Protecting Confidential Information: How to Securely Store Sensitive Data
By Slava Gomzin
()
About this ebook
Booklet for anyone who wants to know how to keep secrets on home computer, or prevent sensitive data from disclosure on office workstation. Topics include: how to break Windows and steal data from computer, pros and cons of using standard Windows data protection mechanisms, several steps to follow in order to keep information secured, using cryptographic solutions for secure storage, and more (Article: ~3,000 words).
Table of Contents includes:
Introduction
How Data is Stolen from Computers
Extensive Security Permissions
Administrators and Users
Administrative Default Network Share - "C$"
Default/Weak Password of Local Administrator Account
Windows XP Repair
Rootkits
Cached Domain Passwords
Trojans and Spyware
Social Engineering Attacks
Stolen Computer or Hard Drive
How to Prevent Confidential Data from Being Stolen
Windows Disk Encryption
Solution
Using TrueCrypt
Resources
About the Author
Slava Gomzin, CISSP, ECSP, Security+ has more than 15 years of professional experience in software development and application security. He is Security Architect at Retalix USA.
Slava Gomzin
Slava Gomzin is a Security and Payments Technologist at Hewlett-Packard, where he helps create products that are integrated into modern payment processing ecosystems using the latest security and payments technologies. Prior to joining Hewlett-Packard, Slava was a security architect, corporate product security officer, R&D and application security manager, and development team leader at Retalix, a Division of NCR Retail. As PCI ISA, he focused on security and PA-DSS, PCI DSS, and PCI P2PE compliance of POS systems, payment applications, and gateways. Before moving into security, Slava worked in R&D on design and implementation of new products including next-generation POS systems and various interfaces to payment gateways and processors. Slava currently holds CISSP, PCIP, ECSP, and Security+ certifications. He blogs about payment security at www.gomzin.com.
Read more from Slava Gomzin
Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless Rating: 0 out of 5 stars0 ratingsSecuring Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools Rating: 0 out of 5 stars0 ratingsSecuring Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build Rating: 0 out of 5 stars0 ratingsSecuring .NET Web Services with SSL: How to Protect “Data in Transit” between Client and Remote Server Rating: 0 out of 5 stars0 ratings
Related to Protecting Confidential Information
Related ebooks
PAM Mastery: IT Mastery, #10 Rating: 0 out of 5 stars0 ratingsDisk encryption A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsOSSEC Host-Based Intrusion Detection Guide Rating: 5 out of 5 stars5/5Certified Cyber Forensics Professional The Ultimate Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsPrivileged Access Management A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsEC Council Certified Incident Handler A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsCyber Security Audit A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratings#HACKED: 10 Practical Cybersecurity Tips to Help Protect Personal or Business Inform Rating: 0 out of 5 stars0 ratingsHow Cyber Security Can Protect Your Business: A guide for all stakeholders Rating: 0 out of 5 stars0 ratingsLearn All About Cyber Safety Rating: 0 out of 5 stars0 ratingsManaging Information Security Rating: 0 out of 5 stars0 ratingsSeven Deadliest Social Network Attacks Rating: 0 out of 5 stars0 ratingsBeginner's Guide for Cybercrime Investigators Rating: 5 out of 5 stars5/5Network Security A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsCybersecurity Regulations A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsCyber Forensics A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsHack Attacks Testing: How to Conduct Your Own Security Audit Rating: 0 out of 5 stars0 ratingsReverse Engineering A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsWeb Application Defender's Cookbook: Battling Hackers and Protecting Users Rating: 0 out of 5 stars0 ratingsNessus Network Auditing Rating: 0 out of 5 stars0 ratingsAdvanced Penetration Testing Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsAVIEN Malware Defense Guide for the Enterprise Rating: 0 out of 5 stars0 ratingsLearning Network Forensics Rating: 5 out of 5 stars5/5Security Log Management: Identifying Patterns in the Chaos Rating: 3 out of 5 stars3/5Ethical Hacking and Computer Securities For Beginners Rating: 4 out of 5 stars4/5Email Security Architecture A Clear and Concise Reference Rating: 0 out of 5 stars0 ratingsCyber Combat: Learn to Defend Against Cyber Attacks and Corporate Spying Rating: 0 out of 5 stars0 ratingsAdvanced Persistent Threat A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsSeven Deadliest Microsoft Attacks Rating: 0 out of 5 stars0 ratings
System Administration For You
ConfigMgr - An Administrator's Guide to Deploying Applications using PowerShell Rating: 5 out of 5 stars5/5Linux Command-Line Tips & Tricks Rating: 0 out of 5 stars0 ratingsLinux Bible Rating: 0 out of 5 stars0 ratingsLearn Windows PowerShell in a Month of Lunches Rating: 0 out of 5 stars0 ratingsLinux: Learn in 24 Hours Rating: 5 out of 5 stars5/5Learn Cisco Network Administration in a Month of Lunches Rating: 0 out of 5 stars0 ratingsMastering Microsoft Endpoint Manager Rating: 0 out of 5 stars0 ratingsPractical Data Analysis Rating: 4 out of 5 stars4/5Learn PowerShell in a Month of Lunches, Fourth Edition: Covers Windows, Linux, and macOS Rating: 0 out of 5 stars0 ratingsCompTIA A+ Complete Review Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 Rating: 5 out of 5 stars5/5Improve your skills with Google Sheets: Professional training Rating: 0 out of 5 stars0 ratingsCybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Wordpress 2023 A Beginners Guide : Design Your Own Website With WordPress 2023 Rating: 0 out of 5 stars0 ratingsLearn PowerShell Scripting in a Month of Lunches Rating: 0 out of 5 stars0 ratingsLinux Commands By Example Rating: 5 out of 5 stars5/5Web Penetration Testing with Kali Linux Rating: 5 out of 5 stars5/5Mastering Bash Rating: 5 out of 5 stars5/5Operating Systems DeMYSTiFieD Rating: 0 out of 5 stars0 ratingsSummary of Lights Out: by Ted Koppel | Includes Analysis Rating: 0 out of 5 stars0 ratingsNetworking for System Administrators: IT Mastery, #5 Rating: 5 out of 5 stars5/5Mastering Windows PowerShell Scripting Rating: 4 out of 5 stars4/5Learn SQL Server Administration in a Month of Lunches Rating: 0 out of 5 stars0 ratingsPowerShell: A Beginner's Guide to Windows PowerShell Rating: 4 out of 5 stars4/5Bash Command Line Pro Tips Rating: 5 out of 5 stars5/5
Reviews for Protecting Confidential Information
0 ratings0 reviews
Book preview
Protecting Confidential Information - Slava Gomzin
Protecting Confidential Information
How to Securely Store Sensitive Data
Cyber Privacy Series
Slava Gomzin
Cover Photo and Design: Alisa Levy
Smashwords Edition
Copyright © 2012 Slava Gomzin
Table of Contents
Introduction
How Data is Stolen from Computers
Extensive Security Permissions
Administrators and Users
Administrative Default Network Share - C$
Default/Weak Password of Local Administrator Account
Windows XP Repair
Rootkits
Remote Desktop
Cached Domain Passwords
Trojans and Spyware
Social Engineering Attacks
Stolen Computer or Hard Drive
How to Prevent Confidential Data from Being Stolen
Windows Disk Encryption
Solution
Using TrueCrypt
Resources
About the Author
Introduction
Every user is storing some kind of confidential information on computer. You may have some data that must be kept secret from strangers, other employees as well as network administrators and IT helpdesk personnel. Also, you might have information that is stored temporarily on laptops that must remain confidential even if the