Data-at-Rest (DAR): Protecting Sensitive Information in Mobile Information Systems (ISs)

dc.contributor.authorMcLean, Jeffery S.
dc.date.accessioned2011-07-06T17:04:30Z
dc.date.available2011-07-06T17:04:30Z
dc.date.issued2011-02
dc.description76 p. This paper was completed as part of the final research component in the University of Oregon Applied Information Management Master's Degree Program [see htpp://aim.uoregon.edu].en_US
dc.description.abstractAs the number of mobile information systems (ISs) increases, so does the amount of data-at-rest (DAR) susceptible to attacks. Literature published from 2001 to 2010 is examined to describe (a) 13 selected standards, regulations, and policies requiring DAR security solutions; and (b) currently available DAR security solutions of two types: hardware (encryption) and applications. Focus is on affordability and interoperability. Solutions are presented as a guide to help curb loss of DAR and identity theft.en_US
dc.identifier.urihttps://hdl.handle.net/1794/11391
dc.language.isoen_USen_US
dc.relation.ispartofseriesAIM Capstone 2011;Jeffery S. McLean
dc.subjectData-at-resten_US
dc.subjectMobile information system
dc.subjectEncryption
dc.subjectIdentity theft
dc.subjectNational Institute of Standards and Technology (U.S.)
dc.subjectFederal information processing standard
dc.subjectAdvanced encryption standard
dc.subjectApplied Information Management
dc.subjectAIM
dc.subjectData
dc.titleData-at-Rest (DAR): Protecting Sensitive Information in Mobile Information Systems (ISs)en_US
dc.title.alternativeProtecting Sensitive Information in Mobile Information Systems (ISs)en_US
dc.typeOtheren_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
McLean-2011.pdf
Size:
430.49 KB
Format:
Adobe Portable Document Format
Description:
AIM Terminal Project
License bundle
Now showing 1 - 1 of 1
Name:
license.txt
Size:
2.13 KB
Format:
Item-specific license agreed upon to submission
Description: