In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
1. Security of key
The security of encrypted files is guaranteed by algorithms and keys. Encryption algorithms generally use internationally popular algorithms with high security, and these algorithms are public, so exactly the security of encryption algorithms really depends on the key.
Whether the key of the anti-disclosure software is secure or not should solve the following problems:
To ensure that two sets of the same software environment can not be built, that is, to ensure that different enterprises can have different encryption keys, and that different enterprises can not open each other's encrypted files even if they install the same encryption software.
It is necessary to ensure that manufacturers cannot decrypt the ciphertext even if they get it. A lot of anti-disclosure software, enterprises can not set their own keys. After the manufacturer gets the ciphertext, it can be cracked according to the characteristics of the software itself. This kind of anti-disclosure software is in vain and can not really protect the information security of the enterprise.
If the key is compromised, there should be remedial measures, such as the key can support the change, so that the key can be easily replaced by the enterprise.
2. The control of the ways of leaking secrets.
The quality of leakage control is an important test point for selecting anti-disclosure software.
Corporate information is often leaked through the following channels:
Copy of removable storage media, such as USB disk, removable hard disk, etc.
Use the system screenshot tool to transmit the relevant document information to the outside through various network tools such as QQ, MSN, E-mail and so on.
Print the document away through the printer
Take it away after being converted by a virtual printer
The anti-disclosure software must manage the means of disclosure and prohibit terminals from using specified devices, including USB storage device restrictions, CD-ROM drive restrictions, floppy disk drive restrictions, and printer restrictions.
Virtual printer is an important output device in enterprises at present, but because virtual printer supports most format files, it is a major threat to information security. In addition to the control of conventional ways of disclosure, anti-disclosure software must also control virtual printers: prohibit virtual printers or even use virtual printers in the form of ciphertext.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.