Protecting Confidential Information: How to Securely Store Sensitive Data
By Slava Gomzin
()
About this ebook
Booklet for anyone who wants to know how to keep secrets on home computer, or prevent sensitive data from disclosure on office workstation. Topics include: how to break Windows and steal data from computer, pros and cons of using standard Windows data protection mechanisms, several steps to follow in order to keep information secured, using cryptographic solutions for secure storage, and more (Article: ~3,000 words).
Table of Contents includes:
Introduction
How Data is Stolen from Computers
Extensive Security Permissions
Administrators and Users
Administrative Default Network Share - "C$"
Default/Weak Password of Local Administrator Account
Windows XP Repair
Rootkits
Cached Domain Passwords
Trojans and Spyware
Social Engineering Attacks
Stolen Computer or Hard Drive
How to Prevent Confidential Data from Being Stolen
Windows Disk Encryption
Solution
Using TrueCrypt
Resources
About the Author
Slava Gomzin, CISSP, ECSP, Security+ has more than 15 years of professional experience in software development and application security. He is Security Architect at Retalix USA.
Slava Gomzin
Slava Gomzin is a Security and Payments Technologist at Hewlett-Packard, where he helps create products that are integrated into modern payment processing ecosystems using the latest security and payments technologies. Prior to joining Hewlett-Packard, Slava was a security architect, corporate product security officer, R&D and application security manager, and development team leader at Retalix, a Division of NCR Retail. As PCI ISA, he focused on security and PA-DSS, PCI DSS, and PCI P2PE compliance of POS systems, payment applications, and gateways. Before moving into security, Slava worked in R&D on design and implementation of new products including next-generation POS systems and various interfaces to payment gateways and processors. Slava currently holds CISSP, PCIP, ECSP, and Security+ certifications. He blogs about payment security at www.gomzin.com.
Read more from Slava Gomzin
Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless Rating: 0 out of 5 stars0 ratingsSecuring Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools Rating: 0 out of 5 stars0 ratingsSecuring Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build Rating: 0 out of 5 stars0 ratingsSecuring .NET Web Services with SSL: How to Protect “Data in Transit” between Client and Remote Server Rating: 0 out of 5 stars0 ratings
Related to Protecting Confidential Information
Related ebooks
Beginner's Guide for Cybercrime Investigators Rating: 5 out of 5 stars5/5Web Penetration Testing: Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsAZURE AZ 500 STUDY GUIDE-1: Microsoft Certified Associate Azure Security Engineer: Exam-AZ 500 Rating: 0 out of 5 stars0 ratings#HACKED: 10 Practical Cybersecurity Tips to Help Protect Personal or Business Inform Rating: 0 out of 5 stars0 ratingsCertified Cyber Forensics Professional The Ultimate Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsCyber Security Audit A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsImplementing Digital Forensic Readiness: From Reactive to Proactive Process Rating: 0 out of 5 stars0 ratingsOSINT Hacker's Arsenal: Metagoofil, Theharvester, Mitaka, Builtwith Rating: 0 out of 5 stars0 ratingsFortify Your Data: A Guide to the Emerging Technologies Rating: 0 out of 5 stars0 ratingsCyber Forensics A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsSecurity Assessment and Testing: CISSP, #6 Rating: 2 out of 5 stars2/5Advanced OSINT Strategies: Online Investigations And Intelligence Gathering Rating: 0 out of 5 stars0 ratingsSeven Deadliest Social Network Attacks Rating: 0 out of 5 stars0 ratingsHow Cyber Security Can Protect Your Business: A guide for all stakeholders Rating: 0 out of 5 stars0 ratingsSecurity, Privacy, and Digital Forensics in the Cloud Rating: 0 out of 5 stars0 ratingsStay Safe!: A Basic Guide to Information Technology Security Rating: 0 out of 5 stars0 ratingsPhysical Security for IT Rating: 5 out of 5 stars5/5Advanced Penetration Testing Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsDefense in Depth: An Impractical Strategy for a Cyber-World Rating: 5 out of 5 stars5/5Cyber Combat: Learn to Defend Against Cyber Attacks and Corporate Spying Rating: 0 out of 5 stars0 ratingsInsider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within Rating: 0 out of 5 stars0 ratingsPenetration Testing Bootcamp Rating: 5 out of 5 stars5/5Hack Attacks Testing: How to Conduct Your Own Security Audit Rating: 0 out of 5 stars0 ratingsIntroduction to Web Hacking: Cross-site Scripting Rating: 0 out of 5 stars0 ratingsCyber Security Blue Team A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsHampering the Human Hacker and the Threat of Social Engineering Rating: 0 out of 5 stars0 ratingsTechno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators Rating: 0 out of 5 stars0 ratingsThe Certified Ethical Hacker Exam - version 8 (The concise study guide) Rating: 3 out of 5 stars3/5OSSEC Host-Based Intrusion Detection Guide Rating: 5 out of 5 stars5/5
System Administration For You
Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Git Essentials Rating: 4 out of 5 stars4/5CompTIA A+ Complete Review Guide: Core 1 Exam 220-1101 and Core 2 Exam 220-1102 Rating: 5 out of 5 stars5/5Learn PowerShell in a Month of Lunches, Fourth Edition: Covers Windows, Linux, and macOS Rating: 0 out of 5 stars0 ratingsMastering Windows PowerShell Scripting Rating: 4 out of 5 stars4/5Linux: Learn in 24 Hours Rating: 5 out of 5 stars5/5Bash Command Line Pro Tips Rating: 5 out of 5 stars5/5PowerShell: A Comprehensive Guide to Windows PowerShell Rating: 4 out of 5 stars4/5ConfigMgr - An Administrator's Guide to Deploying Applications using PowerShell Rating: 5 out of 5 stars5/5Linux Commands By Example Rating: 5 out of 5 stars5/5Learn Windows PowerShell in a Month of Lunches Rating: 0 out of 5 stars0 ratingsLinux Bible Rating: 0 out of 5 stars0 ratingsWordpress 2023 A Beginners Guide : Design Your Own Website With WordPress 2023 Rating: 0 out of 5 stars0 ratingsNetworking for System Administrators: IT Mastery, #5 Rating: 5 out of 5 stars5/5Ubuntu 20.04 Essentials: A Guide to Ubuntu 20.04 Desktop and Server Editions Rating: 0 out of 5 stars0 ratingsPractical Data Analysis Rating: 4 out of 5 stars4/5Linux for Beginners: Linux Command Line, Linux Programming and Linux Operating System Rating: 4 out of 5 stars4/5Learn PowerShell Scripting in a Month of Lunches Rating: 0 out of 5 stars0 ratingsThe Complete Powershell Training for Beginners Rating: 0 out of 5 stars0 ratingsBash for Fun: Bash Programming: Principles and Examples Rating: 0 out of 5 stars0 ratingsArduino Robotic Projects Rating: 4 out of 5 stars4/5e-Discovery For Dummies Rating: 0 out of 5 stars0 ratingsMastering Linux Shell Scripting Rating: 4 out of 5 stars4/5Web Penetration Testing with Kali Linux Rating: 5 out of 5 stars5/5
Reviews for Protecting Confidential Information
0 ratings0 reviews
Book preview
Protecting Confidential Information - Slava Gomzin
Protecting Confidential Information
How to Securely Store Sensitive Data
Cyber Privacy Series
Slava Gomzin
Cover Photo and Design: Alisa Levy
Smashwords Edition
Copyright © 2012 Slava Gomzin
Table of Contents
Introduction
How Data is Stolen from Computers
Extensive Security Permissions
Administrators and Users
Administrative Default Network Share - C$
Default/Weak Password of Local Administrator Account
Windows XP Repair
Rootkits
Remote Desktop
Cached Domain Passwords
Trojans and Spyware
Social Engineering Attacks
Stolen Computer or Hard Drive
How to Prevent Confidential Data from Being Stolen
Windows Disk Encryption
Solution
Using TrueCrypt
Resources
About the Author
Introduction
Every user is storing some kind of confidential information on computer. You may have some data that must be kept secret from strangers, other employees as well as network administrators and IT helpdesk personnel. Also, you might have information that is stored temporarily on laptops that must remain confidential even if the