+ All Categories
Home > Documents > Education Technology Newsletter

Education Technology Newsletter

Date post: 06-Apr-2016
Category:
Upload: cardwave-services-ltd
View: 217 times
Download: 0 times
Share this document with a friend
Description:
This newsletter by Cardwave contains useful information and resources for education establishments, as well as insights into Cardwave's products and services.
Popular Tags:
10
INSIDE THIS ISSUE: 1 2 3 3 4 5 5 6 7 8 9 10 BUSINESS NAME November 2014 . Issue 01 NEWSLETTER DATE VOLUME 1, ISSUE 1 November 2014 . Issue 01 Education Sector Issue
Transcript
Page 1: Education Technology Newsletter

I N S I D E T H I S

I S S U E :

1

2

3

3

4

5

5

6

7

8

9

10

B U S I N E S S N A M E

November 2014 . Issue 01

N E W S L E T T E R D A T E V O L U M E 1 , I S S U E 1

November 2014 . Issue 01

Education Sector Issue

Page 2: Education Technology Newsletter

P A G E 2

Avoid data breaches

by investing in

secure encrypted

products

November 2014 . Issue 01

Page 6: Education Technology Newsletter

P A G E 6

N O V E M B E R 2 0 1 4 . I S S U E 0 1

Source: Comm.Business

Page 8: Education Technology Newsletter

P A G E 8

N O V E M B E R 2 0 1 4 . I S S U E 0 1

Hardware Encryption

In a hardware encrypted USB device, access control counters and all

information relating to encryption and decryption of the data are

implemented in a crypto module located inside the USB flash drive. The

crypto module will shut down the USB device and keep the data safe in the

event of unauthorised access attempts. Unlike a software based solution,

hackers are unable to run analysis utilities on the USB drive to locate and

reset this counter.

By shutting down the USB device, a parallel attack can also be thwarted. A

parallel attack is where data is copied and shared to many devices to

increase the attempts at unlocking data. The USB device doesn’t allow the

files to be copied so they are safe.

Summary

To summarise the basic difference between software and hardware encryption, we can state that if you can encrypt using software you can decrypt using software. However, a hardware encrypted device offers superior security levels by using a cryptographic core in a location independent of the PC and operating system to encrypt your data.

Keep your data safe at university: A Guide for Students Download a useful guide here http://www.cardwaveservices.com/wp-content/uploads/2014/09/14ELC072-Back-to-university1.pdf

Page 10: Education Technology Newsletter

Telephone: +(44) 1380 738395

Email: [email protected] Website: www.cardwave.com

6c Hopton Industrial Estate

Devizes, Wiltshire

SN10 2EU


Recommended