Protecting Confidential Information
How to Securely Store Sensitive Data
Cyber Privacy Series
|
|
Table of Contents: Introduction How Data is Stolen from Computers Extensive Security Permissions Administrators and Users Administrative Default Network Share - "C$" Default/Weak Password of Local Administrator Account Windows XP Repair Rootkits Cached Domain Passwords Trojans and Spyware Social Engineering Attacks Stolen Computer or Hard Drive How to Prevent Confidential Data from Being Stolen Windows Disk Encryption Solution Using TrueCrypt Resources |
|