Data protection strategies for the Tablet and cloud computing era

Source: Internet
Author: User
Keywords Data protection Tablet PC security cloud computing

The proliferation of information has created an environment with many targets for hackers, thieves, and malicious insiders, and traditional perimeter defenses cannot cope with this threat. To achieve a balance between information protection and legitimate access, enterprise information security workers must focus on protecting the content of files and communications, not just containers and channels for data. Efficient http://www.aliyun.com/zixun/aggregation/13681.html > Data protection combines content recognition, policy-based protection, and robust authentication to detect and monitor sensitive information across networks, Mobile devices, clouds and other platforms when mobile, can not damage the legitimate user's efficiency, under the premise of denying illegal access.

Today's network security environment is not optimistic. Social engineering, passable security training, and the mistakes of well-meaning employees play a role that cannot be overlooked. In particular, untrained employees store unencrypted copies of confidential data on exposed servers and laptops, causing data leaks, placing sensitive information in untrusted locations, and, at best, protecting this information with a simple password.

Extinct borders

As companies become increasingly exposed to global attacks, the traditional corporate periphery is disappearing. Laptops have left defensible boundaries and have been the main cause of data damage. Removable storage devices can also leave boundaries, making it a much more daunting challenge to prevent data leaks. Today, consumer devices such as platform-changing tablet computers and smartphones are complicating issues, and data protection is more difficult.

Cloud computing, in the same way, is fading away from the boundaries of business. The data in the cloud is almost entirely mobile, and even those directly responsible for the data have little knowledge of their physical location, while attackers and thieves with advanced technical resources may be able to access sensitive data either directly or remotely.

Finally, the mobility of employees is also melting the traditional "human boundaries." Long-term employment in a company and loyalty to the company is no longer a feature of modern employees, even when the economy is booming. Also, job stress, economics, politics, career motivation can quickly turn a workaholic into a vicious "mole" that threatens business.

The plight of the chief Information Security Officer (CISOs)

The chief information security officer of an enterprise cannot respond to emerging threats and vanishing boundaries by restricting the availability of information assets or the use of new technologies. For enterprise assets, the value of information comes from use, not occupation. The widespread use of tablets, smartphones, and cloud computing is because they make individuals and companies more productive. The chief information security officer's strategy is to strike a balance between the protection of information and legitimate access, regardless of whether the information is static or dynamic. Information is the key to security.

Information-centric security essentials

The above diagram shows the three strategic issues that the Chief Security officer must address in order to address information-centric security issues. The first is to identify, that is, in order to protect information assets, enterprises must first identify information, including data warehouses, servers, terminals and other devices in the data, but also the data transmitted over the network. The second is protection, which, after confirming the data, can be secured by encryption to facilitate processing of data in unprotected locations. These two steps are not enough to protect the information completely, and a third step is to ensure that the information is available to authorized users, that is, the identity of the user, and authorization policies supported by robust authentication can prevent unauthorized access through advanced cryptographic protocols without increasing the user's burden.

(Responsible editor: The good of the Legacy)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.