Disadvantages of decentralized database
Do you have a secret
are you worried about the security of computer data
have you ever thought that computer theft and loss will also cause data leakage
have you ever thought that computer maintenance personnel can steal confidential information when they repair your computer
have you ever thought that the internal staff of an enterprise can easily divulge secrets by means of mobile storage devices (such as USB flash disk), mail, file transfer, upload, etc
private information or technical data are stored in the computer in electronic form and transmitted through the network or removable media, so the security is difficult to be guaranteed. Once the information is leaked, it may cause incalculable losses to indivials or enterprises. Therefore, data encryption is the most effective way to solve the problem of information leakage
Thek / 3 data security platform is a series of information security software procts based on the concept of automatic protection, which can automatically, dynamically and transparently encrypt the data stored on the computer, with high encryption intensity and high security level, and can effectively improve the security and confidentiality of the intranet
With the development of information technology, in order to improve the efficiency of information processing, more and more enterprises turn documents into electronic documents, and even store more than 90% of their confidential information in the enterprise intranet in the form of electronic documents. At the same time, enterprises also use ERP, CRM, OA and other database related electronic information management solutions. The use of these new management means brings higher proction efficiency to enterprises, but also brings new challenges to the information security management of enterprises. Although the enterprise has adopted anti-virus software, firewall, intrusion detection, identity authentication and other means, it is still unable to prevent the electronic information from leaking out from the enterprise in various ways. Most of the current network security technology starting point is to solve the problem of external protection, internal protection is very weak. In the face of increasingly serious information security threats, the original security solutions of enterprises are graally inadequate1 almost every enterprise will encounter the problem of "reasonable" tax avoidance; Once the leak, the enterprise will enter a very passive state
2 almost every high-tech enterprise should protect its technological secrets; Once divulged, enterprises will lose their core competitiveness and instry leadership
3 almost every enterprise has to protect the commercial privacy of bidding documents, contracts and quotations. Once the secrets are leaked, the enterprise will lose customers
Information security threats2.1 according to pollemont Research Institute, the average loss of enterprises in data intrusion is increasing year by year. The average loss of data intrusion to enterprises is 6.6 million US dollars, and the loss of some companies is even as high as 32 million US dollars. The biggest loss of data intrusion is the loss of business. According to it, of last year's average loss of $202 per record, $139 (69%) refers to lost business
2.2 according to the results of the special network security survey concted by FBI and CSI on 484 companies, more than 70% of the security threats come from within the company. In terms of the amount of losses, the losses caused by internal staff leakage are 16 times of those caused by hackers and 12 times of those caused by viruses
2.3 according to the investigation of China National Information Security Evaluation Center, the real threats to information security are mainly caused by internal information leakage and internal crimes, rather than viruses and foreign hackers
...
3. Common ways of leakage
3.1 hackers leak information by ing information through installing malicious software (such as Trojan horse program)
3.2 when the computer is infected with virus, it will automatically send out the secret
3.3 data leakage caused by computer theft and loss
3.4 internal personnel information through mobile storage devices, or leak information in the form of e-mail, file upload, etc
3.5 the third party maintenance personnel steal information by taking advantage of their work, resulting in leakage
4. Encrypt confidential information, and thoroughly solve security risks
4.1 all confidential information should not flow out of the enterprise at will
4.2 all confidential information should be circulated transparently within the enterprise to eliminate security risks without affecting normal business operation
4.3 all confidential information can be set with various security levels and used according to authorization
4.4 there is only one controllable and unique security exit for confidential information
2. Proct overview
1. Platform introction
Kingdee K / 3 data security platform can effectively protect your data security
the platform adopts the "driver layer" underlying transparent encryption technology, combined with the world's advanced encryption algorithm, to provide fully automated, dynamic, transparent digital file encryption protection
Kingdee K / 3 data security platform solution
2
2.2 unique enterprise key, the maximum key length can reach 8192 bits
2.3 high intensity encryption algorithm is adopted, which can be used in a variety of encryption algorithms and multiple encryption
2.4 any type of file or database can be encrypted
2.5 can encrypt files on any storage medium
2.6 strict identity authentication system
2.7 perfect and infinitely expandable file secret level control
2.8 encrypted files can only be transferred to plaintext for outward transmission if they are authorized to decrypt
2.9 encryption and decryption strategy library and log audit report can be customized freely
2.10 the platform is simple and easy to use, without the cooperation of third-party software, and basically does not change the existing operation mode
3. System topology diagram
Kingdee K / 3 data security platform solution
4. Function overview:
Kingdee K / 3 data security platform solution
< P >
5. Technical advantages:
5.1 database encryption
the database is encrypted in the process of operation and backup, and the report is exported through application software, whether it is C / s or B / s application mode, All reports are encrypted automatically; And equipped with "database lock hotkey", you can press the preset key on any computer in the network, instantly lock the encrypted database, and enterprises can calmly deal with various emergencies
Kingdee K / 3 data security platform solution
5.2 file encryption
when the security platform client creates a file, the file is automatically encrypted, and the corresponding "department" and "secret level" attributes are automatically added to the file according to the authority of the file creator. The encrypted files can circulate freely in the enterprise. The security platform ensures that the files are not used by unauthorized users through strict file access mechanism
Kingdee K / 3 data security platform solution
list of supported applications:
Kingdee K / 3 data security platform solution
5.3 infinitely scalable secret level management mechanism
flexible "department" + "secret level" management mechanism, fully controlling the flow of confidential information, truly realizing any fine-grained control
the security platform compares the "department" and "secret level" authorization of the personnel with the "department" and "secret level" attributes of the file. Only when the Department is consistent and the "secret level" authorization of the personnel is greater than or equal to the "secret level" attribute of the file, can the encrypted file be opened normally
when the administrative structure of an enterprise changes, the "department" and "secret level" can be added or inserted at will, and the relevant authorization can be inherited automatically without special processing of encrypted files, which can easily cope with future expansion
when the file needs to be used by other departments within the enterprise temporarily, the "department" and "secret level" attributes in the file can be changed to new "department" and "secret level" through OA approval process or in the client of the security platform
when some personnel in the enterprise need to work across departments, they can be granted corresponding "department" and "secret level" operation permissions to specific personnel through the security platform console
Kingdee K / 3 data security platform solution
5.4 flexible decryption mechanism
a variety of flexible decryption methods can be used in combination with OA or PLM to realize work process approval decryption or automatic decryption of email white list, rece the workload of manual decryption of leaders, and improve enterprise efficiency
Kingdee K / 3 data security platform solution
5.5 printing restriction function
the printing function of the corresponding process can be restricted according to different user permissions. Rece the chance of confidential documents leaking in paper form
5.6 process restriction function
the operation function of corresponding process can be restricted according to different user permissions. Disable applications that have nothing to do with work to improve work efficiency
5.7 website access control function
according to different user permissions, set website access permissions, respectively use black and white list management, forbid users to visit web pages unrelated to work, improve work efficiency
5.8 remote monitoring
according to different user permissions, the computer screen of any security platform client can be monitored at any time, and all the operation behaviors of the security terminal are inevitable
5.9 working time schele
according to the actual situation, the working time of each user of database server and platform can be set arbitrarily. During non working hours, the platform can not be logged in and encrypted files can not be used to ensure the security of confidential information
5.10 supports multiple login modes
including "user name + password", "user name + smart card digital certificate (CA)", user name binding IP, MAC address, boot automatic login, etc
5.11 various covert mechanisms
covert the operation interface of the security platform, hide the encrypted files before logging on the platform, and use enterprise secrets more safely. After hiding, you can't see encrypted files in resource manager, encrypted databases in SQL enterprise manager, and encrypted A / C sets in Kingdee A / C set management
5.12 support offline application
the security platform controls offline according to the effective time after offline and the number of login times after offline. Even if the computer leaves the company environment, it is still subject to real-time monitoring, and the encryption effect is the same as that used in the company
5.13 perfect log record
detailed record of the key operations of the security terminal, and output the corresponding reports according to the needs of customers

