Information Technology Reference
In-Depth Information
Figure 9.4 A small power pack (the size of a
deck of cards), which adds several hours of opera-
tion to my netbook, while charging various other
mobile devices when I am on the road (it is shown
here charging my phone).
Figure 9.4, is a fundamental working requirement for sustained mobile
technology use.
Remote Desktops
I also recommend the use of remote desktop access and a very limited set
of software on any mobile laptop or netbook when you will are traveling
through security checkpoints. This can expedite the process of inspec-
tion and avoids the risk of data loss or exposure if a device is confiscated.
A lightweight mobile computer with only an operating system, antimal-
ware protection, VPN client, and remote desktop client provides little
risk of exposing information if it is stolen or otherwise lost. No data,
applications, or other functionality is present on the device beyond the
applications necessary for configuring a secure connection back to the
remote desktop host, which provides processing power while the mobile
device only transmits keyboard and mouse input and returns video and
sound to the user. Provided that remote desktop caching is disabled and
files are left on the remote host, forensic investigation of the mobile
device will expose little if any data to unwanted review. Remote desktops
and other virtualized elements of the network will be examined in detail
in Chapter 10.
Transport Security
Encryption is important for securing remote and mobile access. Many
standards for encryption between devices and wireless endpoints do not
provide adequate protection—for example, the common Wired Equiva-
lent Privacy (WEP) protocol can be decrypted in a live setting. More
Search WWH ::




Custom Search