摘要 |
<p>Method and system of secure computing environment are provided. The secure computing environment allows a user to transfer organization data to an external storage device authorized by the organization. The external storage device com- prises two partitions one of which is read-only whereas the second read/write-enabled partition stores organization data in encrypted form. When the user interfaces the external storage device with an untrusted user computing device, the untrusted user computing device is booted from an operating system pre-installed in the external storage device followed by deactivation of the Internet connection, local hard disk and all unauthorized input-output devices. Data movement and any other pre-determined events are recorded in auditable logs as per the organization security and data movement policy. The secure computing system extends the trusted computing environment of an organization to untrusted user computing devices outside the organization.</p> |