The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May/June (2008 vol.12)
pp: 90-93
Stephen Farrell , Trinity College Dublin
ABSTRACT
Data loss or leakage occurs in many organizations, frequently with significant impacts, both in terms of incident-handling costs and of damage to the organization's reputation. The author briefly considers some recent incidents, describes some practical mitigation steps, and looks at how to plan, in advance, for handling such events.
INDEX TERMS
data-loss, disk-encryption, security
CITATION
Stephen Farrell, "Portable Storage and Data Loss", IEEE Internet Computing, vol.12, no. 3, pp. 90-93, May/June 2008, doi:10.1109/MIC.2008.60
REFERENCES
1. Administrative Investigation Loss of VA Information —VA Medical Center Birmingham, AL, report no. 07-01083-157, VA Office of Inspector General, June 2007; www.va.gov/oig/51/FY2007rptsVAOIG-07-01083-157.pdf .
2. S. Engleman et al., "You've Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings," Proc. Human-Computer Interaction (CHI 08), 2008; www.guanotronic.com/~sergechi1210-egelman.pdf .
3. A. Narayanan and V. Shmatikov, "How To Break Anonymity of the Netflix Prize Dataset," Oct. 2006, http://arxiv.org/abs/cs0610105v2.
4. "Payment Card Industry Data Security Standard," version 1.1, Sept. 2006; www.pcisecuritystandards.org/pdfspci_dss_v1-1.pdf .
5. "Specification for the Advanced Encryption Standard (AES)," Federal Information Processing Standards Publication 197, 26 Nov. 2001; www.csrc.nist.gov/publications/fips/fips197 fips-197.pdf.
6. T. Matsumoto et al., "Impact of Artificial 'Gummy' Fingers on Fingerprint Systems," Proc. Optical Security and Counterfeit Deterrence Techniques IV Conf., Soc. of Photo-Optical Instrumentation Engineers, vol. 4677, 2002, pp. 275–289; www.lfca.netFingerprint-System-Security-Issues.pdf .
7. User's Guide to Securing External Devices for Telework and Remote Access, NIST special publication 800-114, Nov. 2007; http://csrc.nist.gov/publications/nistpubs/ 800-114SP800-114.pdf.
8. Computer Security Incident Handling Guide, NIST special publication 800-61, revision 1, Mar. 2008; http://csrc.nist.gov/publications/nistpubs/ 800-61-rev1SP800-61rev1.pdf.
9. "Safeguarding Against and Responding to the Breach of Personally Identifiable Information," US Office of Management and Budget (OMB) memorandum M-07-16, May 2007; www.whitehouse.gov/omb/memoranda/fy2007m07-16.pdf .
28 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool