NCJ Number
219992
Date Published
2007
Length
178 pages
Annotation
This book attempts to identify common pitfalls in document security, both physical and electronic content, and suggests remedies in the protection of vital information and sensitive data.
Abstract
In 21st century America, individuals and organizations leak information on a regular basis. In most cases, this leakage of sensitive information is unintentional. Protecting networks is essential. The leakage or compromise of information happens in many ways. Often, the compromise of data arises from someone working extra hard and accidentally taking home sensitive files. Before it is realized, the data has become compromised; it is lost, stolen, or accidentally placed in the trash. Also, employees place information on the Web. When information is available online, information becomes easy to disseminate and update, as well as facilitating hacking and information theft against the organization. This book strives to alert an audience of managers, security professionals, and workers who come in regular contact with sensitive information. At any point in the life cycle of a document if it faces exposure to unauthorized eyes, compromise and loss of confidentiality occurs. The book is divided into 10 chapters. Chapter 1 discusses metadata in documents (the information about the document itself). Chapter 2 explores Web-facing documents and how search engines can uncover sensitive data in those documents. Chapter 3 discusses how filtering these channels are feasible with modern technology. Chapter 4 covers the theft of digital devices such as personal data assistants, laptops, and cell phones. Chapter 5 discusses the erasing of computer media and explains methods for disposal and reuse procedures. Chapter 6 examines the unique control, disposal, and storage challenges with paper and physical documents, such as written information. Chapter 7 examines the whole issue of “slack space” on a computer. Chapter 8 describes anti-forensics which are techniques minimizing what forensic examination can uncover. Chapter 9 deals with the evaluation of online information. Lastly, chapter 10 discusses document forgeries. Tables, appendix and references