Home >

Electronic Document Security Solution

2014/12/26 15:28:00 33

Information SecurityInformation PactionElectronic Document

In the final analysis,

information safety

It is to protect the confidentiality, availability and integrity of information, that is, to ensure data security and ensure the continuous availability of information systems.

Information paction

Believable.

Although with the development of information security, the industry has unified that information security is not only information secrecy, but information confidentiality is still the most important part of information security, and is the premise of ensuring information security.

How do companies protect?

Electronic document

There are different practices and solutions for safety. According to the consulting experience of several projects, the safety and protection of electronic data are based on two means of technology and management.

The control of technical means before work ensures that employees can only carry out the pmission and management of electronic documents in accordance with the protection strategies formulated by the company. The management means are ex post control, that is, after technical means are broken, punishment and punishment are carried out through management means, and these disciplinary measures also play a deterrent role in mobile.

Technology control means

Most of the techniques used in electronic document security management include the use of terminal document encryption and decryption system and document management system to effectively ensure the online and offline security of electronic documents.

The basic requirements for implementing this solution are as follows:

The company adopts a set of document encryption and decryption system: completes the document encryption and decryption work;

The company adopts a mature document management system: completes the document declassified examination and approval work;

The company's internal office network is sound, all departments have the conditions of network office.

The basic scenario of the solution is as follows:

Every employee's computer usually works in encrypted environment, and the client of the encryption and decryption system is installed, and the server of the encryption and decryption system is built.

The files created and generated normally are encrypted by default.

In the company LAN, the circulation and pmission of documents are all carried out in ciphertext mode, and the circulation of plaintext documents is not allowed.

When a document is sent to a person or organization outside the unit, it is necessary to decrypt the application and approval. Only the document system that has been examined and approved will be decrypted automatically, and the decrypted plaintext will be sent back to the applicant.

When the same document needs to be distributed to a number of different external third parties, there is no need for repeated approval.

Schematic diagram of logic protection for electronic documents

Two, management and control means

The technical means to prevent data leakage from electronic documents is to set up a series of management systems and stipulate some requirements. At the same time, if someone violates, the company will give corresponding punishment according to the regulations, that is, increase the cost of malicious violation, and also play a deterrent role for those who intentionally violate the rules.

For example, by setting up the following management system to carry out corresponding constraints:

Document declassified management regulations

Regulations on the issuance of documents

Document printing management regulations

Regulations on punishment and management of illegal electronic documents

The protection scheme of the electronic document is equivalent to building a secure fence on the edge of the company's LAN to ensure that the unauthorized plaintext file does not flow out of the fence. Even if the ciphertext file flows out, it will not cause information leakage and risk. Because the ciphertext can not be decrypted and restored at the same time, thus effectively ensuring the security of the electronic document.

At the same time, file pfer and pmission are carried out by ciphertext in the company's content. Through the powerful permission management of document management system and the limitation of the distribution scope of documents, even if the encrypted documents are distributed outside the scope of the employees, they can not be opened and read, thus ensuring the safety of documents in the company's internal parts.


  • Related reading

The Computer Is Automatically Turned Off. What Can I Do If The WORD Document Is Not Saved?

Document management
|
2014/12/26 15:24:00
173

The Process Of Writing Documents Is More Important Than The Document Itself.

Document management
|
2014/12/26 15:21:00
35

Controversy Over The Application Of The "Red Flag" Principle And The "Safe Haven" Principle

Document management
|
2014/11/26 17:28:00
29

Examining Document Copyright One By One Is A Difficult Problem.

Document management
|
2014/11/26 17:26:00
15

Document Sharing: To Facilitate More Order

Document management
|
2014/11/26 13:46:00
21
Read the next article

A Shoe Factory In Dongguan, Guangdong, The Owner Of The Fire Died In The Morning.

Yesterday morning 4 hours and 03 minutes, Dongguan Houjie Town Houjie village Xingyuan Road, a small shoe workshop fire, the boss xiaomou sent to the hospital died. The relatives of the deceased suspect arson, and the Fire Department of Houjie has ruled out a wire short fire and said the specific reason remains to be investigated. This is the two time in a month that Houjie has died.