Storage and data encryption

    Date25 Aug 2005
    CategoryCryptography
    9032
    Posted ByBenjamin D. Thomas
    Data security is a major concern for all CIOs. This has been addressed from access and identity controls through encrypting data in transmission through to securing data at rest, on disk or on tape.

    The difference today is that threats are more sophisticated and business practices are more dependent on IT practices that span each organisation from individuals through to the data centre. The requirements for sound information governance include company practices, as well as financial reporting standards and legal issues, such as the Data Protection Act. Penalties for poor practice can be significant, not only to the company, but also to the individuals concerned. Examples of the consequences of operational failures include fines, loss of confidence in the organisation and the brand, loss of standing with colleagues or loss of employment and, in the extreme case, corporate failure.

    You are not authorised to post comments.

    LinuxSecurity Poll

    Do you reuse passwords across multiple accounts?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    13
    radio
    [{"id":"55","title":"Yes","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"56","title":"No","votes":"0","type":"x","order":"2","pct":0,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.