Locking down the laptop
Download
1 / 12

Locking Down the Laptop - PowerPoint PPT Presentation


  • 296 Views
  • Updated On :

Locking Down the Laptop Prepared by kristen bourgault Laptop Theft Portable nature of laptops Mostly stolen by coworkers Usually sold for profit rather than used for information Laptop Theft In 1999, nearly 320,000 laptops valued at $800 million were stolen. Three Phases of Security

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Locking Down the Laptop' - jaden


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Locking down the laptop l.jpg

Locking Down the Laptop

Prepared by kristen bourgault


Laptop theft l.jpg
Laptop Theft

  • Portable nature of laptops

  • Mostly stolen by coworkers

  • Usually sold for profit rather than used for information


Laptop theft3 l.jpg

Laptop Theft

In 1999, nearly 320,000 laptops valued at $800 million

were stolen.


Three phases of security l.jpg
Three Phases of Security

  • Pre-theft physical security

  • Post-theft access control

  • Post-theft tracking devices


Physical security l.jpg

Physical Security

“These devices are designed to stop the opportunistic thief: someone who is not a criminal, but seizes on the chance to get a free laptop.”


Cable locks l.jpg

$40-$50

Similar to a bicycle lock

Easy to use

Easily defeated using simple tools

Diminishes the portability of laptops

Cable Locks

Advantages

Disadvantages


Alarms motion detectors l.jpg
Alarms & Motion Detectors

  • Alert users when someone moves the laptop

  • Mobile units warn owners when laptop is moved

  • Cable locks with alarms

  • Draws attention to thieves


Access controls l.jpg
Access Controls

  • Use a combination of authentication techniques

  • Smartcards

  • Biometrics

  • Encryption of data on your machine


Tracking systems l.jpg
Tracking Systems

  • Used to quickly recover stolen laptops

  • Call in schedules

  • Once connected to Internet, your computer can be located.

  • Recovery rate: 90%

  • Slow process 2-3 months average


Adjust your thinking l.jpg
Adjust Your Thinking

“Ultimately, it’s up to the user to prevent laptop theft. Users need to be particularly careful in public locations, such as airports, hotels and conference centers, and take appropriate steps to ensure someone doesn’t snatch their machine.”


Tips for laptop users l.jpg
Tips for Laptop Users

  • A $50 cable device is a must

  • Keep notebooks in bright bags to deter thieves

  • Authentication & file encryption for confidential information

  • Don’t leave your laptop unattended, even with coworkers


Locking down the laptop12 l.jpg

Locking Down the Laptop

Presented by kristen bourgault

Article by Paul Korzeniowski

From Information Security

February 2001


ad