ABSTRACT

The use of portable computing presents very specific data security threats. For every potential threat, some countermeasure should be implemented to ensure the company’s proprietary information is protected. This involves identifying the potential threats and implementing the level of protection needed to minimize these threats. By providing a reasonably secure portable computing environment, users can enjoy the benefits of portable computing and the organization can remain competitive in the commercial marketplace.