Title: Protecting information on VistA on GT.M on Linux

If you are concerned about the repercussions from the potential theft of a PC running VistA on Linux, place the database & journal files on a loop-aes encrypted file system.  It will take the computing resources of someone like the NSA or IBM to recover the information.

Two further precautions are to put your swap space on a file in an encrypted file system, and to password protect the BIOS.

The down side of this is that in the event of a boot up after a power failure, you will need to have someone type in the password(s) on boot-up (but then, you are trying to protect against someone who has physical possession of the system, so you have to add an ingredient that possession of the system doesn't give them).

Of course, if the PC is stolen by an insider who knows the passwords, you're out of luck.

To me, a greater risk than the PCs themselves are the backup tapes and CDs.  They are often junked after use and the sport of dumpster diving will provide valuable information.  So, don't forget to encrypt your backups.

In this universe, absolute security does not exist.  What you buy with security measures is time, hopefully enough time to discourage the would be criminal to find a more profitable target. [Professional safes, for example, are often rated in terms of time.]

-- Bhaskar
--------------------------
Sent from my BlackBerry Wireless Handheld

Reply via email to