当前位置:网站首页>Analysis of environmental encryption technology
Analysis of environmental encryption technology
2022-07-04 22:39:00 【cnsinda_ sdc】
The development of data security products can be roughly divided into two categories : Document encryption products and Sandboxes ( Or environmental encryption ) product . The design concepts and functions of the two types of products are quite different . From the application in recent years , Data leakage prevention The project wants to be implemented successfully , In addition to choosing the right products , It needs more attention and cooperation from customers . Without knowing the product , Rush to select products and implement , The project failure rate is almost 100%. There are countless such negative cases . about Sandbox Kind of product , All data without any controlled strategy , Will be transmitted and applied in clear text . When offline, the administrator only needs to uninstall Encryption software , Quickly eliminate the impact of encryption system on the original information system , The offline risk is very low .
Sandbox safety products , I personally recommend shenxinda SDC Sandbox For large and medium-sized R & D and manufacturing enterprises , The concept of overall protection products is more applicable . in the final analysis , Overall protection products pay more attention to the matching and integration with the existing information system and management system , Document encryption This kind of product pays more attention to the influence and change of the operator's use habits , therefore , The former requires enterprises to make certain investment and concessions to ensure Leak proof system The successful launch , But once online , The operation will be smoother , Later management and maintenance are easier ; The latter is more in line with the current customers' requirements for Encryption products The general view of ” No data leakage , It doesn't affect the work “, But the potential risks are great ; The former is more like a system , The latter is more like software , The former is more suitable for the overall management needs of large and medium-sized enterprises , The latter is more suitable for the rapid application of small-scale enterprises .
The project risks are divided into the following categories :
1. Encrypt file Crack the risk
Document encryption is to control the application software , The generated document is written into the key when it is saved , But when the ciphertext is opened on a computer with an encryption product client , The encryption software will automatically decrypt the ciphertext first , Then it can be opened normally , in other words , The encrypted file , There is still plaintext in memory , Can pass “ Read memory ” Extract plaintext directly , Bypass encryption , Low security level ; Sandbox encryption Adopt overall protection , When the client computer is in use, it cannot take the file out of the sandbox environment , But it does not affect local use , Files can only flow in a sandbox environment , It's quite difficult to crack , High level of security .
2. Hardware debugging risk
Now more and more customer needs involve hardware debugging and development , Including development board burn ,app Development, etc. , The increasing number of hardware equipment also leads to the increasing risk of disclosure . Document encryption encrypts the contents of burning and debugging , If normal commissioning is required , Must have Decrypt files debugging , Thus causing problems such as counterfeiting hardware devices , Risks such as debugging documents . Sandbox products take over the file export of the whole computer , When connection debugging is needed , The whole process is still under protection , Debugging files and burning files will be recorded clearly , Reduce the risk of disclosure .
3. Risk of data corruption
Encryption requires decryption , This creates the risk of decryption failure , Will cause data corruption , Greatly affect the work of employees , The product cannot be launched . At this point , Sandbox products are much better than document encryption , Document encryption has direct and frequent encryption and decryption of files , High data corruption rate , The encryption of environmental encryption products is carried out at the data transmission boundary , Do not process the file itself , The file will not be damaged . From previous project experience , File destruction has almost become synonymous with document encryption products and an insurmountable bottleneck ( Especially in R & D and manufacturing enterprises with complex terminal environment ), This will not happen to environmental encryption products .
For sandbox products , All data without any controlled strategy , Will be transmitted and applied in clear text . When offline, the administrator only needs to uninstall the encryption software , Quickly eliminate the impact of encryption system on the original information system , The offline risk is very low .
Through the above comparison , You can almost draw a conclusion , For large and medium-sized R & D and manufacturing enterprises , The concept of overall protection products is more applicable . in the final analysis , Overall protection products pay more attention to the matching and integration with the existing information system and management system , Document encryption products pay more attention to the impact and change of operators' use habits , therefore , The former requires enterprises to make certain investment and concessions to ensure the smooth launch of the anti disclosure system , But once online , The operation will be smoother , Later management and maintenance are easier ; The latter is more in line with the current general view of customers on encryption products ” No data leakage , It doesn't affect the work “, But the potential risks are great ; The former is more like a system , The latter is more like software , The former is more suitable for the overall management needs of large and medium-sized enterprises , The latter is more suitable for the rapid application of small-scale enterprises .
边栏推荐
- In Linux, I call odspcmd to query the database information. How to output silently is to only output values. Don't do this
- Logo special training camp Section V font structure and common design techniques
- Common shortcut keys for hbuilder x
- Google Earth Engine(GEE)——基于 MCD64A1 的 GlobFire 日常火灾数据集
- BigFilter全局交易防重组件的介绍与应用
- 共创软硬件协同生态:Graphcore IPU与百度飞桨的“联合提交”亮相MLPerf
- 新版判断PC和手机端代码,手机端跳转手机端,PC跳转PC端最新有效代码
- SPSS installation and activation tutorial (including network disk link)
- How diff are the contents of the same configuration item in different environments?
- Why is Dameng data called the "first share" of domestic databases?
猜你喜欢

NFT insider 64: e-commerce giant eBay submitted an NFT related trademark application, and KPMG will invest $30million in Web3 and metauniverse

Close system call analysis - Performance Optimization

将QA引入软件开发生命周期是工程师要遵循的最佳实践

How to transfer to software testing, one of the high paying jobs in the Internet? (software testing learning roadmap attached)

LOGO特訓營 第三節 首字母創意手法

堆排序代码详解

Why is Dameng data called the "first share" of domestic databases?

The sandbox has reached a cooperation with digital Hollywood to accelerate the economic development of creators through human resource development

串口数据帧

攻防世界 misc 进阶区 2017_Dating_in_Singapore
随机推荐
Summary of index operations in mongodb
[cooking record] - stir fried 1000 pieces of green pepper
Force buckle_ Palindrome number
国产数据库乱象
Attack and defense world misc advanced grace-50
With this PDF, we finally got offers from eight major manufacturers, including Alibaba, bytek and Baidu
LOGO特訓營 第一節 鑒別Logo與Logo設計思路
LOGO特训营 第三节 首字母创意手法
Force buckle 2_ 1480. Dynamic sum of one-dimensional array
Prosperity is exhausted, things are right and people are wrong: where should personal webmasters go
集群的概述与定义,一看就会
PostgreSQL server programming aggregation and grouping
Logo Camp d'entraînement section 3 techniques créatives initiales
新版判断PC和手机端代码,手机端跳转手机端,PC跳转PC端最新有效代码
攻防世界 MISC 进阶区 Ditf
PMO: compare the sample efficiency of 25 molecular optimization methods
Solana chain application crema was shut down due to hacker attacks
微服务--开篇
More than 30 institutions jointly launched the digital collection industry initiative. How will it move forward in the future?
Redis sentinel simply looks at the trade-offs between distributed high availability and consistency