当前位置:网站首页>Enterprise source code confidentiality scheme sharing
Enterprise source code confidentiality scheme sharing
2022-06-28 12:32:00 【Cnsidna. No.1】
Why source code management
Various embedded R & D and platform software R & D industries , Each has its own core data and core documents , User data and other sensitive information , These information data have the following commonalities :
It belongs to the core confidential information , In case of leakage, it will have a bad impact on
There are many types of core data , Source code data , Employees have high computer skills
A lot of data is in the business system , It's not a document
If you don't control , Designers and users can easily copy the data through various ways , Cause leakage .
Common secret related ways for R & D personnel
Because R & D personnel are more proficient in computers than ordinary office personnel , In addition to the common network , mail ,U disc ,QQ And other data diffusion methods , There are many other methods that are very easy for developers ( Not listed completely ):
Physical method :
Network cable direct connection , Unplug the network cable from the wall , Then connect directly to an uncontrolled computer ;
winPE start-up , Via CD or U Discoid winPE start-up , Even directly ISO The image starts .
virtual machine , Through installation VMWare virtual machine , Use peripherals in the virtual machine U disc , The Internet .
Other uncontrolled computers , That is, copy the data to other uncontrolled computers in the network , transit
Upload online , By building an upload server on the public network , Bypass Internet Behavior Management
Data distortion :
Write a console program , Print the code to DOS On the console, and then save the screen information as ;
Write the code to Log Log file , Or write code to shared memory , Then another program reads away .
Write interprocess communication program , Pass the code through socket, news ,LPC,COM,mutex, Shear plate , Pipeline and other interprocess communication methods , Transfer to send the data ;
adopt IIS/Tomcat etc. web The parser transfers , Publish the code data as a web page , Then browse the browser and save as , Or just write txt box , Copy all the code during initialization ;
Peripheral transfer
For embedded development scenarios , You can use the serial port ,U mouth , The network port burns the code to the equipment and leaks the secret
SDC Sandbox anti disclosure software
Developed by shenxinda SDC Sandbox leak proof products , Adopt kernel defense in depth , It is a driver level anti disclosure Software . Do not encrypt files , A sandbox is like a container , The container contains our confidential information . The documents we work on are all in sandboxes . The sandbox is completely isolated from ordinary computers . You might ask , What if I want to access the Internet , All programs to access the Internet are launched from the tray , Such as browser , Chat software, etc .SDC The sandbox is divided into the following parts : The management end , Confidential end , Documents are sent out , client .
The management end : Sandbox Control Center , Control all clients . The control of the client covers all aspects . Let me give you a few control functions : Reverse screenshot When someone wants to view some confidential information of the company remotely to the employee's computer ,SDC The client will control the remote software , Remote people see a black screen . But the computers on the staff side are in normal use . If you can control, you can let go . clipboard In sandbox mode, employees want to copy and paste company data such as files to the Internet through the clipboard ,SDC Sandbox is controlled , You can control the maximum number of clipping words .
Confidential end : Escort the server , Ordinary computers do not have access to confidential servers . Only sandbox computers can access , Do not encrypt the company's data , Protect data to the greatest extent .
client : Normal mode and sandbox mode . All software installation should be in sandbox mode . Work must be in sandbox mode , Because all the working data are on the encrypted disk , Sandbox can only be accessed in encrypted mode . In sandbox mode, it is isolated from the outside world . To access the Internet, only programs launched from the tray can , And follow the principle of only getting in and not getting out , Can get files from the Internet to the sandbox computer , However, to send documents from this machine to the Internet, you have to go through document approval .
Documents are sent out : A file distribution system is installed on a computer . The of this computer ip That is, the address where the document is sent out . Each sandbox employee matches an account number for sending out files . The specific approval method is not cumbersome here .

边栏推荐
- Unity Editor Extension Foundation, guilayout
- Some tips on string conversion
- Is there a threshold for opening futures accounts? How to open futures accounts safely on the Internet
- 杰理之wif 干扰蓝牙【篇】
- FineReport安装教程
- newest! Introduction and practical tutorial of point cloud processing based on open3d
- Zero basic C language (I)
- 模板_大整数乘法
- Asynctask experience summary
- Map排序工具类
猜你喜欢

为什么CAD导出PDF没有颜色

Unity Editor Extension Foundation, GUI

UGUI使用小技巧(六)Unity实现字符串竖行显示

ASP.NET CORE Study09

KDD 2022 | 图“预训练、提示、微调”范式下的图神经网络泛化框架

Bytev builds a dynamic digital twin network security platform -- helping network security development

Build your own website (18)

EMC RS485 interface EMC circuit design scheme

【Unity编辑器扩展实践】、利用txt模板动态生成UI代码

ByteV搭建动态数字孪生网络安全平台----助力网络安全发展
随机推荐
Unity Editor Extension Foundation, editorguilayout (II)
From simplekv to redis
如何获取泛型的类型
It really doesn't matter if a woman fails to pass the college entrance examination and buys thousands of villas in a counter attack
Unity releases webgl and wakes up keyboard input on the mobile terminal inputfield
【附源码+代码注释】误差状态卡尔曼滤波(error-state Kalman Filter),扩展卡尔曼滤波,实现GPS+IMU融合,EKF ESKF GPS+IMU
SHA256加密工具类
【C语言】判断三角形
PrecomputedTextCompat用法及原理
【Unity编辑器扩展基础】、EditorGUILayout (三)
【Unity编辑器扩展实践】、利用txt模板动态生成UI代码
几百行代码实现一个 JSON 解析器
性能测试-01-简介
登录接口存取token,清除token
MapReduce project case 3 - temperature statistics
【Unity编辑器扩展实践】、通过代码查找所有预制
Jerry's wif interferes with Bluetooth [chapter]
杰理之wif 干扰蓝牙【篇】
智联招聘基于 Nebula Graph 的推荐实践分享
MATLAB的官方网站上其实有很多MATLAB的学习和使用资料(文档、视频都有不少)