1 / 12

Locking Down the Laptop

Locking Down the Laptop Prepared by kristen bourgault Laptop Theft Portable nature of laptops Mostly stolen by coworkers Usually sold for profit rather than used for information Laptop Theft In 1999, nearly 320,000 laptops valued at $800 million were stolen. Three Phases of Security

jaden
Download Presentation

Locking Down the Laptop

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Locking Down the Laptop Prepared by kristen bourgault

  2. Laptop Theft • Portable nature of laptops • Mostly stolen by coworkers • Usually sold for profit rather than used for information

  3. Laptop Theft In 1999, nearly 320,000 laptops valued at $800 million were stolen.

  4. Three Phases of Security • Pre-theft physical security • Post-theft access control • Post-theft tracking devices

  5. Physical Security “These devices are designed to stop the opportunistic thief: someone who is not a criminal, but seizes on the chance to get a free laptop.”

  6. $40-$50 Similar to a bicycle lock Easy to use Easily defeated using simple tools Diminishes the portability of laptops Cable Locks Advantages Disadvantages

  7. Alarms & Motion Detectors • Alert users when someone moves the laptop • Mobile units warn owners when laptop is moved • Cable locks with alarms • Draws attention to thieves

  8. Access Controls • Use a combination of authentication techniques • Smartcards • Biometrics • Encryption of data on your machine

  9. Tracking Systems • Used to quickly recover stolen laptops • Call in schedules • Once connected to Internet, your computer can be located. • Recovery rate: 90% • Slow process 2-3 months average

  10. Adjust Your Thinking “Ultimately, it’s up to the user to prevent laptop theft. Users need to be particularly careful in public locations, such as airports, hotels and conference centers, and take appropriate steps to ensure someone doesn’t snatch their machine.”

  11. Tips for Laptop Users • A $50 cable device is a must • Keep notebooks in bright bags to deter thieves • Authentication & file encryption for confidential information • Don’t leave your laptop unattended, even with coworkers

  12. Locking Down the Laptop Presented by kristen bourgault Article by Paul Korzeniowski From Information Security February 2001

More Related