ISS Security Lancaster University 

Security Logo

Data Security

There are a number of options that can be used for encrypting sensitive data. The table below provides an overview of the most popular methods of encrypting date and the pro's and con's of three of those ways.

Product Pro's Con's
Ironkey USB stick
  • Strong encryption
  • Brute force protection
  • Waterproof design
  • Easy to use
  • Cross Platform
  • "Always on" cannot be disabled
  • Expensive
  • Files lost if password forgotten
Integral USB stick
  • Strong encryption
  • Brute force protection
  • Waterproof design
  • Easy to use
  • High strength password
  • No software installation required
  • Platform specific
  • Files lost if password forgotten
TrueCrypt encryption software
  • Totally free
  • Easy to use strong encryption
  • Not platform specific
  • Can encrypt partitions or whole drive
  • Extensive help manual
  • Can be complicated
  • Not the most intuitive interface
  • Files lost if password forgotten
  • No brute force protection

How to: Create an encrypted folder on your mobile storage device using TrueCrypt
How to: Access and use the encrypted area on a mobile storage device using TrueCrypt

ISS security pages will help keep you safe on the ISS networks and the Internet. Follow this link to the main ISS Security page.

©Lancaster University   ISS Governance   Computer User Agreement   Privacy & Cookies Notice  

Lancaster University
Bailrigg
LancasterLA1 4YW United Kingdom
+44 (0) 1524 65201