Laptop Security

50 %
50 %
Information about Laptop Security

Published on August 28, 2007

Author: WoodRock


Who Moved My Laptop?Securing Confidential School Data:  Who Moved My Laptop? Securing Confidential School Data Dennis Fazio Director, Technical Services © 2006 TIES December 2006 Slide2:  The Numbers The Sobering Stats:  The Sobering Stats More than 600,000 laptop thefts in 2003 totaling $720 million in losses (Safeware Insurance) Chances 1 in 10 that a laptop will be stolen (Gartner Group) 97% of computers never recovered (FBI) 3/4 of companies do not have specific security policies for their laptop computers (Gartner) Approximately 80% of laptop thefts are internal or lost on company property (Gartner) The Sobering Stats:  The Sobering Stats 4 in 5 US firms have lost one or more laptops containing sensitive data in the last year (2006 Ponemon Institute study) 57% of computer crimes were linked to stolen computers that were then used to break into computer servers later on (FBI 1999) A laptop theft results in an average loss of $89,000 (FBI and CSI 2002) 2,900 laptops, 1,300 PDA's and over 62,000 mobile phones have been left in London's licensed taxi cabs (2001) Loss Analysis:  Loss Analysis Horror Stories:  Horror Stories Sep 2000 Irwin Jacobs, Qualcomm CEO, personal laptop. Speakers podium. Nov 2003/Jun 2004 UCLA. 145,000 blood donors. Locked van. Password-protected, not encrypted. Jun 2004 UCLA. 62,000 patients. Financial office/Health Care division. More Horror Stories:  Mar 2005 UC Berkeley. 98,369 alumni andamp; grad students. College office. Mar 2006 Ernst andamp; Young. personal info from 243,000 Sun, Cisco, IBM, BP, Nokia employees. More Horror Stories Apr 2006 San Francisco cafe 1 stabbing injury, 1 PowerBook gone Even More Horror Stories:  Even More Horror Stories May 2006
 US Dept Veterans Affairs. 26.5 million veterans. Residence. Later recovered. Policy violation. Jul 2006 US Navy. 31,000 Naval personnel. 2 laptops from NJ recruitment office. Aug 2006
 US Dept Transportation. 133,000 Florida residents. Parked Govt vehicle theft. The Last Horror Stories:  The Last Horror Stories Nov 2006 LogicaCMG payroll firm. 15,000 London police. Office theft. Nov 2006 Kaiser Permanente Colorado. 38,000 members health information. Employee car. Dec 2005 Marc Anthony, latin crooner. Thief demanding $1 million ransom. Jennifer Lopez Another Traveler's Alert:  Another Traveler's Alert Under U.S. law, government agents may, without warrants, seize and search a person's laptop computer, computer discs, and other electronic media when that person arrives in the U.S. from abroad or departs from the U.S for a foreign country. Customs or border officials can confiscate laptops for days, weeks or indefinitely. Slide11:  Policies Data Diaspora:  Data Diaspora Why would sensitive data ever need to be on portable computers? Keep sensitive data only on secure centralized servers. Ubiquitous broadband connections and secure web-based software make it unnecessary in most cases. But it's often much faster to download data and do the reports offline. There are powerful forces working against data centralization. That data is already out there. Policy Heirarchy:  Policy Heirarchy No sensitive data to be stored on any computer or PDA outside the building All logins must have strong passwords Boot function must be password protected Any data on portable devices must be encrypted at all times Slide14:  Physical Security Danger Areas:  Danger Areas Airports Hotels Conference Centers Rental cars Automobiles Colleges Libraries Hospitals or, on the street where you live… Improvised Security:  Improvised Security More Professional Security:  More Professional Security Alternatives:  Alternatives Slide19:  Boot Protection BIOS Password - Windows:  BIOS Password - Windows Prevents system boot Can be bypassed various ways Open Firmware Password - Mac OSX:  Open Firmware Password - Mac OSX Prevents boot from any device Can be disabled with internal physical access Slide22:  Encryption Full Disk Encryption:  Full Disk Encryption Hardware-based AES encryption Trusted read/write commands Secure partitions to store keys or biometric data DriveTrust Microsoft EFS:  Microsoft EFS Encrypting File System (EFS) Microsoft EFS:  Microsoft EFS Encrypting File System (EFS) with Default Recovery Agent (DRA) Microsoft Private Folder:  Microsoft Private Folder Private Folder 1.0 Mac OS X File Vault:  Mac OS X File Vault Security Preferences Panel Mac OS X Encrypted Disk Images:  Mac OS X Encrypted Disk Images Slide29:  Recovery (ET phone home) Tagging:  Tagging Anodized aluminum plate with cyanoacrylate adhesive Chemically etched tatoo Stealth Tracking:  Stealth Tracking Embedded into firmware Windows and Mac OS X $50 annual fee Process: 1. File police report and notify Recovery Team 2. When computer contacts monitoring center, Recovery Team works with ISP and local police 3. Location inferred from IP address. Remote shutdown and file delete with other advanced corporate products Slide32:  'Identity Theft' Identity Theft as an Oxymoron:  Identity Theft as an Oxymoron Identity is not a possession that can be acquired or lost. An identity is not stolen; the real crime is fraud Identity information is being misused to commit fraudulent transactions Cost now borne by the victim, not the financial institution There is no incentive for the industry to seriously address this fraud Slide34:  651-999-6201 Dennis Fazio Per altro informazione: A Telemillenium Production In association with Cyberevolutionary Studios All Rights Reserved MMVI

Add a comment

Related presentations

Related pages

Laptop Security / Laptop Theft

Laptop Security is critical with today's rising laptop theft problem. We offer laptop security cable locks, notebook cable locks, laptop lockdown brackets ...
Read more

Laptop Security | OnGuard Online -

The Dos Treat your laptop like cash. If you had a wad of money sitting out in a public place, would you turn your back on it — even for just a minute?
Read more

10 Laptop Security Products |

Safeguard your laptop from theft with these tools, including a notebook lock, privacy screen, or security alarm.
Read more laptop security

Product Description... The Doberman Security Laptop Defender is a motion sensor alarm that ...
Read more

Laptop Security, Part One: Preventing Laptop Theft ...

Laptop Security, Part One: Preventing Laptop Theft by Josh Ryder last updated July 30, 2001. Laptops have become a valuable part of the computing arsenal.
Read more

10 Laptop Security Products - Slide 1 - Slideshow from ...

1. Belkin F5L013 USB Laptop Security Alarm Any culprit will get an "alarming" surprise if he attempts to touch your laptop with Belkin's F5L013 USB Laptop ...
Read more

Laptop Locks, Theft Deterrence - Computer Security Products

Computer Security Products is the leading provider of Computer, laptop, and notebook locks. Find the right security devices to prevent theft in your office ...
Read more

10 steps you can take to secure a laptop | TechRadar

Travelling with a laptop can represent a significant security risk to your business. This is because the data it contains is far more vulnerable when you ...
Read more

Security Laptop cyber-top

Das Laptop cyber-top ermöglicht Ihnen die sichere Anbindung mobiler Mitarbeiter an Ihr Netzwerk. Dazu erzeugt es zuverlässig verschlüsselte VPN ...
Read more

Laptop Security | Laptop Lock | Security Cable ...

Keep your laptop secure with Kensington. From a laptop lock to security cables, we offer a wide selection of products to keep your devices safe
Read more