Examines encryption needs for a particular user's laptop.


The following case study deals with a user's laptop and the encryption needs for it. This is done prior to having an enterprise-scale system available.

Background

Requirements

Remote Access

Local Applications

Proposal

General Considerations

User Responsibilities

To consider

Some leftover stuff to be moved elsewhere