Security of enterprise anti-leak software

Source: Internet
Author: User

1, the security of the key

The security of encrypted files is ensured by algorithms and keys. Encryption algorithms are generally used in the international popular security High algorithm, these algorithms are public, so the exact encryption algorithm security is really dependent on the key.

The secret of the anti-disclosure software is whether security should address the following issues:

To ensure that no two sets of the same software environment, that is, to ensure that different enterprises can have different encryption keys, to ensure that different enterprises even install the same encryption software, can not open each other encrypted files.

Make sure the vendor cannot decrypt even if it obtains the ciphertext. Many anti-leak software, enterprises can not set their own keys. After the manufacturer has obtained the ciphertext, as long as according to the characteristics of the software itself can be cracked, so that the anti-disclosure software is the same as a fake, can not really protect the information security enterprise.

If the key leaks, to have remedial measures, such as the key can support the change, so that the key leaks, the enterprise can be easily replaced.

2. Management and control of leak-out channels

The quality of the leak control is an important test point to choose the anti-leak software.

Corporate information is often leaked through the following channels:

Mobile storage media replication, such as U disk, mobile hard disk, etc.;

Use the System tools to transfer relevant documents information through QQ, MSN, e-mail and other network tools to the internal transmission of important information documents;

Print the document away from the printer;

After the virtual printer is converted and taken away;

The leak-proof software must be managed to prevent the terminal from using the specified device, including USB storage device restrictions, optical drive restrictions, floppy disk drive restrictions, and printer restrictions.

Virtual printer is an important output device in the enterprise, but because the virtual printer supports most of the format files, it is a significant threat to information security. In addition to the need to control the conventional leak-proof software, the virtual printer must also be controlled: no virtual printer or even the use of virtual printer, also in the form of ciphertext.


Security of enterprise anti-leak software

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.