Protecting Confidential Information: How to Securely Store Sensitive Data
By Slava Gomzin
()
About this ebook
Booklet for anyone who wants to know how to keep secrets on home computer, or prevent sensitive data from disclosure on office workstation. Topics include: how to break Windows and steal data from computer, pros and cons of using standard Windows data protection mechanisms, several steps to follow in order to keep information secured, using cryptographic solutions for secure storage, and more (Article: ~3,000 words).
Table of Contents includes:
Introduction
How Data is Stolen from Computers
Extensive Security Permissions
Administrators and Users
Administrative Default Network Share - "C$"
Default/Weak Password of Local Administrator Account
Windows XP Repair
Rootkits
Cached Domain Passwords
Trojans and Spyware
Social Engineering Attacks
Stolen Computer or Hard Drive
How to Prevent Confidential Data from Being Stolen
Windows Disk Encryption
Solution
Using TrueCrypt
Resources
About the Author
Slava Gomzin, CISSP, ECSP, Security+ has more than 15 years of professional experience in software development and application security. He is Security Architect at Retalix USA.
Slava Gomzin
Slava Gomzin is an information security enthusiast and full-stack technologist. He is the author of multiple publications on information security and technology including books "Hacking Point of Sale" (Wiley, 2014) and the just-published "Bitcoin for Nonmathematicians" (Universal Publishers, 2016). Slava is VP of Information Security and Technology at Pieces Technologies, an innovative start-up that deploys cutting edge technology to improve clinical and community health outcomes. Before Pieces Tech, he was Director of Information Security at Parkland Center for Clinical Innovation (PCCI), a noted scientific research and development nonprofit corporation. Prior to joining PCCI, Slava was a Security and Payments Technologist at Hewlett-Packard, where he helped create products that are integrated into modern payment processing ecosystems using the latest security technologies. Before HP, he worked in various information security and software development positions at Retalix, a Division of NCR Retail. Slava currently holds CISSP and other security certifications. He blogs about information security and technology at www.gomzin.com.
Read more from Slava Gomzin
Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless Rating: 0 out of 5 stars0 ratingsSecuring .NET Web Services with SSL: How to Protect “Data in Transit” between Client and Remote Server Rating: 0 out of 5 stars0 ratingsSecuring Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools Rating: 0 out of 5 stars0 ratingsSecuring Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build Rating: 0 out of 5 stars0 ratings
Related to Protecting Confidential Information
Related ebooks
Guide to PC Security Rating: 0 out of 5 stars0 ratingsSecuring Windows: How to Protect Your Computer Properly Rating: 0 out of 5 stars0 ratingsWindows Security Basics: User Accounts Rating: 0 out of 5 stars0 ratingsCybersecurity Experts Rating: 0 out of 5 stars0 ratingsPrivacy Online: The Practical Privacy Guide For Anyone Rating: 0 out of 5 stars0 ratingsThe Executive's Cybersecurity Advisor: Gain Critical Business Insight in Minutes Rating: 0 out of 5 stars0 ratingsRisk and Security Management: Protecting People and Sites Worldwide Rating: 0 out of 5 stars0 ratingsCybersecurity Risk Management Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsTales of Cybercrime and Other Cyber Tales Rating: 0 out of 5 stars0 ratingsFighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing Rating: 0 out of 5 stars0 ratingsEndpoint Detection and Response Essentials: Explore the landscape of hacking, defense, and deployment in EDR Rating: 0 out of 5 stars0 ratingsThe Assassin The Grey Man and The Surgeon: The Assassin The Grey Man and the Surgeon, #1 Rating: 0 out of 5 stars0 ratingsThe Secure CEO: How to Protect Your Computer Systems, Your Company, and Your Job Rating: 0 out of 5 stars0 ratingsFight Fire with Fire: Proactive Cybersecurity Strategies for Today's Leaders Rating: 0 out of 5 stars0 ratingsProtecting Our Future, Volume 2: Educating a Cybersecurity Workforce Rating: 0 out of 5 stars0 ratingsCloud Computing… Commoditizing It: The Imperative Venture for Every Enterprise Rating: 0 out of 5 stars0 ratingsOracle Business Intelligence : The Condensed Guide to Analysis and Reporting Rating: 0 out of 5 stars0 ratingsExam Prep for:: Inventory A Contemporary Business Math For Colleges Rating: 0 out of 5 stars0 ratingsManaging the Human Factor in Information Security: How to win over staff and influence business managers Rating: 3 out of 5 stars3/5CCNA Security Study Guide: Exam 210-260 Rating: 0 out of 5 stars0 ratingsThe Effects of Cybercrime in the U.S. and Abroad Rating: 0 out of 5 stars0 ratingsCYBERDEFENSE: Domain Name Systems as the Next Public Utility Rating: 5 out of 5 stars5/5Learning AirWatch Rating: 5 out of 5 stars5/5Cyber Forensics: From Data to Digital Evidence Rating: 0 out of 5 stars0 ratingsCybersecurity: Issues of Today, a Path for Tomorrow Rating: 0 out of 5 stars0 ratingsMicrosoft Exchange Server 2013 - Sizing, Designing and Configuration: A Practical Look Rating: 0 out of 5 stars0 ratingsComputer security model A Complete Guide Rating: 0 out of 5 stars0 ratingsNavigating the Dark Waters of Cybersecurity Incident Response Rating: 0 out of 5 stars0 ratings
System Administration For You
Learn PowerShell in a Month of Lunches, Fourth Edition: Covers Windows, Linux, and macOS Rating: 5 out of 5 stars5/5CompTIA A+ Complete Review Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 Rating: 5 out of 5 stars5/5Linux: Learn in 24 Hours Rating: 5 out of 5 stars5/5Linux Commands By Example Rating: 5 out of 5 stars5/5Linux Bible Rating: 0 out of 5 stars0 ratingsCompTIA A+ Complete Practice Tests: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 Rating: 0 out of 5 stars0 ratingsCybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Linux for Beginners: Linux Command Line, Linux Programming and Linux Operating System Rating: 4 out of 5 stars4/5Wordpress 2023 A Beginners Guide : Design Your Own Website With WordPress 2023 Rating: 0 out of 5 stars0 ratingsBash Command Line Pro Tips Rating: 5 out of 5 stars5/5PowerShell: A Beginner's Guide to Windows PowerShell Rating: 4 out of 5 stars4/5Design and Build Modern Datacentres, A to Z practical guide Rating: 3 out of 5 stars3/5Digital Legacy Plan: A guide to the personal and practical elements of your digital life before you die Rating: 0 out of 5 stars0 ratingsMastering Windows 365: Deploy and Manage Cloud PCs and Windows 365 Link devices, Copilot with Intune, and Intune Suite Rating: 0 out of 5 stars0 ratingsEthical Hacking Rating: 4 out of 5 stars4/5Mastering PowerShell Scripting: From Basics to Expert Proficiency Rating: 0 out of 5 stars0 ratingsRHCSA Exam Pass: Red Hat Certified System Administrator Study Guide Rating: 0 out of 5 stars0 ratingsPowerShell: A Comprehensive Guide to Windows PowerShell Rating: 4 out of 5 stars4/5Mastering Linux Network Administration Rating: 4 out of 5 stars4/5Windows 10: The ultimate Windows 10 user guide and manual! Rating: 0 out of 5 stars0 ratingsLinux: A Comprehensive Guide to Linux Operating System and Command Line Rating: 0 out of 5 stars0 ratingse-Discovery For Dummies Rating: 0 out of 5 stars0 ratingsLinux For Beginners : From Zero To System Admin Rating: 0 out of 5 stars0 ratingsGit Essentials Rating: 4 out of 5 stars4/5
Reviews for Protecting Confidential Information
0 ratings0 reviews
Book preview
Protecting Confidential Information - Slava Gomzin
Protecting Confidential Information
How to Securely Store Sensitive Data
Cyber Privacy Series
Slava Gomzin
Cover Photo and Design: Alisa Levy
Smashwords Edition
Copyright © 2012 Slava Gomzin
Table of Contents
Introduction
How Data is Stolen from Computers
Extensive Security Permissions
Administrators and Users
Administrative Default Network Share - C$
Default/Weak Password of Local Administrator Account
Windows XP Repair
Rootkits
Remote Desktop
Cached Domain Passwords
Trojans and Spyware
Social Engineering Attacks
Stolen Computer or Hard Drive
How to Prevent Confidential Data from Being Stolen
Windows Disk Encryption
Solution
Using TrueCrypt
Resources
About the Author
Introduction
Every user is storing some kind of confidential information on computer. You may have some data that must be kept secret from strangers, other employees as well as network administrators and IT helpdesk personnel. Also, you might have information that is stored temporarily on laptops that must remain confidential even if the