HP ProBook 4525s HP ProtectTools User Guide - Windows XP, Windows Vista, Windo - Page 11
Achieving key security objectives, Protecting against targeted theft - review
View all HP ProBook 4525s manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 11 highlights
Achieving key security objectives The HP ProtectTools modules can work together to provide solutions for a variety of security issues, including the following key security objectives: ● Protecting against targeted theft ● Restricting access to sensitive data ● Preventing unauthorized access from internal or external locations ● Creating strong password policies Protecting against targeted theft An example of targeted theft would be the theft of a computer containing confidential data and customer information at an airport security checkpoint. The following features help protect against targeted theft: ● The pre-boot authentication feature, if enabled, helps prevent access to the operating system. See the following procedures: ◦ Security Manager ◦ Drive Encryption Restricting access to sensitive data Suppose a contract auditor is working onsite and has been given computer access to review sensitive financial data; you do not want the auditor to be able to print the files or save them to a writeable device such as a CD. The following feature helps restrict access to data: ● Device Access Manager for HP ProtectTools allows IT managers to restrict access to writeable devices so sensitive information cannot be printed or copied from the hard drive onto removable media. Preventing unauthorized access from internal or external locations Unauthorized access to an unsecured business PC presents a very tangible risk to corporate network resources such as information from financial services, an executive, or R&D team, and to private information such as patient records or personal financial records. The following features help prevent unauthorized access: ● The pre-boot authentication feature, if enabled, helps prevent access to the operating system. See the following procedures: ◦ Password Manager ◦ Drive Encryption ● Password Manager helps ensure that an unauthorized user cannot get passwords or access to password-protected applications. ● Device Access Manager for HP ProtectTools allows IT managers to restrict access to writeable devices so sensitive information cannot be copied from the hard drive. Achieving key security objectives 3