
![Information security: federal agency efforts to encrypt sensitive information are under way, but work remains: report to congressional requesters](/images/background.gif) |
![Information security: federal agency efforts to encrypt sensitive information are under way, but work remains: report to congressional requesters](/images/background.gif) |
|
|
|