Chapter 47: Data Encryption

Bhushan Kapoor, and Pramod Pandya     CSU Fullerton, Fullerton, CA, United States

Abstract

The Internet evolved over the years as a means for users to access information and exchange emails. Later, once the bandwidth became available, businesses exploited the Internet’s popularity to reach customers online. It has been reported that organizations that store and maintain customers' private and confidential records were compromised on many occasions by hackers breaking into data networks and stealing records from storage media. We have come across headline-grabbing security breaches regarding laptops with sensitive data being lost or stolen, and the Feds have encrypted around 1 million laptops with encryption software loaded ...

Get Computer and Information Security Handbook, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.