NASA Plans to Encrypt All Laptops

Status
Not open for further replies.
I'm surprised they didn't already do this for computers that went in and out. If I ran a government facility with important data I wouldn't let people carry that out the door for any reason.
 

joytech22

Distinguished
Jun 4, 2008
1,687
0
19,810
They should just create an invisible partition using TrueCrypt or something and store everything in that.
Practically uncrackable unless you have huge resources, in which case stealing the laptop would be the easy part.
 

zareff

Honorable
Apr 6, 2012
2
0
10,510
Good for them. Supporting it is not that hard, troubleshooting and normal desktop support might become a PITA though...
 

kingssman

Distinguished
Apr 11, 2006
407
0
18,780
I work for a company that encrypts all their laptops. It's been a standard practice since the release of XP. CREDANT security is what they went with.
 
The ability to do this has been in and around the Government for awhile now. Data At Rest (DAR) is the official program and policies that are used, though there are different COTS options for it. The reason it hasn't been widely adopted is that it complicates an already complicated situation. The people who go TDY with official government computers tend to be higher ranking officers and senior managers. They are not technically proficient and always seem to break something or need help to access the VPN or other piece of software. Something like DAR adds another item that these individuals could inadvertently break, and as their TDY you can't just send a tech over to their desk to fix the problem. The worst part is the IT manager tends to answer to these officials or to the people who work for these officials, so every-time a problem happens, whether it's user error or not (btw you CAN NOT say user error when the user is a high ranking official) it looks bad on your department. The result is the IT managers want as few potential problems as possible, so DAR has been put off and avoided whenever possible.
 

AnUnusedUsername

Distinguished
Sep 14, 2010
235
0
18,710
How were they not doing that before? It's industry standard to encrypt all laptops used in software development for this very reason. I guess a secretary might not have an encrypted laptop, but I'm a bit dismayed that NASA wasn't encrypting things.
 

scook9

Distinguished
Oct 16, 2008
826
0
18,980
[citation][nom]AnUnusedUsername[/nom]How were they not doing that before? It's industry standard to encrypt all laptops used in software development for this very reason. I guess a secretary might not have an encrypted laptop, but I'm a bit dismayed that NASA wasn't encrypting things.[/citation]
A secretary may have important PII and travel and calendar details for the executive that she supports. Do not overlook the importance of data and how it could be very valuable to the right people.

Full disk encryption should be relatively easy to put in place. I know that the 50,000 employees at my company all cope with it without any major issues....(just don't plug in a esata drive....the brilliant encryption software thinks it is internal and encrypts it for you....making it only visible on that laptop)
 



Chances are there were sections / departments that had DAR and fully disk encryption put into place. This is just an agency wide policy change, now local IT managers don't have the option of going without it to appease seniors officials.
 

thillntn

Distinguished
Apr 14, 2010
297
0
18,780
A little overboard, but i use a hdd password on my systems. If stolen, the drive is not readable without unlocking it. Yes ways exist around this, but most crooks wanting to sell it won't know how. Never enough layers for a determined thief...but surprised this isn't a mandatory thing way before now.
 

nvidiaguy07

Distinguished
Apr 20, 2011
14
0
18,510
[citation][nom]abbadon_34[/nom]unless they inspect each one how will they enfirce this? Implied is that have both encrypted and unencrypted laying around in house.[/citation]
what?
 

Auroram

Distinguished
Sep 8, 2011
26
0
18,530
[citation][nom]cumi2k4[/nom]not going to help if user passwords are mostly "123456"[/citation]
Actually, it will. You can image new laptops to come with Bitlocker, for example. Set the password requirement to contain at least a combination of a fair amount of letters/numbers/symbols, etc. Enforcing a proper password isn't all that hard, loads of IT guys are simply to laid back to go against managers who complain about password policies.

After that it's simply a matter of encypted systems becoming inaccessible after entering the wrong password to many times.
 

Scar89

Distinguished
Oct 26, 2011
100
0
18,710
I thought they would have already done this after that stolen laptop indecent (or before!) but I guess with all the budget cuts......
 

freggo

Distinguished
Nov 22, 2008
2,019
0
19,780
"to encrypt all notebooks until November 21."

So after November 2st the encryption can be removed ?

Shouldn't it read "to encrypt all notebooks by November 21." ?
Just curious, as I am not a native English speaker, as to whether or not my grammar is off.
 
Status
Not open for further replies.