Secure Data Management

Confidential data

Here are some examples of confidential data.

  • Personal and business addresses.
  • Financial account attributes for banking, credit cards, insurance, trading.
  • Online account attributes: URLs, userid’s, passwords, PINs.
  • Online, credit card, checking payment info.
  • Medical records: appointments, proscriptions, test results.
  • System and application configuration info: server names, IP addresses, path names.
  • PGP encryption keys.
  • System and application process descriptions and notes.
  • PDA conduit files for the above.

Handling limitations

  • Cannot be transferred over unsecured Internet connections and by unencrypted e-mail.
  • Cannot be hosted on open unsecured Web servers like Yahoo geocities.
  • Cannot be hosted on generally accessable LAN servers and workstations.
  • Cannot be kept in unsecured databases without encryption.
  • Need protection during equipment and software upgrades, repairs and reconfigurations.

Secure storage

Storage type

Advantages

Risk

Notes

File folders

  • Helpful to separate confidential data from non-confidential.
  • Compromised by unauthorized LAN or Web access through connected servers and workstations.
  • When located on internal hard drives, compromised by unexpected unsecured repairs and upgrades.
  • Used both on desktops and laptops.
  • External disks and drives

    • Easily switched off main desktop or laptop to keep in a secure location – like earlier floppies.
    • External drives are treated basically as internal hard drives because they are fast and robust enough – unlike early floppies.
    • External disks are the best place for PDA conduit files to avoid synchronization problems.
    • Like floppies, can be attached to different computers.
    • Size of an external disk ranges from 100M for Iomega Zip drive to several GB – comparable with internal HD. Miniature disks can have 16M, 32M or 64M capacity.
  • Compromised by loss or theft – although the risk is less than for more portable PDAs.
  • More sensitive data (like credit card numbers) may need a secure application with password protection or encryption.
  • Compromised by unauthorized LAN or Web access through the host workstation.
  • Here are two external drives: Iomega Zip and Buslink USB.
  • Access to these drives needs proper driver installation.
  • PDAs

    • Protect data naturally because owners treat PDAs like wallets.
    • Unlike PCs and laptops, PDAs provide instant access to confidential data without delay for booting.
    • Confidential data are organized in standard PDA applications: Address Book, Memo Pad.
  • Highest risk of loss or theft. PDAs are as easy to loose as keys or wallets, so this risk cannot be ignored!
  • Standard PDA applications do not have password protection.
  • More sensitive data (like credit card numbers) need to be kept in a secure application with password protection or encryption.
  • Compromised by occasional synchronization to unsecured hard drive location.
  • Palm, Handspring, and Pocket PC are some of the most widespread PDAs. Secure access to PDA data needs proper conduit installation - preferrably with conduit files on an external drive.
  • These are two secure PalmOS applications that support password protection: SpalshID organizer, Handbase database.