This is presentation on security of documents over internet, how yo protect them and achieve organizational goal by maintaining confidentiality, providing access control and get secure with the use of firewall.
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
Document security & firewall
1. Institute of Management StudiesInstitute of Management Studies
DAVV, IndoreDAVV, Indore
Document Security And FirewallDocument Security And Firewall
Session - 2014Session - 2014
Presentation to:
Achal Hardia
Faculty IMS, DAVV
Presentation By:
Rupa Dwivedi
Sakshi Jain
Sanjay Singh
Shubhangi Mahajan
E-Commerce, 2nd
Sem
2. ContentContent
• Introduction to Document Security
• Criteria of Document Security
• Techniques of Document Security
• Firewall
• Types of Firewall
• Conclusion
3. Introduction to documentIntroduction to document
SecuritySecurity
Document Security: The protection of documents
against the deliberate or accidental access of
unauthorized persons.
Main reason why organization need to address
the security of electronically shared documents:
◦ Regulatory requirements
◦ Return on investment (ROI)
◦ Information security
4. Regulatory requirements
Many companies are directly or indirectly affected by
government mandates and regulations for providing
consumer privacy.
Return on investment (ROI)
◦ Significant ROI can be achieved by migrating to electronic
business processes
◦ Automated workflows allow prospects, customers,
partners, and suppliers to participate, enabling
organizations to reap significant cost savings while
improving customer satisfaction and loyalty
Information security
Thefts of proprietary information are increasing, which can
jeopardize revenue, competitive advantage, and customer
relationships; generate negative publicity; and result in
significant penalties and fines for failure to comply with
privacy laws.
5. How to provide document securityHow to provide document security
• The following criteria define persistent document security:
– Confidentiality—Who should have access to the
document?
– Authorization—What permissions does the user have for
working with the document?
– Accountability—What has the recipient done with the
document?
– Integrity—How do you know if the document has been
altered?
– Non-repudiation—Can the signatory deny signing the
document?
– Authenticity—How do you know where the document
came from?
8. Document ControlDocument Control
Encryption is the process of transforming
information (plaintext) into an
incomprehensible form (ciphertext).
Encryption is an effective technique for
managing document access.
Decryption is the reverse process that
transforms ciphertext back to the original
plaintext.
Cryptography refers to the two processes
of encryption and decryption and its
implementation is referred to as a
cryptosystem.
9. Digital signaturesDigital signatures
When enterprises distribute documents electronically,
it is often important that recipients can verify:
◦ That the content has not been altered (integrity)
◦ That the document is coming from the actual
person who sent it (authenticity)
◦ That an individual who has signed the document
cannot deny the signature(non-repudiation)
10. Apply code
Create unique hash/ ID of electronic
document
Apply digital signature
Confidentiality
Authorization
Accountability
Integrity
Authenticity
Non-repudiation
• Sign signature page
• Submit 15-20 pages (non-
secure) with signature
page to LoC
• Only page authenticated is
signature page
Digital Signatures
Complete
document is
locked and
verifiable
11. Signature ProcessSignature Process
• Data is converted to pdf
document
• A unique hash key is computed
for pdf document
• User supplied key is used to
encrypt the hash key
• The encrypted hash key is
attached to the pdf document
• Document is digitally signed
12. Conclusion To DocumentConclusion To Document
SecuritySecurity
A significantly more effective solution for protecting an
electronic document is to assign security parameters that are an
integral part of the document itself.
By applying security parameters to the individual document,
organizations gain greater assurance in the confidentiality,
authenticity, and integrity of electronically shared documents in
addition to securing the communication line or storage location.
As organizations accelerate online processing, External security
solutions deliver document control and digital signature services
that simplify the process of protecting sensitive electronic
documents and forms.
13. What is firewall ?What is firewall ?
A firewall is a software feature designed
to control the flow of traffic into and out-of
a network.
A firewall is a specially programmed
router that sits between a site and the
rest of the network .
It is used to enforce security policy .
21. Free Firewall Software PackagesFree Firewall Software Packages
IP Chains & IP Tables
◦ comes with most linux distributions
SELinux (Security Enabled Linux – NSA)
◦ comes with some Linux distributions
Fedora, RedHat
22. Home & Personal Routers Provide
◦ configurable packet filtering
◦ NAT/DHCP
Enterprise Firewalls
Cisco PIX (product family)
MS Internet Security & Acceleration Server
23. ConclusionConclusion
It is clear that some form of security for
private networks connected to the
Internet is essential
A firewall is an important and necessary
part of that security, but cannot be
expected to perform all the required
security functions.