END-TO-END Encryption Strategies.

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • Author(s): Grimes, Roger A.
  • Source:
    InfoWorld. 9/4/2006, Vol. 28 Issue 36, p31-36. 5p.
  • Additional Information
    • Subject Terms:
    • Abstract:
      The article offers advice in developing an encryption strategy to protect confidential data. During transmission and when stored on portable computing devices, confidential information are being compromised. A comprehensive encryption strategy should consider all the ways the data can be input, output and stored. Furthermore, the strategy should be able to enforce protection for data being sent to business partners and third parties. In developing encryption strategy, it is better to involve key members of operation, management and information technology. INSETS: New Schemes to Safeguard Content;Keep Data Confidential - or Else.