Datasheet
27
Chapter 1: Defining Data Loss
Figure 1-4:
A mind map
of data loss.
Laptop / Desktop / Server
Disposal
Fax
Data Loss
Social
Engineering
Data-At-Rest
Data-In-Motion
Other Risks
Physical
Endpoint
Piggybacking
Dumpster (Skip) Diving
Contractors
Trojan
Eavesdropping
Impersonation
Targetting Accounts Payable
Simple Phone Call
Databases
File Systems
File Servers
SANs/iSCSI Storage
Voice Mail
Video Surveillance
NAS
E-Mail
HTTP/S
SSH
FTP
IM
VolP
P2P
Blogs
Partners
Suppliers
Customers
Software as a Service
Cloud Computing
Outsource
Laptop/Desktop
Server
USB
CD/DVD
Memory Card Readers
PCMCIA
Communication
Virtual Machine
Other Threat Vectors
iPod
Memory Stick
Bluetooth
Infrared
Firewire
Serial/Parallel Ports
Modem
Virus
Screen Scrapers
Trojans
Key Loggers
Phishing/Spear Phishing
Printer
Backup Tape / CD / DVD / USB Device
Photocopier
Mobile Phone / PDA
Digital Camera (incl. Mobile Phone Camera)
Incorrect System Disposal
Printed Reports
Disposal / Shredding
System Repair
On-site
Off-site
A specific data-loss solution can be helpful in multiple areas, so when you
start looking at the problem, look at your Big Picture — and at how you maxi-
mize your investment while minimizing the risk.
05_388433-ch01.indd 2705_388433-ch01.indd 27 1/23/09 9:36:08 PM1/23/09 9:36:08 PM










