Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

The Security of Enterprise Anti-leakage Software

2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

1. Security of key

The security of encrypted files is guaranteed by algorithms and keys. Encryption algorithms generally use internationally popular algorithms with high security, and these algorithms are public, so exactly the security of encryption algorithms really depends on the key.

Whether the key of the anti-disclosure software is secure or not should solve the following problems:

To ensure that two sets of the same software environment can not be built, that is, to ensure that different enterprises can have different encryption keys, and that different enterprises can not open each other's encrypted files even if they install the same encryption software.

It is necessary to ensure that manufacturers cannot decrypt the ciphertext even if they get it. A lot of anti-disclosure software, enterprises can not set their own keys. After the manufacturer gets the ciphertext, it can be cracked according to the characteristics of the software itself. This kind of anti-disclosure software is in vain and can not really protect the information security of the enterprise.

If the key is compromised, there should be remedial measures, such as the key can support the change, so that the key can be easily replaced by the enterprise.

2. The control of the ways of leaking secrets.

The quality of leakage control is an important test point for selecting anti-disclosure software.

Corporate information is often leaked through the following channels:

Copy of removable storage media, such as USB disk, removable hard disk, etc.

Use the system screenshot tool to transmit the relevant document information to the outside through various network tools such as QQ, MSN, E-mail and so on.

Print the document away through the printer

Take it away after being converted by a virtual printer

The anti-disclosure software must manage the means of disclosure and prohibit terminals from using specified devices, including USB storage device restrictions, CD-ROM drive restrictions, floppy disk drive restrictions, and printer restrictions.

Virtual printer is an important output device in enterprises at present, but because virtual printer supports most format files, it is a major threat to information security. In addition to the control of conventional ways of disclosure, anti-disclosure software must also control virtual printers: prohibit virtual printers or even use virtual printers in the form of ciphertext.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report