Abstract :
With the proliferation of removable media devices, such as iPods and USB drives, large amounts of an organization´s sensitive data can easily be removed. The author explores the complexities of protecting networks against removable media, including guidelines for purchasing encryption software. This article examines how to develop portable and removable media security policies, as well as how encryption can assist in authenticating, authorizing, and auditing removable media devices.
Keywords :
authorisation; cryptography; storage media; USB drives; authorization; encryption software purchase guidelines; iPod; network protection; portable media devices; removable media devices; security considerations; Best practices; Computer networks; Computer security; Cryptography; Data privacy; Data security; Information security; Portable computers; Protection; Universal Serial Bus; PDA; encryption; network security; portable devices;