Using Storage Encryption Technologies to Protect End User Devices | NIST
暂无分享,去创建一个
End user devices, such as personal computers, portable electronic devices, and removable storage media, are vulnerable to many threats that can endanger the confidentiality of the information stored on the devices and enable unauthorized persons to gain access to the stored information. The threats can be both unintentional, such as the loss of a portable device, and intentional, such as directed attacks that result in disruption, identity theft, and other fraud. End user devices, such as personal computers, portable electronic devices, and removable storage media, are vulnerable to many threats that can endanger the confidentiality of the information stored on the devices and enable unauthorized persons to gain access to the stored information. The threats can be both unintentional, such as the loss of a portable device, and intentional, such as directed attacks that result in disruption, identity theft, and other fraud. End user devices include: End user devices include: * personal computers-desktop or laptop; * personal computers-desktop or laptop; * consumer devices-personal digital assistants (PDAs), smart phones; and * consumer devices-personal digital assistants (PDAs), smart phones; and * removable storage media-Universal Serial Bus (USB) flash drives, memory cards, external hard drives, writeable disks (CD or DVD). * removable storage media-Universal Serial Bus (USB) flash drives, memory cards, external hard drives, writeable disks (CD or DVD). Security controls can be effectively applied to protect the sensitive information and particularly the personally identifiable information (PII) stored on end user devices. The Information Technology Laboratory of the National Institute of Standards and Technology (NIST) recently issued a new guide to help organizations secure their end user devices and deter unauthorized parties from accessing the stored information. The guide focuses on the application of encryption and authentication techniques, which are the primary security controls for restricting access to sensitive information. Security controls can be effectively applied to protect the sensitive information and particularly the personally identifiable information (PII) stored on end user devices. The Information Technology Laboratory of the National Institute of Standards and Technology (NIST) recently issued a new guide to help organizations secure their end user devices and deter unauthorized parties from accessing the stored information. The guide focuses on the application of encryption and authentication techniques, which are the primary security controls for restricting access to sensitive information. The publication addresses the basic concepts of storage encryption for end user devices, providing information that enables organizations to plan, implement, and …