Q

Are encryption products better than self-destructing data?

Although spy vs. spy shows may have made lost data deletion technologies a fun gimmick, information security threat expert Ed Skoudis explains the data protection problems that may arise when a tape "will destruct in five seconds."

Your article on laptop encryption was interesting. How effective are "lost data deletion" technologies that delete protected files as soon as a stolen laptop accesses the Internet?
I am personally very uncomfortable with such technologies because they often go awry. Such tools can falsely trigger, preventing users from accessing data until it can be restored from a backup. At worst, though, the tool could destroy data that isn't backed up at all.

As a kid, I remember hearing the audio in the Mission: Impossible TV show with its urgent exhortation that, "This...

tape will self destruct in five seconds." While it may be a cool gimmick in a spy-vs.-spy TV show, self-destructing data can cause problems for large enterprises.

I much prefer solid encryption products that require a difficult-to-guess and difficult-to-crack passphrase, not just the user's operating system password. Better yet, I like to see encryption products that store the crypto keys on a separate token, such as a USB key fob, but still require a strong passphrase for decrypting the data.

More information:

  • Read Ed's previous article on laptop encryption.
  • Learn the right way to manage your encryption keys.
  • This was last published in June 2007

    Dig Deeper on Disk Encryption and File Encryption

    PRO+

    Content

    Find more PRO+ content and other member only offers, here.

    Have a question for an expert?

    Please add a title for your question

    Get answers from a TechTarget expert on whatever's puzzling you.

    You will be able to add details on the next page.

    Start the conversation

    Send me notifications when other members comment.

    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

    Please create a username to comment.

    -ADS BY GOOGLE

    SearchCloudSecurity

    SearchNetworking

    SearchCIO

    SearchConsumerization

    SearchEnterpriseDesktop

    SearchCloudComputing

    ComputerWeekly

    Close