• <abbr id="ck0wi"><source id="ck0wi"></source></abbr>
    <li id="ck0wi"></li>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li><button id="ck0wi"><input id="ck0wi"></input></button>
  • <abbr id="ck0wi"></abbr>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li>
  • Home >

    Electronic Document Security Solution

    2014/12/26 15:28:00 33

    Information SecurityInformation PactionElectronic Document

    In the final analysis,

    information safety

    It is to protect the confidentiality, availability and integrity of information, that is, to ensure data security and ensure the continuous availability of information systems.

    Information paction

    Believable.

    Although with the development of information security, the industry has unified that information security is not only information secrecy, but information confidentiality is still the most important part of information security, and is the premise of ensuring information security.

    How do companies protect?

    Electronic document

    There are different practices and solutions for safety. According to the consulting experience of several projects, the safety and protection of electronic data are based on two means of technology and management.

    The control of technical means before work ensures that employees can only carry out the pmission and management of electronic documents in accordance with the protection strategies formulated by the company. The management means are ex post control, that is, after technical means are broken, punishment and punishment are carried out through management means, and these disciplinary measures also play a deterrent role in mobile.

    Technology control means

    Most of the techniques used in electronic document security management include the use of terminal document encryption and decryption system and document management system to effectively ensure the online and offline security of electronic documents.

    The basic requirements for implementing this solution are as follows:

    The company adopts a set of document encryption and decryption system: completes the document encryption and decryption work;

    The company adopts a mature document management system: completes the document declassified examination and approval work;

    The company's internal office network is sound, all departments have the conditions of network office.

    The basic scenario of the solution is as follows:

    Every employee's computer usually works in encrypted environment, and the client of the encryption and decryption system is installed, and the server of the encryption and decryption system is built.

    The files created and generated normally are encrypted by default.

    In the company LAN, the circulation and pmission of documents are all carried out in ciphertext mode, and the circulation of plaintext documents is not allowed.

    When a document is sent to a person or organization outside the unit, it is necessary to decrypt the application and approval. Only the document system that has been examined and approved will be decrypted automatically, and the decrypted plaintext will be sent back to the applicant.

    When the same document needs to be distributed to a number of different external third parties, there is no need for repeated approval.

    Schematic diagram of logic protection for electronic documents

    Two, management and control means

    The technical means to prevent data leakage from electronic documents is to set up a series of management systems and stipulate some requirements. At the same time, if someone violates, the company will give corresponding punishment according to the regulations, that is, increase the cost of malicious violation, and also play a deterrent role for those who intentionally violate the rules.

    For example, by setting up the following management system to carry out corresponding constraints:

    Document declassified management regulations

    Regulations on the issuance of documents

    Document printing management regulations

    Regulations on punishment and management of illegal electronic documents

    The protection scheme of the electronic document is equivalent to building a secure fence on the edge of the company's LAN to ensure that the unauthorized plaintext file does not flow out of the fence. Even if the ciphertext file flows out, it will not cause information leakage and risk. Because the ciphertext can not be decrypted and restored at the same time, thus effectively ensuring the security of the electronic document.

    At the same time, file pfer and pmission are carried out by ciphertext in the company's content. Through the powerful permission management of document management system and the limitation of the distribution scope of documents, even if the encrypted documents are distributed outside the scope of the employees, they can not be opened and read, thus ensuring the safety of documents in the company's internal parts.


    • Related reading

    The Computer Is Automatically Turned Off. What Can I Do If The WORD Document Is Not Saved?

    Document management
    |
    2014/12/26 15:24:00
    173

    The Process Of Writing Documents Is More Important Than The Document Itself.

    Document management
    |
    2014/12/26 15:21:00
    35

    Controversy Over The Application Of The "Red Flag" Principle And The "Safe Haven" Principle

    Document management
    |
    2014/11/26 17:28:00
    29

    Examining Document Copyright One By One Is A Difficult Problem.

    Document management
    |
    2014/11/26 17:26:00
    15

    Document Sharing: To Facilitate More Order

    Document management
    |
    2014/11/26 13:46:00
    21
    Read the next article

    A Shoe Factory In Dongguan, Guangdong, The Owner Of The Fire Died In The Morning.

    Yesterday morning 4 hours and 03 minutes, Dongguan Houjie Town Houjie village Xingyuan Road, a small shoe workshop fire, the boss xiaomou sent to the hospital died. The relatives of the deceased suspect arson, and the Fire Department of Houjie has ruled out a wire short fire and said the specific reason remains to be investigated. This is the two time in a month that Houjie has died.

    主站蜘蛛池模板: 国产麻豆交换夫妇| 欧美日本国产VA高清CABAL| 成人一级黄色毛片| 四虎国产精品永久在线播放 | 中文字幕亚洲精品资源网| 香蕉久久综合精品首页| 日本无遮挡边做边爱边摸| 国产午夜激无码av毛片| 久久精品国产亚洲7777| 青青青国产免费一夜七次郎| 日本免费电影一区| 国产一区二区三区电影| 中文字幕免费在线观看动作大片| 舔舔小核欲成欢| 悠悠在线观看精品视频| 免费在线观看成人| 99久久精品国产片久人| 欧美日韩性猛交xxxxx免费看| 国产精品美女久久久| 亚洲伊人久久大香线蕉影院| 日本xxxxbbbb| 日本特黄特黄刺激大片| 啊灬用力灬啊灬啊灬啊| www香蕉视频| 欧美激情xxxx性bbbb| 国产浮力影院第一页| 久久夜色精品国产欧美乱| 色妺妺在线视频| 妈妈的柔润小说在线阅读| 亚洲精品第一国产综合野| 又粗又硬又爽的三级视频| 日韩精品无码成人专区| 国产一区二区在线观看app| 一本久久精品一区二区| 滴着奶水做着爱中文字幕| 国产精品对白刺激久久久| 久久精品一区二区| 精品人成电影在线观看| 国产色综合天天综合网| 久人人爽人人爽人人片AV| 美女扒开尿口让男人捅|