Electronic Document Security Solution
In the final analysis,
information safety
It is to protect the confidentiality, availability and integrity of information, that is, to ensure data security and ensure the continuous availability of information systems.
Information paction
Believable.
Although with the development of information security, the industry has unified that information security is not only information secrecy, but information confidentiality is still the most important part of information security, and is the premise of ensuring information security.
How do companies protect?
Electronic document
There are different practices and solutions for safety. According to the consulting experience of several projects, the safety and protection of electronic data are based on two means of technology and management.
The control of technical means before work ensures that employees can only carry out the pmission and management of electronic documents in accordance with the protection strategies formulated by the company. The management means are ex post control, that is, after technical means are broken, punishment and punishment are carried out through management means, and these disciplinary measures also play a deterrent role in mobile.
Technology control means
Most of the techniques used in electronic document security management include the use of terminal document encryption and decryption system and document management system to effectively ensure the online and offline security of electronic documents.
The basic requirements for implementing this solution are as follows:
The company adopts a set of document encryption and decryption system: completes the document encryption and decryption work;
The company adopts a mature document management system: completes the document declassified examination and approval work;
The company's internal office network is sound, all departments have the conditions of network office.
The basic scenario of the solution is as follows:
Every employee's computer usually works in encrypted environment, and the client of the encryption and decryption system is installed, and the server of the encryption and decryption system is built.
The files created and generated normally are encrypted by default.
In the company LAN, the circulation and pmission of documents are all carried out in ciphertext mode, and the circulation of plaintext documents is not allowed.
When a document is sent to a person or organization outside the unit, it is necessary to decrypt the application and approval. Only the document system that has been examined and approved will be decrypted automatically, and the decrypted plaintext will be sent back to the applicant.
When the same document needs to be distributed to a number of different external third parties, there is no need for repeated approval.
Schematic diagram of logic protection for electronic documents
Two, management and control means
The technical means to prevent data leakage from electronic documents is to set up a series of management systems and stipulate some requirements. At the same time, if someone violates, the company will give corresponding punishment according to the regulations, that is, increase the cost of malicious violation, and also play a deterrent role for those who intentionally violate the rules.
For example, by setting up the following management system to carry out corresponding constraints:
Document declassified management regulations
Regulations on the issuance of documents
Document printing management regulations
Regulations on punishment and management of illegal electronic documents
The protection scheme of the electronic document is equivalent to building a secure fence on the edge of the company's LAN to ensure that the unauthorized plaintext file does not flow out of the fence. Even if the ciphertext file flows out, it will not cause information leakage and risk. Because the ciphertext can not be decrypted and restored at the same time, thus effectively ensuring the security of the electronic document.
At the same time, file pfer and pmission are carried out by ciphertext in the company's content. Through the powerful permission management of document management system and the limitation of the distribution scope of documents, even if the encrypted documents are distributed outside the scope of the employees, they can not be opened and read, thus ensuring the safety of documents in the company's internal parts.
- Related reading
The Computer Is Automatically Turned Off. What Can I Do If The WORD Document Is Not Saved?
|The Process Of Writing Documents Is More Important Than The Document Itself.
|Controversy Over The Application Of The "Red Flag" Principle And The "Safe Haven" Principle
|- Shoe Express | China Shoes Factory Relocation BELLE Optimistic About Domestic Market
- News Republic | Everyone Responded: "Toxic" Proposition Is Not Established.
- Other | Yizhou Grasps The Historical Opportunity Of "Moving East And West To The West". Its Total Income Is 1 Billion 800 Million Yuan.
- Instant news | 2012Kingcamp Five Cotton Suits To Spend The Winter With You.
- Recommended topics | 發熱內衣的基本常識
- Local hotspot | Luxury Goods To Build Their Official Mall Is Mostly Just A Display.
- News Republic | 9 Men'S Clothing Inventory Of 3 Billion 800 Million Yuan, Clothing Enterprises Frequently Closed Shop Cheap Sale
- Local hotspot | Guangdong Spot Checks Footwear Products 16% Failed
- Industry dialysis | High Storage Causes Clothing Industry To "Shut Shop Tide"
- Instant news | Fujian Shishi Won The Title Of "China Garment Industry Demonstration Cluster"
- 2013 Leather Industry Asset Contribution Rate Ranks The Top Ten
- Italy Design Enters South China Sea Shoe Industry
- The Computer Is Automatically Turned Off. What Can I Do If The WORD Document Is Not Saved?
- Taobao Case, Guangzhou Clothing Brand Shop Blocked Online Shop
- Dalian: A New Fulcrum For Port Logistics Development
- The Process Of Writing Documents Is More Important Than The Document Itself.
- The Telephone Marketing Workflow Explains 8 Steps To Solve All The Customers.
- Telemarketing Improves Your Personality.
- Asia One Jewelry: All The Way To Love A Memorial
- Telephone Sales Staff Maintain Long-Term Relationship With Customers