Laptop theft

Laptop theft

Laptop theft is a significant threat to users of laptop computers. Many methods to protect the data and to prevent theft have been developed, including alarms, laptop locks, and visual deterrents such as stickers or labels. Victims of laptop theft can lose hardware, software, and essential data that has not been backed up. Thieves also may have access to sensitive data and personal information. Some systems authorise access based on credentials stored on the laptop including MAC addresses, web cookies, cryptographic keys and stored passwords.

According to the FBI, losses due to laptop theft totalled more than $3.5 million dollars in 2005. The Computer Security Institute/FBI Computer Crime & Security Survey found the average theft of a laptop to cost a company $31,975.[1] The incidence of laptop theft has been growing at a steady rate as laptop use continues to grow, and more than 1 in 10 laptops will be stolen within their lifetime.[citation needed]

Contents

Best practices against laptop theft

Depending on what is kept on a particular laptop, lack of proper security precautions allows a thief to easily acquire such information as personal bookkeeping files, documents containing passwords, addresses, as well as employee and customer information stored on company laptops.

Inside protection

Passwords are no longer adequate to protect laptops. There are many solutions that can improve the strength of a laptop's protection. Full disk encryption (FDE) is an increasingly popular and cost-effective approach. Full disk encryption can be taken on from a software-based approach, a hardware-based approach, or both - end-based approach. FDE provides protection before the operating system starts up with pre-boot authentication, however precautions still need to be taken against cold boot attacks.

There are a number of tools available, both commercial and open source that enable a user to circumvent passwords for Windows, Mac OS X, and Linux.

Passwords provide a basic security measure for files stored on a laptop, though combined with disk encryption software they can reliably protect data against unauthorized access. Remote Laptop Security (RLS) is available to confidently secure data even when the laptop is not in the owner's possession. With Remote Laptop Security, the owner of a laptop can deny access rights to the stolen laptop from any computer with Internet access.

Physical protection

A number of computer security measures have emerged that aim at protecting data. The Kensington Security Slot along with a locking cable provides physical security against thefts of opportunity.

Centralization of laptop data

Another possible approach to limiting the consequences of laptop theft is to issue thin client devices to field employees instead of conventional laptops, so that all data will reside on the server and therefore may be less liable to loss or compromise. If a thin client is lost or stolen, it can easily and inexpensively be replaced. However, a thin client depends on network access to the server, which is not available aboard airliners or any other location without network access.

This approach can be coupled with strong authentication as such Single sign on.

Some major laptop thefts

Department of Veterans Affairs

In 2006 a laptop in custody of a data analyst was stolen. It contains personal and health data of about 26.5 million active duty troops and veterans.[2] The agency has estimated that it will cost between $100 million to $500 million to prevent and cover possible losses from the data theft.[3] In 2007 VA accepted to pay $20 million to current and former military personnel to settle a class action lawsuit. [4]

In 2010 VA reported the theft of the laptop from an unidentified contractor; the computer contained personally identifiable information on 644 veterans, including data from some VA medical centers' records.

After learning about the unencrypted laptop, VA investigated how many VA contractors might not be complying with the encryption requirement and learned that 578 vendors had refused to sign new contract clauses that required them to encrypt veteran data on their computers, an apparent violation of rules.

See also

References

External links


Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать реферат

Look at other dictionaries:

  • Laptop — A desktop replacement laptop with its 18.4 inch screen showing its technical specifications. A laptop, also called a notebook,[1][2] is a personal computer for …   Wikipedia

  • Theft — In criminal law, theft (also known as stealing or filching) is the illegal taking of another person s property without that person s freely given consent. As a term, it is used as shorthand for all major crimes against property, encompassing… …   Wikipedia

  • theft — noun ADJECTIVE ▪ petty ▪ grand (AmE) ▪ attempted (esp. BrE) ▪ the crime of attempted theft ▪ large scale, outright …   Collocations dictionary

  • laptop — noun Laptop is used before these nouns: ↑battery, ↑computer, ↑keyboard, ↑screen, ↑theft …   Collocations dictionary

  • One Laptop per Child — OLPC redirects here. For other uses, see OLPC (disambiguation). One Laptop per Child Formation January 2005 Type Non profit Headquarters Cambridge, Massachuset …   Wikipedia

  • Remote Laptop Security — (RLS) is a security measure that allows a user to control access to files on a computer even if it has been lost or stolen. The user in charge chooses which files he or she wants to safeguard using RLS software. Desired files are converted and… …   Wikipedia

  • Identity theft — is a form of stealing another person s identity in which someone pretends to be someone else by assuming that person s identity, typically in order to access resources or obtain credit and other benefits in that person s name. The victim of… …   Wikipedia

  • Robert Siciliano — Born May 25, 1968, is an American television news correspondent, security analyst, author and actor. He delivers presentations throughout the United States and Canada on identity theft protection and personal security, including self defense.… …   Wikipedia

  • LoJack — Corporation Type Corporation(NASDAQ:LOJN) Industry Vehicle Tracking …   Wikipedia

  • Cam Newton — For other people named Cam Newton, see Cam Newton (disambiguation). Cam Newton No. 1     Carolina Panthers Quarterback Personal information Date of birth: May 11, 1989 (1989 05 11) …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”