Meyer Electronics Systems just recently had a number of laptops stolen out of their office. On these laptops
contained sensitive corporate information regarding patents and company strategies. A month after the laptops
were stolen, a competing company was found to have just developed products that almost exactly duplicated
products that Meyer produces. What could have prevented this information from being stolen from the laptops?
A.
EFS Encryption
B.
DFS Encryption
C.
IPS Encryption
D.
SDW Encryption