Data-at-Rest (DAR): Protecting Sensitive Information in Mobile Information Systems (ISs)
dc.contributor.author | McLean, Jeffery S. | |
dc.date.accessioned | 2011-07-06T17:04:30Z | |
dc.date.available | 2011-07-06T17:04:30Z | |
dc.date.issued | 2011-02 | |
dc.description | 76 p. This paper was completed as part of the final research component in the University of Oregon Applied Information Management Master's Degree Program [see htpp://aim.uoregon.edu]. | en_US |
dc.description.abstract | As the number of mobile information systems (ISs) increases, so does the amount of data-at-rest (DAR) susceptible to attacks. Literature published from 2001 to 2010 is examined to describe (a) 13 selected standards, regulations, and policies requiring DAR security solutions; and (b) currently available DAR security solutions of two types: hardware (encryption) and applications. Focus is on affordability and interoperability. Solutions are presented as a guide to help curb loss of DAR and identity theft. | en_US |
dc.identifier.uri | https://hdl.handle.net/1794/11391 | |
dc.language.iso | en_US | en_US |
dc.relation.ispartofseries | AIM Capstone 2011;Jeffery S. McLean | |
dc.subject | Data-at-rest | en_US |
dc.subject | Mobile information system | |
dc.subject | Encryption | |
dc.subject | Identity theft | |
dc.subject | National Institute of Standards and Technology (U.S.) | |
dc.subject | Federal information processing standard | |
dc.subject | Advanced encryption standard | |
dc.subject | Applied Information Management | |
dc.subject | AIM | |
dc.subject | Data | |
dc.title | Data-at-Rest (DAR): Protecting Sensitive Information in Mobile Information Systems (ISs) | en_US |
dc.title.alternative | Protecting Sensitive Information in Mobile Information Systems (ISs) | en_US |
dc.type | Other | en_US |