Explore 1.5M+ audiobooks & ebooks free for days

From $11.99/month after trial. Cancel anytime.

Protecting Confidential Information: How to Securely Store Sensitive Data
Protecting Confidential Information: How to Securely Store Sensitive Data
Protecting Confidential Information: How to Securely Store Sensitive Data
Ebook36 pages11 minutes

Protecting Confidential Information: How to Securely Store Sensitive Data

Rating: 0 out of 5 stars

()

Read preview

About this ebook

Booklet for anyone who wants to know how to keep secrets on home computer, or prevent sensitive data from disclosure on office workstation. Topics include: how to break Windows and steal data from computer, pros and cons of using standard Windows data protection mechanisms, several steps to follow in order to keep information secured, using cryptographic solutions for secure storage, and more (Article: ~3,000 words).

Table of Contents includes:

Introduction
How Data is Stolen from Computers
Extensive Security Permissions
Administrators and Users
Administrative Default Network Share - "C$"
Default/Weak Password of Local Administrator Account
Windows XP Repair
Rootkits
Cached Domain Passwords
Trojans and Spyware
Social Engineering Attacks
Stolen Computer or Hard Drive
How to Prevent Confidential Data from Being Stolen
Windows Disk Encryption
Solution
Using TrueCrypt
Resources
About the Author

Slava Gomzin, CISSP, ECSP, Security+ has more than 15 years of professional experience in software development and application security. He is Security Architect at Retalix USA.

LanguageEnglish
PublisherSlava Gomzin
Release dateApr 26, 2012
ISBN9781476432601
Protecting Confidential Information: How to Securely Store Sensitive Data
Author

Slava Gomzin

Slava Gomzin is an information security enthusiast and full-stack technologist. He is the author of multiple publications on information security and technology including books "Hacking Point of Sale" (Wiley, 2014) and the just-published "Bitcoin for Nonmathematicians" (Universal Publishers, 2016). Slava is VP of Information Security and Technology at Pieces Technologies, an innovative start-up that deploys cutting edge technology to improve clinical and community health outcomes. Before Pieces Tech, he was Director of Information Security at Parkland Center for Clinical Innovation (PCCI), a noted scientific research and development nonprofit corporation. Prior to joining PCCI, Slava was a Security and Payments Technologist at Hewlett-Packard, where he helped create products that are integrated into modern payment processing ecosystems using the latest security technologies. Before HP, he worked in various information security and software development positions at Retalix, a Division of NCR Retail. Slava currently holds CISSP and other security certifications. He blogs about information security and technology at www.gomzin.com.

Read more from Slava Gomzin

Related to Protecting Confidential Information

Related ebooks

System Administration For You

View More

Reviews for Protecting Confidential Information

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Protecting Confidential Information - Slava Gomzin

    Protecting Confidential Information

    How to Securely Store Sensitive Data

    Cyber Privacy Series

    Slava Gomzin

    Cover Photo and Design: Alisa Levy

    Smashwords Edition

    Copyright © 2012 Slava Gomzin

    Table of Contents

    Introduction

    How Data is Stolen from Computers

    Extensive Security Permissions

    Administrators and Users

    Administrative Default Network Share - C$ 

    Default/Weak Password of Local Administrator Account

    Windows XP Repair

    Rootkits

    Remote Desktop

    Cached Domain Passwords

    Trojans and Spyware

    Social Engineering Attacks

    Stolen Computer or Hard Drive

    How to Prevent Confidential Data from Being Stolen

    Windows Disk Encryption

    Solution

    Using TrueCrypt

    Resources

    About the Author

    Introduction

    Every user is storing some kind of confidential information on computer. You may have some data that must be kept secret from strangers, other employees as well as network administrators and IT helpdesk personnel. Also, you might have information that is stored temporarily on laptops that must remain confidential even if the

    Enjoying the preview?
    Page 1 of 1