keeping laptops secure n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Keeping Laptops Secure PowerPoint Presentation
Download Presentation
Keeping Laptops Secure

Loading in 2 Seconds...

play fullscreen
1 / 11

Keeping Laptops Secure - PowerPoint PPT Presentation


  • 283 Views
  • Uploaded on

Keeping Laptops Secure. Defense Team:. Mike Delahunty Bryan Lutz Kimberly Peng Kevin Kazmierski John Thykattil. Agenda. Four cornerstones of secure computing as they relate to laptop security Confidentiality Authenticity Integrity Availability. Confidentiality Problems.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Keeping Laptops Secure' - andrew


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
keeping laptops secure

Keeping Laptops Secure

Defense Team:

Mike Delahunty

Bryan Lutz

Kimberly Peng

Kevin Kazmierski

John Thykattil

agenda
Agenda
  • Four cornerstones of secure computing as they relate to laptop security
    • Confidentiality
    • Authenticity
    • Integrity
    • Availability
slide3

Confidentiality Problems

Over 600,000 laptop thefts occurred in 2004, totaling an estimated $720 million in hardware losses and $5.4 billion in theft of proprietary information. -- Safeware Insurance, 2004

confidentiality problems
Confidentiality Problems
  • Intellectual Property – data is easily accessible to competitors
  • Brand/Company Impact – damaging information can be found on laptops that can tarnish the brand or company
  • Public Policy – fines from regulatory agencies or government; FERPA, HIPAA, California Senate Bill 1386, Sarbanes-Oxley & Title One
confidentiality problems cont
Confidentiality Problems Cont.
  • High Costs – direct costs from above as well as peripheral expenses due to legal fees, free credit monitoring for customers and loss of customer/investor trust
  • Portable Memory – e.g. reliance on USB memory sticks to transfer data; devices are easy to lose due to size
  • 60% of data breaches are due to loss of mobile devices1
authenticity problems
Authenticity Problems
  • Cracking Security:
    • Strong password requirements are often not mandated. In these cases, brute force entry does not take a tremendous effort.
    • Well known accounts often remain enabled, providing an easy target.
  • Circumventing Security:
    • Booting an Operating System off of USB devices or optical media is another way to circumvent security.
    • Unknowingly or mistakenly connecting to a network run by a hacker can provide access to data.
integrity problems
Integrity Problems
  • Many laptop users have Administrator privileges
    • Able to install unauthorized programs, both intentionally and unintentionally
      • Viruses, spyware, and other malware can install automatically using the user’s elevated privileges
      • Unauthorized installed applications can lead to system instability or conflicts with approved application
      • May accidentally uninstall necessary programs or delete important system files
  • Causes more administrative overhead for IT staff
integrity problems cont
Integrity Problems Cont.
  • Expired Antivirus Definitions
    • Exposes laptop to newer viruses
      • Wide range of damage depending on virus
  • Insecure Networks
    • Laptop user may connect to insecure networks (wired or wireless)
      • Snooping or intercepting of data can occur
      • Company IP can be lost
      • Laptop more exposed to hacker threats
slide9

Availability Problems

  • Availability - The ability to use the information or resource desired
  • For laptops, a loss of available information is loss of data
    • Hardware damage
    • Software corruption
  • Loss of data for laptops *
    • 44% - Hardware Malfunction
    • 32% - User Error
    • 14% - Software Corruption
    • 7% - Computer Viruses
    • 3% - Natural Disasters

* Data provided by “Disc Data Recovery”, http://www.diskdatarecovery.net

slide10

Availability Problems

44% - Hardware Malfunction

  • Availability - The ability to use the information or resource desired
  • For laptops, a loss of available information is loss of data
    • Hardware damage
    • Software corruption
  • Loss of data for laptops *
    • 44% - Hardware Malfunction
    • 32% - User Error
    • 14% - Software Corruption
    • 7% - Computer Viruses
    • 3% - Natural Disasters

* Data provided by “Disc Data Recovery”, http://www.diskdatarecovery.net

  • “head crash”
    • Read-write head touches the rotating platter
    • Platters spin 5,000 to 15,000 RPMs / second
      • A touching head is the equivalent of a 72 mph crash
  • “The click of death”
    • Clicking sound in disk storage systems that signals the device has failed, often catastrophically
    • IBM’s 75GXP harddrives were known for this ($2B loss)
  • Harddrive manufactures claim a 1% failure rate
  • Carnegie-Mellon research suggests 2-4%
    • Under some conditions: 13%

44% - Hardware Malfunction