Protecting Confidential Information: How to Securely Store Sensitive Data Protecting Confidential Information: How to Securely Store Sensitive Data

Protecting Confidential Information: How to Securely Store Sensitive Data

How to Securely Store Sensitive Data

    • ¥450
    • ¥450

発行者による作品情報

Booklet for anyone who wants to know how to keep secrets on home computer, or prevent sensitive data from disclosure on office workstation. Topics include: how to break Windows and steal data from computer, pros and cons of using standard Windows data protection mechanisms, several steps to follow in order to keep information secured, using cryptographic solutions for secure storage, and more (Article: ~3,000 words).

Table of Contents includes:

Introduction
How Data is Stolen from Computers
Extensive Security Permissions
Administrators and Users
Administrative Default Network Share - "C$"
Default/Weak Password of Local Administrator Account
Windows XP Repair
Rootkits
Cached Domain Passwords
Trojans and Spyware
Social Engineering Attacks
Stolen Computer or Hard Drive
How to Prevent Confidential Data from Being Stolen
Windows Disk Encryption
Solution
Using TrueCrypt
Resources
About the Author

Slava Gomzin, CISSP, ECSP, Security+ has more than 15 years of professional experience in software development and application security. He is Security Architect at Retalix USA.

ジャンル
コンピュータ/インターネット
発売日
2012年
4月25日
言語
EN
英語
ページ数
14
ページ
発行者
Slava Gomzin
販売元
Draft2Digital, LLC
サイズ
575.7
KB
Microsoft Windows Security Essentials Microsoft Windows Security Essentials
2011年
Easy Guide to Cybersecurity & Privacy Easy Guide to Cybersecurity & Privacy
2019年
Cybersecurity for Everyone Cybersecurity for Everyone
2014年
Essential PC Security Starter Guide Essential PC Security Starter Guide
2013年
Security Fundamentals Security Fundamentals
2019年
The Pocket Guide to Cyber Security The Pocket Guide to Cyber Security
2020年
Bitcoin for Nonmathematicians Bitcoin for Nonmathematicians
2016年
Hacking Point of Sale Hacking Point of Sale
2014年
Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software
2012年
Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build
2012年
Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless
2012年
Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools
2012年