1, the security of the key
The security of encrypted files is ensured by algorithms and keys. Encryption algorithms are generally used in the international popular security High algorithm, these algorithms are public, so the exact encryption algorithm security is really dependent on the key.
The secret of the anti-disclosure software is whether security should address the following issues:
To ensure that no two sets of the same software environment, that is, to ensure that different enterprises can have different encryption keys, to ensure that different enterprises even install the same encryption software, can not open each other encrypted files.
Make sure the vendor cannot decrypt even if it obtains the ciphertext. Many anti-leak software, enterprises can not set their own keys. After the manufacturer has obtained the ciphertext, as long as according to the characteristics of the software itself can be cracked, so that the anti-disclosure software is the same as a fake, can not really protect the information security enterprise.
If the key leaks, to have remedial measures, such as the key can support the change, so that the key leaks, the enterprise can be easily replaced.
2. Management and control of leak-out channels
The quality of the leak control is an important test point to choose the anti-leak software.
Corporate information is often leaked through the following channels:
Mobile storage media replication, such as U disk, mobile hard disk, etc.;
Use the System tools to transfer relevant documents information through QQ, MSN, e-mail and other network tools to the internal transmission of important information documents;
Print the document away from the printer;
After the virtual printer is converted and taken away;
The leak-proof software must be managed to prevent the terminal from using the specified device, including USB storage device restrictions, optical drive restrictions, floppy disk drive restrictions, and printer restrictions.
Virtual printer is an important output device in the enterprise, but because the virtual printer supports most of the format files, it is a significant threat to information security. In addition to the need to control the conventional leak-proof software, the virtual printer must also be controlled: no virtual printer or even the use of virtual printer, also in the form of ciphertext.
Security of enterprise anti-leak software