Results 1-10 of 11
Results Per Page: 
Erase a Computer H ard Drive 1. Burn the DBAN program from TigerWare onto a CD.
Article Id: 6675
Category: Security and Policies

Why can't normal methods be used to erase an SSD? Solid State Drives (SSDs), and other flash-based media like portable USB drives, store data as electric charges. Traditional storage media like mechanical hard drives or tape based storage have storage physically writen to magnetic media, and therefore can be erased using tools like degaussers, which...
Article Id: 20019
Category: Security and Policies

(Revised March 26, 2010) The following are recommended elements of an IT Disaster Recovery Plan. 1. A plan revision and approval page as a cover sheet, containing date of most recent plan review and revision, name(s) of reviewer(s), date of most recent plan test, and approval of plan as indicated by signature of department head. 2....
Article Id: 14397
Category: Security and Policies

What is the Database Security Breach Notification Law? SB205 Act 499, known as the Database Security Breach Notification Law, was signed by the governor of Louisiana on July 12, 2005 and became effective on January 1, 2006. This legislation requires notification to any Louisiana resident whose unencrypted personal information was, or is...
Article Id: 8112
Category: Security and Policies

Article Id: 6993
Category: Security and Policies

Security: Avoiding Social Engineering & Phishing Attacks DO NOT Give Your Sensitive Information to ANYONE. Exceptions are made only if you are CERTAIN that they are indeed who they claim to be and that they NEED access to the information for a critical service. What is a...
Article Id: 6982
Category: Security and Policies

Why Do I Need a Password? Think about the number of PIN numbers, passwords, or passphrases you use every day: getting money from the ATM or using your debit card in a store, logging on to your computer or e-mail, signing in to an online bank account or shopping cart...the list seems to just keep getting longer. Keeping track of all of the number,...
Article Id: 6975
Category: Security and Policies

Article Id: 6973
Category: Security and Policies

DMCA The Digital Millennium Copyright Act of...
Article Id: 6974
Category: Security and Policies

Federal Trade Commission Identity Theft - A Recovery Plan United States Department of Justice Identity Theft and...
Article Id: 6984
Category: Security and Policies