Bhaskar, KS wrote:

> If you are concerned about the repercussions from the potential theft
> of a PC running VistA on Linux, place the database & journal files on
> a loop-aes encrypted file system.
>

Yes, it is quite simple for the end user to use. So I am always
flabbergasted when I hear about some intelligence officer losing his
laptop with sensitive information on the train or whatever and everyone
being in a panic because the data may fall into the wrong hands.
Loopback-aes is the solution for such things.


> It will take the computing resources of someone like the NSA or IBM to
> recover the information.
>
They won't be able to decrypt it either without the key (unless they
have some futuristic technologies at hand already). I think it would
require the CIA, extraordinary rendition, sodium pentothal and rubber
hose protocols to get the information back.


> Two further precautions are to put your swap space on a file in an
> encrypted file system,
>

I would advise loopback-aes is run only with an encrypted swap.


> and to password protect the BIOS.
>
Weak, since that is fairly easy to bypass, but no harm.

>
> To me, a greater risk than the PCs themselves are the backup tapes and
> CDs.  They are often junked after use and the sport of dumpster diving
> will provide valuable information.  So, don't forget to encrypt your
> backups.
>
The weakest link is always human error.

regarda
PJ



-------------------------------------------------------
All the advantages of Linux Managed Hosting--Without the Cost and Risk!
Fully trained technicians. The highest number of Red Hat certifications in
the hosting industry. Fanatical Support. Click to learn more
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=107521&bid=248729&dat=121642
_______________________________________________
Hardhats-members mailing list
Hardhats-members@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/hardhats-members

Reply via email to