Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact email@example.com.
By: JamesBabcock Hughes (posted on October 31, 2003)
This article explores the security issues specific to traveling users, an often overlooked group for which an organization's security team must take extra care because they operate in a dangerous, changing and unpredictable environment. We will cover the special steps which should be taken with them and their computers before they sortie from the secure corporate castle out into a hostile world, the special steps when they access the home base while away, and the special steps which should be taken at the end of the trip to minimize the risk their laptops may pose to the organization should they return under the influence of the evil hacker.