Data-at-Rest (DAR): Protecting Sensitive Information in Mobile Information Systems (ISs)
| dc.contributor.author | McLean, Jeffery S. | |
| dc.date.accessioned | 2011-07-06T17:04:30Z | |
| dc.date.available | 2011-07-06T17:04:30Z | |
| dc.date.issued | 2011-02 | |
| dc.description | 76 p. This paper was completed as part of the final research component in the University of Oregon Applied Information Management Master's Degree Program [see htpp://aim.uoregon.edu]. | en_US |
| dc.description.abstract | As the number of mobile information systems (ISs) increases, so does the amount of data-at-rest (DAR) susceptible to attacks. Literature published from 2001 to 2010 is examined to describe (a) 13 selected standards, regulations, and policies requiring DAR security solutions; and (b) currently available DAR security solutions of two types: hardware (encryption) and applications. Focus is on affordability and interoperability. Solutions are presented as a guide to help curb loss of DAR and identity theft. | en_US |
| dc.identifier.uri | https://hdl.handle.net/1794/11391 | |
| dc.language.iso | en_US | en_US |
| dc.relation.ispartofseries | AIM Capstone 2011;Jeffery S. McLean | |
| dc.subject | Data-at-rest | en_US |
| dc.subject | Mobile information system | |
| dc.subject | Encryption | |
| dc.subject | Identity theft | |
| dc.subject | National Institute of Standards and Technology (U.S.) | |
| dc.subject | Federal information processing standard | |
| dc.subject | Advanced encryption standard | |
| dc.subject | Applied Information Management | |
| dc.subject | AIM | |
| dc.subject | Data | |
| dc.title | Data-at-Rest (DAR): Protecting Sensitive Information in Mobile Information Systems (ISs) | en_US |
| dc.title.alternative | Protecting Sensitive Information in Mobile Information Systems (ISs) | en_US |
| dc.type | Other | en_US |