US-CERT – The Risk of Using Portable Devices 3.1 3.1.21 3.7 3.7.4 3.8 3.8.5 3.8.6 3.8.7 3.8.8 Access Control Maintenance Media Protection
This paper focuses on the risks associated with simple media devices and smart media devices.
This paper focuses on the risks associated with simple media devices and smart media devices.
This video from SANS educates viewers on the positive and negative aspects of using full disk encryption for security.
In this edition of the On Call Compliance Solutions Compliance Tip of the Week, we discuss how organizations must establish terms and conditions for the use of external systems in accordance with organizational security policies and procedures. Those terms and conditions must address as a minimum, the types of applications that can be accessed on organizational systems from external systems.
This provides an outline to wireless security, including: Wireless Threats, Security Methods, Encryption, & Authentication.