Encryption

Strong encryption systems using sophisticated algorithms are readily available as both free downloads and commercial products. The company might choose to use its own encryption to protect sensitive data (for example, laptops that are vulnerable to theft). Office automation programs, such as email and word processing, provide some encryption capabilities within the application.

As a general rule, law enforcement and the legal profession tend to treat encrypted files as locked containers. If the investigator has the authority to search the device, he has the authority to compel the owner to provide the encryption keys. In the corporate environment, the acceptable-use policy should address the use of encryption products (both authorized ...

Get Incident Response: A Strategic Guide to Handling System and Network Security Breaches now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.