120 likes | 487 Views
Locking Down the Laptop Prepared by kristen bourgault Laptop Theft Portable nature of laptops Mostly stolen by coworkers Usually sold for profit rather than used for information Laptop Theft In 1999, nearly 320,000 laptops valued at $800 million were stolen. Three Phases of Security
E N D
Locking Down the Laptop Prepared by kristen bourgault
Laptop Theft • Portable nature of laptops • Mostly stolen by coworkers • Usually sold for profit rather than used for information
Laptop Theft In 1999, nearly 320,000 laptops valued at $800 million were stolen.
Three Phases of Security • Pre-theft physical security • Post-theft access control • Post-theft tracking devices
Physical Security “These devices are designed to stop the opportunistic thief: someone who is not a criminal, but seizes on the chance to get a free laptop.”
$40-$50 Similar to a bicycle lock Easy to use Easily defeated using simple tools Diminishes the portability of laptops Cable Locks Advantages Disadvantages
Alarms & Motion Detectors • Alert users when someone moves the laptop • Mobile units warn owners when laptop is moved • Cable locks with alarms • Draws attention to thieves
Access Controls • Use a combination of authentication techniques • Smartcards • Biometrics • Encryption of data on your machine
Tracking Systems • Used to quickly recover stolen laptops • Call in schedules • Once connected to Internet, your computer can be located. • Recovery rate: 90% • Slow process 2-3 months average
Adjust Your Thinking “Ultimately, it’s up to the user to prevent laptop theft. Users need to be particularly careful in public locations, such as airports, hotels and conference centers, and take appropriate steps to ensure someone doesn’t snatch their machine.”
Tips for Laptop Users • A $50 cable device is a must • Keep notebooks in bright bags to deter thieves • Authentication & file encryption for confidential information • Don’t leave your laptop unattended, even with coworkers
Locking Down the Laptop Presented by kristen bourgault Article by Paul Korzeniowski From Information Security February 2001