SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsAs the use and need for mobile computing grows in the global, interconnected economy, so does the need for mobile data protection. This paper illustrates how to apply a Defense-In-Depth strategy to protect laptop systems. Security topics addressed in this paper are confidentiality, integrity, availability, identity, authentication, and authorization, with specific focus given on how to achieve functional, convenient and effective security utilizing hardware and software available on the market today. This paper will review security-specific hardware and software applied to mobile computing. Several laptop manufacturers, such as Acer1, Compaq2, MPC3 and IBM4, have added security focus features to certain models. Other vendors have focused on augmenting laptop vendor's systems with hardware-based encryption engines, such as CryptCard5, and security-specific authentication and encryption software, such as SafeBoot6.