Of all computing devices, laptops are the most resistant to the spread of danger. Laptops are often lost or stolen. And not only is it a mobile computer that is not cheap in itself but in many cases, knowledge is stored on its hardware.
The cost of the drive is much higher than the device itself.
Therefore, the fashion market is not lacking in solutions aimed at ensuring
the security of both the laptop itself and the data in it.
How can I keep my laptop safe?
Device protection
Data protection Access restrictions
"Immobilizer" for laptops
In most cases, laptops are simply stolen and sold. In this case, the information contained on the disk drive may not be of interest to anyone. Whether knowledge is the purpose of theft is another matter. Experienced specialists extract large amounts of interesting information from seemingly harmless documents, letters, temporary files, and addresses.
The easiest way to prevent physical loss of your laptop is to easily tie it to a heavy object. literally. This is a versatile metal cable with a loop on one end and a latch on the other side. The latch is inserted into a hole in the computer case and is firmly secured. Without a special key, or if the key code is unknown, the high-strength alloy will cause the attacker to fail without a metal cutting tool.
If it is not possible to physically bind the laptop, a motion sensor such as the DEFCON MDP created in PC Card format can help. The device not only beeps at 110 dB when you try to move your PC but also immediately begins encrypting (or deleting based on your settings) knowledge on your disk drive.
Devices like Targus Defcon 3 are designed to protect your laptop on the move. The operating principle is simple. The alarm sounds when the laptop bag is more than a certain distance away from the transmitter in the owner's pocket.
However, you don't have to steal it because you need to own the knowledge stored on your mobile computer. do you
You can access it.
Data protection
Many solutions have been developed to limit access to data to prevent strangers from reading, copying, or modifying the information stored on your laptop. The main and easiest way is to lock the BIOS. This does not allow other systems to be allowed without entering the password. This tool is useful if the user does not leave the laptop turned on. As a result, the attacker does not have time to open the case to reset the BIOS chip or remove the HDD.
The next protected line, the Windows password, is to prevent users from accidentally accessing another user's account. Windows passwords only activate the information encryption system, EFS (Encryption File System), which actually makes unauthorized access to information difficult. It is included in the Windows 2000 / XP NTFS filing system. To encrypt a folder, right-click the folder, select the Properties / General / Other context menu item, mark the Encrypt content to protect the data option, and click OK. After this operation, users who somehow bypass the Windows password (for example, booting from a floppy disk) will see a set of meaningless characters. Encryption is only intended to protect the data from being read, even if an attacker has physical access to the disk drive.
EFS shouldn't be trusted with really hard data. The widespread adoption of Windows has spawned many experts on the secrets. There are numerous applications on the Web that offer more reliable encryption and comprehensive information protection. One of the common solutions for creating "encrypted" logical drives on your laptop's hard disk is called a Strong Disk Server. The free demo version, which differs only in encryption strength reduction, allows you to quickly create and connect password-protected partitions, transfer data, and completely overwrite deleted files.
After downloading the free distribution kit, encrypt the individual files, sign them with a digital signature, and email them. Combining two asymmetric keys (open-sender and private-receiver) is imminent, if not perfect, to protect your data.
In many cases, what
is a password?
Legitimate user access to protected data is provided using a special key. The only key is a password made up of letters, numbers, and various symbols. It's very easy to use. Just type using the keyboard. However, passwords are often spied, retrieved, and eventually forgotten. For example, it is safer to use a key file written on a diskette or flash drive. Most protection programs can do that.
Not only are groups of characters often used as passwords, but certain algorithms (small secret programs) are also used. Written in an open-ended credit chip, this algorithm can be a powerful means of restricting access. For example, it has a built-in Acer notebook model. With the security policy of your choice, the Acer smart card bundled with proprietary software can activate passwords for boot, access control, or hard disk encryption.
Security systems are often organized on virtually any laptop using the USB analog of a smart card. The USB stick can store not only password systems but also security certificates and digital signatures.
The StrongDiskServer package already mentioned supports the use of such keys for user identification, just like any other advanced cryptographic system. It is enough to select an acceptable menu item in the settings.
Smart cards and USB keys are very difficult to counterfeit, but they are stolen. PIN code requests are often enabled to stop access with stolen cards. To enter it, some laptop models have a special security panel.
Such panels usually work without a smart card, for example as a BIOS password.
A simple (for the user), equivalent time, and reliable identification method are to use a fingerprint scanner. Some laptop manufacturers (IBM, ASUSTek, Samsung) have incorporated them into their models. Fingerprints act like regular passwords when the system boots or when data is encrypted. There are external devices of this type on the market, primarily with USB and PC Card interfaces. These only work after loading the OS.
Invisible threat
Recent network technology events to access information not only steal your laptop, but you don't even have to approach it. Computer viruses-Worms and Trojans steal data without the user's knowledge. Maximum protection against virus technology is often achieved by combining timely updated antivirus programs with firewalls, so-called "firewalls" (from FireWall-"firewalls"). Antivirus software seeks out and destroys malicious programs on the disk, firewalls prevent unauthorized data transfer to the network and allow this operation only for user-defined processes. Working on wireless networks poses another threat to sensitive information. A special scanner program does not track unwanted wireless connections.
Let's draw a conclusion
Modern means of protecting laptops and their data can provide a very serious level of security because they are easily accessible to the general public. Most importantly, use a solution that corresponds to your degree of data security. Never believe in just one tool and remember that the access restriction option disables replacement laptops by default.
Comments
Post a Comment