Talk With an Expert

Defense-In-Depth Applied to Laptop Security: Ensuring Your Data Remains Your Data

Defense-In-Depth Applied to Laptop Security: Ensuring Your Data Remains Your Data (PDF, 1.75MB)Published: 13 Dec, 2003
Created by:
Chris Grant

As the use and need for mobile computing grows in the global, interconnected economy, so does the need for mobile data protection. This paper illustrates how to apply a Defense-In-Depth strategy to protect laptop systems. Security topics addressed in this paper are confidentiality, integrity, availability, identity, authentication, and authorization, with specific focus given on how to achieve functional, convenient and effective security utilizing hardware and software available on the market today. This paper will review security-specific hardware and software applied to mobile computing. Several laptop manufacturers, such as Acer1, Compaq2, MPC3 and IBM4, have added security focus features to certain models. Other vendors have focused on augmenting laptop vendor's systems with hardware-based encryption engines, such as CryptCard5, and security-specific authentication and encryption software, such as SafeBoot6.