In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-02 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
In the last article, we talked about how to protect corporate secrets through document rights management. does it mean that corporate information only needs to do a good job of rights management to prevent disclosure? The answer is obviously no. Especially in today's, there are continuous interactions between enterprises and frequent exchanges of information. How to protect the information security of these outgoing documents is a headache for managers, including the following cases. Case study: Z Enterprise is a furniture design company, which is well-known in the industry. Among them, the design department and the sales department are not only the core departments of the company, but also the two departments with the closest contact with the outside world. Since the furniture manufacturing link of enterprise An is produced by the factory, it is necessary for the Z enterprise to send the drawings to the factory after each new product design, and then the factory will produce the furniture according to the design drawings. finally, the Z enterprise will push the products to the market. However, when a new furniture product was about to be put on the market, I was surprised to find that Company B had taken the first step to launch new furniture similar to its own design. The management of Z enterprise is extremely suspicious that the company's design drawings have been leaked. So immediately start the investigation from within the enterprise, and focus on the design department and sales department. But all the evidence suggests that employees in both departments did not leak, which means that the possibility of internal leaks has been ruled out. It was only then that the management began to turn the attention of the investigation to the outside of the enterprise-- the contract factory. After detailed investigation with multi-assistance, it is finally confirmed that the design drawings were sent to Company B by some staff of the factory in order to get high remuneration. Enterprise Z later announced that it would never cooperate with the factory and claimed compensation for economic losses from the factory and Enterprise B. The solution: the leakage of Z enterprise design drawings is a relatively common leakage event in business communication and cooperation, and its probability depends not only on the cleverness of the means of document management and control, but also on the safety management level of the other enterprise. I don't think it is reliable to rely on partners to control everything. This requires the enterprise itself to protect corporate secrets through the control point of view of outgoing documents. I still use the document outgoing management function of IP-guard to simulate. First of all, the importance of the documents outsourced by enterprises and the credibility of the outgoing objects are different, so it is necessary to provide different forms of outsourcing. IP-guard document outsourcing includes plaintext decryption and ciphertext, which can be selected according to the trust of partners or customers and the security requirements of encrypted documents. For encrypted documents with high security requirements of √, you can choose to install an outgoing viewer, bind it with the computer hardware of the recipient, and pass the authentication code to restrict the transmission of documents at will after being sent out. Documents with low √ security requirements do not need authorization code authentication, as long as you install an outgoing viewer or get the outgoing documents in exe format, you can view them directly. No matter what kind of outgoing method √ is, you can send out files to set restrictions such as viewing period, number of times, printing, screenshot, copying and other control settings. If the limit is exceeded, the document cannot be viewed normally. There are trusted partners or customers in √ enterprises, and encrypted files can be sent through whitelist, so that they can be audited without affecting productivity. In this way, the security of outgoing documents can be strictly protected. Event reflection: of course, the protection of enterprise information is by no means a logic to change a little bit wrong, but needs to form a complete and comprehensive management system, and requires the combination of prevention and control. According to the current situation of Z enterprise, the information leakage loophole is not only reflected in the external distribution of documents, but also the internal dissemination of documents, application servers, mobile office and so on may become the leakage channels of enterprises. Therefore, in order to really protect trade secrets in the case of in-depth commercial exchanges, it is not enough to rely on the management of outgoing documents, but to intercept the leakage outlet as much as possible to reduce the possibility of leakage from the source. In the construction of the information anti-disclosure system, IP-guard has been thinking like this, adhering to the principle of close combination of audit, control and encryption protection, and can carry out encryption, control and audit at different levels, no matter the core department or the ordinary department, the external dissemination of information or the internal dissemination of the department.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.