Data Security
There are a number of options that can be used for encrypting sensitive data. The table below provides an overview of the most popular methods of encrypting date and the pro's and con's of three of those ways.
| Product | Pro's | Con's |
|---|---|---|
| Ironkey USB stick |
|
|
| Integral USB stick |
|
|
| TrueCrypt encryption software |
|
|
How to: Create an encrypted folder on your mobile storage device using TrueCrypt
How to: Access and use the encrypted area on a mobile storage device using TrueCrypt
ISS security pages will help keep you safe on the ISS networks and the Internet. Follow this link to the main ISS Security page.
©Lancaster University ISS Governance Computer User Agreement Privacy & Cookies Notice