SlideShare une entreprise Scribd logo
1  sur  24
Institute of Management StudiesInstitute of Management Studies
DAVV, IndoreDAVV, Indore
Document Security And FirewallDocument Security And Firewall
Session - 2014Session - 2014
Presentation to:
Achal Hardia
Faculty IMS, DAVV
Presentation By:
Rupa Dwivedi
Sakshi Jain
Sanjay Singh
Shubhangi Mahajan
E-Commerce, 2nd
Sem
ContentContent
• Introduction to Document Security
• Criteria of Document Security
• Techniques of Document Security
• Firewall
• Types of Firewall
• Conclusion
Introduction to documentIntroduction to document
SecuritySecurity
Document Security: The protection of documents
against the deliberate or accidental access of
unauthorized persons.
 Main reason why organization need to address
the security of electronically shared documents:
◦ Regulatory requirements
◦ Return on investment (ROI)
◦ Information security
Regulatory requirements
Many companies are directly or indirectly affected by
government mandates and regulations for providing
consumer privacy.
Return on investment (ROI)
◦ Significant ROI can be achieved by migrating to electronic
business processes
◦ Automated workflows allow prospects, customers,
partners, and suppliers to participate, enabling
organizations to reap significant cost savings while
improving customer satisfaction and loyalty
Information security
Thefts of proprietary information are increasing, which can
jeopardize revenue, competitive advantage, and customer
relationships; generate negative publicity; and result in
significant penalties and fines for failure to comply with
privacy laws.
How to provide document securityHow to provide document security
• The following criteria define persistent document security:
– Confidentiality—Who should have access to the
document?
– Authorization—What permissions does the user have for
working with the document?
– Accountability—What has the recipient done with the
document?
– Integrity—How do you know if the document has been
altered?
– Non-repudiation—Can the signatory deny signing the
document?
– Authenticity—How do you know where the document
came from?
Security Techniques
Document control
Digital signatures
Document ControlDocument Control
Encryption is the process of transforming
information (plaintext) into an
incomprehensible form (ciphertext).
Encryption is an effective technique for
managing document access.
Decryption is the reverse process that
transforms ciphertext back to the original
plaintext.
Cryptography refers to the two processes
of encryption and decryption and its
implementation is referred to as a
cryptosystem.
Digital signaturesDigital signatures
 When enterprises distribute documents electronically,
it is often important that recipients can verify:
◦ That the content has not been altered (integrity)
◦ That the document is coming from the actual
person who sent it (authenticity)
◦ That an individual who has signed the document
cannot deny the signature(non-repudiation)
Apply code
Create unique hash/ ID of electronic
document
Apply digital signature
Confidentiality
Authorization
Accountability
Integrity
Authenticity
Non-repudiation
• Sign signature page
• Submit 15-20 pages (non-
secure) with signature
page to LoC
• Only page authenticated is
signature page
Digital Signatures
Complete
document is
locked and
verifiable
Signature ProcessSignature Process
• Data is converted to pdf
document
• A unique hash key is computed
for pdf document
• User supplied key is used to
encrypt the hash key
• The encrypted hash key is
attached to the pdf document
• Document is digitally signed
Conclusion To DocumentConclusion To Document
SecuritySecurity
 A significantly more effective solution for protecting an
electronic document is to assign security parameters that are an
integral part of the document itself.
 By applying security parameters to the individual document,
organizations gain greater assurance in the confidentiality,
authenticity, and integrity of electronically shared documents in
addition to securing the communication line or storage location.
 As organizations accelerate online processing, External security
solutions deliver document control and digital signature services
that simplify the process of protecting sensitive electronic
documents and forms.
What is firewall ?What is firewall ?
 A firewall is a software feature designed
to control the flow of traffic into and out-of
a network.
 A firewall is a specially programmed
router that sits between a site and the
rest of the network .
 It is used to enforce security policy .
HOW FIREWALL WORK ?HOW FIREWALL WORK ?
Types of firewalls ?Types of firewalls ?
Packet filters
Circuit level
Application level
Stateful multilayer
Packet FilteringPacket Filtering
Circuit Level GatewayCircuit Level Gateway
Application LevelApplication Level
Stateful MultilayerStateful Multilayer
General PerformanceGeneral Performance
Free Firewall Software PackagesFree Firewall Software Packages
IP Chains & IP Tables
◦ comes with most linux distributions
SELinux (Security Enabled Linux – NSA)
◦ comes with some Linux distributions
 Fedora, RedHat
Home & Personal Routers Provide
◦ configurable packet filtering
◦ NAT/DHCP
Enterprise Firewalls
 Cisco PIX (product family)
 MS Internet Security & Acceleration Server
ConclusionConclusion
It is clear that some form of security for
private networks connected to the
Internet is essential
A firewall is an important and necessary
part of that security, but cannot be
expected to perform all the required
security functions.
Document security & firewall

Contenu connexe

Tendances

The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security Tripwire
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)Ahmed Banafa
 
EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)Kimberly Simon MBA
 
SABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summarySABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summarySABSAcourses
 
Information security[277]
Information security[277]Information security[277]
Information security[277]Timothy Warren
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By DesignNalneesh Gaur
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
The information security audit
The information security auditThe information security audit
The information security auditDhani Ahmad
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionMarketingArrowECS_CZ
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full pptShahbaz Khan
 
Firewall protection
Firewall protectionFirewall protection
Firewall protectionVC Infotech
 
Siem ppt
Siem pptSiem ppt
Siem pptkmehul
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Data protection ppt
Data protection pptData protection ppt
Data protection pptgrahamwell
 

Tendances (20)

The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)EU's General Data Protection Regulation (GDPR)
EU's General Data Protection Regulation (GDPR)
 
Data security
Data securityData security
Data security
 
SABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summarySABSA: Key features, advantages & benefits summary
SABSA: Key features, advantages & benefits summary
 
Information security[277]
Information security[277]Information security[277]
Information security[277]
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By Design
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
The information security audit
The information security auditThe information security audit
The information security audit
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
Sensitive data
Sensitive dataSensitive data
Sensitive data
 
Privacy and Data Protection
Privacy and Data ProtectionPrivacy and Data Protection
Privacy and Data Protection
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
Siem ppt
Siem pptSiem ppt
Siem ppt
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
Information security awareness, middle management
Information security awareness, middle managementInformation security awareness, middle management
Information security awareness, middle management
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 

En vedette (6)

Firewalls
FirewallsFirewalls
Firewalls
 
Firewalls
FirewallsFirewalls
Firewalls
 
Bottom up parser
Bottom up parserBottom up parser
Bottom up parser
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
Introduction of firewall slides
Introduction of firewall slidesIntroduction of firewall slides
Introduction of firewall slides
 

Similaire à Document security & firewall

Whitepaper: Secure By Design
Whitepaper: Secure By DesignWhitepaper: Secure By Design
Whitepaper: Secure By DesignDocuSign
 
Why eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfWhy eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfDrysign By Exela
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYDEEPAK948083
 
Whitepaper: Best Practices for Electronic Document Management and Security
Whitepaper: Best Practices for Electronic Document Management and SecurityWhitepaper: Best Practices for Electronic Document Management and Security
Whitepaper: Best Practices for Electronic Document Management and SecurityDocuSign
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
 
Strengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfStrengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfDrysign By Exela
 
DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2Lucas Gritziotis
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authorityKrutiShah114
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Brianna Johnson
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabiltiesSneha .
 
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ..."Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...PROIDEA
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
Hardware Authentication
Hardware AuthenticationHardware Authentication
Hardware AuthenticationCoder Tech
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network securityrhassan84
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network securityrhassan84
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methodslapao2014
 

Similaire à Document security & firewall (20)

Whitepaper: Secure By Design
Whitepaper: Secure By DesignWhitepaper: Secure By Design
Whitepaper: Secure By Design
 
Why eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfWhy eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdf
 
Ppt
PptPpt
Ppt
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
Whitepaper: Best Practices for Electronic Document Management and Security
Whitepaper: Best Practices for Electronic Document Management and SecurityWhitepaper: Best Practices for Electronic Document Management and Security
Whitepaper: Best Practices for Electronic Document Management and Security
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
Strengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfStrengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdf
 
DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
 
Widepoint orc thales webinar 111313d - nov 2013
Widepoint orc thales webinar 111313d - nov 2013Widepoint orc thales webinar 111313d - nov 2013
Widepoint orc thales webinar 111313d - nov 2013
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
ProofeasyPPT.pptx
ProofeasyPPT.pptxProofeasyPPT.pptx
ProofeasyPPT.pptx
 
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ..."Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Security problems.pptx
Security problems.pptxSecurity problems.pptx
Security problems.pptx
 
Hardware Authentication
Hardware AuthenticationHardware Authentication
Hardware Authentication
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Impact of digital certificate in network security
Impact of digital certificate in network securityImpact of digital certificate in network security
Impact of digital certificate in network security
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 

Dernier

APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27APNIC
 
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样AS
 
I’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 ShirtI’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 Shirtrahman018755
 
Free scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsFree scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsrahman018755
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfOndejSur
 
一比一原版(Exon毕业证书)英国埃克塞特大学毕业证如何办理
一比一原版(Exon毕业证书)英国埃克塞特大学毕业证如何办理一比一原版(Exon毕业证书)英国埃克塞特大学毕业证如何办理
一比一原版(Exon毕业证书)英国埃克塞特大学毕业证如何办理gfhdsfr
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理AS
 
Free on Wednesdays T Shirts Free on Wednesdays Sweatshirts
Free on Wednesdays T Shirts Free on Wednesdays SweatshirtsFree on Wednesdays T Shirts Free on Wednesdays Sweatshirts
Free on Wednesdays T Shirts Free on Wednesdays Sweatshirtsrahman018755
 
🍑👄Dehradun Esℂorts Serviℂe☎️9315791090🍑👄 ℂall Girl serviℂe in ☎️Dehradun ℂall...
🍑👄Dehradun Esℂorts Serviℂe☎️9315791090🍑👄 ℂall Girl serviℂe in ☎️Dehradun ℂall...🍑👄Dehradun Esℂorts Serviℂe☎️9315791090🍑👄 ℂall Girl serviℂe in ☎️Dehradun ℂall...
🍑👄Dehradun Esℂorts Serviℂe☎️9315791090🍑👄 ℂall Girl serviℂe in ☎️Dehradun ℂall...Mumbai Escorts
 
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书Fir
 
AI Generated 3D Models | AI 3D Model Generator
AI Generated 3D Models | AI 3D Model GeneratorAI Generated 3D Models | AI 3D Model Generator
AI Generated 3D Models | AI 3D Model Generator3DailyAI1
 
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理Fir
 
一比一原版(PSU毕业证书)美国宾州州立大学毕业证如何办理
一比一原版(PSU毕业证书)美国宾州州立大学毕业证如何办理一比一原版(PSU毕业证书)美国宾州州立大学毕业证如何办理
一比一原版(PSU毕业证书)美国宾州州立大学毕业证如何办理Fir
 
一比一定制波士顿学院毕业证学位证书
一比一定制波士顿学院毕业证学位证书一比一定制波士顿学院毕业证学位证书
一比一定制波士顿学院毕业证学位证书A
 
原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样A
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxChloeMeadows1
 
Thank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsThank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsrahman018755
 
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.Tortogel
 
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书B
 
Discovering OfficialUSA.com Your Go-To Resource.pdf
Discovering OfficialUSA.com Your Go-To Resource.pdfDiscovering OfficialUSA.com Your Go-To Resource.pdf
Discovering OfficialUSA.com Your Go-To Resource.pdfSadaf Khan
 

Dernier (20)

APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
 
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
一比一原版(Wintec毕业证书)新西兰怀卡托理工学院毕业证原件一模一样
 
I’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 ShirtI’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 Shirt
 
Free scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsFree scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirts
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdf
 
一比一原版(Exon毕业证书)英国埃克塞特大学毕业证如何办理
一比一原版(Exon毕业证书)英国埃克塞特大学毕业证如何办理一比一原版(Exon毕业证书)英国埃克塞特大学毕业证如何办理
一比一原版(Exon毕业证书)英国埃克塞特大学毕业证如何办理
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理
 
Free on Wednesdays T Shirts Free on Wednesdays Sweatshirts
Free on Wednesdays T Shirts Free on Wednesdays SweatshirtsFree on Wednesdays T Shirts Free on Wednesdays Sweatshirts
Free on Wednesdays T Shirts Free on Wednesdays Sweatshirts
 
🍑👄Dehradun Esℂorts Serviℂe☎️9315791090🍑👄 ℂall Girl serviℂe in ☎️Dehradun ℂall...
🍑👄Dehradun Esℂorts Serviℂe☎️9315791090🍑👄 ℂall Girl serviℂe in ☎️Dehradun ℂall...🍑👄Dehradun Esℂorts Serviℂe☎️9315791090🍑👄 ℂall Girl serviℂe in ☎️Dehradun ℂall...
🍑👄Dehradun Esℂorts Serviℂe☎️9315791090🍑👄 ℂall Girl serviℂe in ☎️Dehradun ℂall...
 
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
一比一定制(USC毕业证书)美国南加州大学毕业证学位证书
 
AI Generated 3D Models | AI 3D Model Generator
AI Generated 3D Models | AI 3D Model GeneratorAI Generated 3D Models | AI 3D Model Generator
AI Generated 3D Models | AI 3D Model Generator
 
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理
一比一原版(TRU毕业证书)温哥华社区学院毕业证如何办理
 
一比一原版(PSU毕业证书)美国宾州州立大学毕业证如何办理
一比一原版(PSU毕业证书)美国宾州州立大学毕业证如何办理一比一原版(PSU毕业证书)美国宾州州立大学毕业证如何办理
一比一原版(PSU毕业证书)美国宾州州立大学毕业证如何办理
 
一比一定制波士顿学院毕业证学位证书
一比一定制波士顿学院毕业证学位证书一比一定制波士顿学院毕业证学位证书
一比一定制波士顿学院毕业证学位证书
 
原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样原版定制美国加州大学河滨分校毕业证原件一模一样
原版定制美国加州大学河滨分校毕业证原件一模一样
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
 
Thank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsThank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirts
 
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
 
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
一比一定制(Temasek毕业证书)新加坡淡马锡理工学院毕业证学位证书
 
Discovering OfficialUSA.com Your Go-To Resource.pdf
Discovering OfficialUSA.com Your Go-To Resource.pdfDiscovering OfficialUSA.com Your Go-To Resource.pdf
Discovering OfficialUSA.com Your Go-To Resource.pdf
 

Document security & firewall

  • 1. Institute of Management StudiesInstitute of Management Studies DAVV, IndoreDAVV, Indore Document Security And FirewallDocument Security And Firewall Session - 2014Session - 2014 Presentation to: Achal Hardia Faculty IMS, DAVV Presentation By: Rupa Dwivedi Sakshi Jain Sanjay Singh Shubhangi Mahajan E-Commerce, 2nd Sem
  • 2. ContentContent • Introduction to Document Security • Criteria of Document Security • Techniques of Document Security • Firewall • Types of Firewall • Conclusion
  • 3. Introduction to documentIntroduction to document SecuritySecurity Document Security: The protection of documents against the deliberate or accidental access of unauthorized persons.  Main reason why organization need to address the security of electronically shared documents: ◦ Regulatory requirements ◦ Return on investment (ROI) ◦ Information security
  • 4. Regulatory requirements Many companies are directly or indirectly affected by government mandates and regulations for providing consumer privacy. Return on investment (ROI) ◦ Significant ROI can be achieved by migrating to electronic business processes ◦ Automated workflows allow prospects, customers, partners, and suppliers to participate, enabling organizations to reap significant cost savings while improving customer satisfaction and loyalty Information security Thefts of proprietary information are increasing, which can jeopardize revenue, competitive advantage, and customer relationships; generate negative publicity; and result in significant penalties and fines for failure to comply with privacy laws.
  • 5. How to provide document securityHow to provide document security • The following criteria define persistent document security: – Confidentiality—Who should have access to the document? – Authorization—What permissions does the user have for working with the document? – Accountability—What has the recipient done with the document? – Integrity—How do you know if the document has been altered? – Non-repudiation—Can the signatory deny signing the document? – Authenticity—How do you know where the document came from?
  • 6.
  • 8. Document ControlDocument Control Encryption is the process of transforming information (plaintext) into an incomprehensible form (ciphertext). Encryption is an effective technique for managing document access. Decryption is the reverse process that transforms ciphertext back to the original plaintext. Cryptography refers to the two processes of encryption and decryption and its implementation is referred to as a cryptosystem.
  • 9. Digital signaturesDigital signatures  When enterprises distribute documents electronically, it is often important that recipients can verify: ◦ That the content has not been altered (integrity) ◦ That the document is coming from the actual person who sent it (authenticity) ◦ That an individual who has signed the document cannot deny the signature(non-repudiation)
  • 10. Apply code Create unique hash/ ID of electronic document Apply digital signature Confidentiality Authorization Accountability Integrity Authenticity Non-repudiation • Sign signature page • Submit 15-20 pages (non- secure) with signature page to LoC • Only page authenticated is signature page Digital Signatures Complete document is locked and verifiable
  • 11. Signature ProcessSignature Process • Data is converted to pdf document • A unique hash key is computed for pdf document • User supplied key is used to encrypt the hash key • The encrypted hash key is attached to the pdf document • Document is digitally signed
  • 12. Conclusion To DocumentConclusion To Document SecuritySecurity  A significantly more effective solution for protecting an electronic document is to assign security parameters that are an integral part of the document itself.  By applying security parameters to the individual document, organizations gain greater assurance in the confidentiality, authenticity, and integrity of electronically shared documents in addition to securing the communication line or storage location.  As organizations accelerate online processing, External security solutions deliver document control and digital signature services that simplify the process of protecting sensitive electronic documents and forms.
  • 13. What is firewall ?What is firewall ?  A firewall is a software feature designed to control the flow of traffic into and out-of a network.  A firewall is a specially programmed router that sits between a site and the rest of the network .  It is used to enforce security policy .
  • 14. HOW FIREWALL WORK ?HOW FIREWALL WORK ?
  • 15. Types of firewalls ?Types of firewalls ? Packet filters Circuit level Application level Stateful multilayer
  • 21. Free Firewall Software PackagesFree Firewall Software Packages IP Chains & IP Tables ◦ comes with most linux distributions SELinux (Security Enabled Linux – NSA) ◦ comes with some Linux distributions  Fedora, RedHat
  • 22. Home & Personal Routers Provide ◦ configurable packet filtering ◦ NAT/DHCP Enterprise Firewalls  Cisco PIX (product family)  MS Internet Security & Acceleration Server
  • 23. ConclusionConclusion It is clear that some form of security for private networks connected to the Internet is essential A firewall is an important and necessary part of that security, but cannot be expected to perform all the required security functions.