百家乐怎么玩-澳门百家乐官网娱乐城网址_网上百家乐是不是真的_全讯网888 (中国)·官方网站

Improving Email Security with Information Rights Management

by Wilson Wong
 
 
What is Information Rights Management?

Information Rights Management (IRM) is a technology that protects sensitive information from unauthorized access. It allows information owners/publishers to distribute sensitive information to specific individuals.  When an email or a document is protected by IRM, it becomes encrypted and a set of access/usage restrictions may be applied to it. Typical restrictions include preventing recipients from forwarding the email, printing the document or copying the text.
 
Service Architecture

Public Key Infrastructure (PKI) and Identity Based Encryption (IBE) are two commonly used architectures for distributing encrypted (protected) information. We will briefly discuss a simplified version of the two architectures here.
 
Public Key Infrastructure (PKI)

Public Key encryption uses a key pair to protect and access sensitive information. The key pair consists of a public key and a private key. Suppose John wants to share sensitive information with Peter securely. John will use Peter’s public key to protect (encrypt) the information and share the encrypted information with Peter. When Peter receives the encrypted information, Peter has to use his own private key to decrypt it, otherwise, he will not be able to read the information.
 
To ensure the integrity and ownership of keys (or certificates), a trusted party, called Certification Authority (CA), is required in PKI for managing the issuing, distribution, verification, and revoking of certificates. We will not go into details here.
 
Identity Based Encryption (IBE)

IBE, as compared with PKI, eliminates the need of a complicated structure for certificate management. Instead, a Key Server is introduced here. The sender, John, uses the email address of the recipient, Peter, to generate Peter’s public key for encrypting the information he wants to share with Peter. When Peter receive the encrypted information, Peter authenticates to the Key Server, automatically and transparently obtains his private key to decrypt the information. This mechanism equally protects sensitive information but is both simple and easy to use.
 
IBE relies on the authentication mechanisms which in turn depend on the awareness of users in protecting their own credentials. In the event that a user disclosed his/her credential (usually username/password) unintentionally, IBE-protected contents could also be leaked. Similarly, PKI-protected contents will be leaked if the corresponding private key is stolen.
 
However, changing the password could immediately stop IBE-protected contents from being further distributed if there is an incident of credential disclosure. Yet if the unintended recipients have already made a copy in an alternative format, e.g. hardcopy, prior to the password change, obviously there is no way you can make the contents inaccessible to them.   In contrast, for PKI, if an incident of private key disclosure occurs, there is no way to stop those stolen PKI-protected contents from being further distributed, as the newly generated PKI key pair could only protect new contents.
 
Secure Email Solution

According to the Gartner report in July 2014, market leaders such as Proofpoint, Cisco IronPort and Microsoft Azure Rights Management (Azure RMS) are all using Identity Based Encryption (IBE) for providing secure email solutions. While Proofpoint does not have local Hong Kong presence, the Central IT has performed an evaluation and made a comparison between Cisco IronPort and Microsoft Azure RMS.
 
One of the advantages of Microsoft Azure RMS over Cisco IronPort is the access control on the attachments remains enforced even after they are detached from email. This offline protection feature of Azure RMS is effective in reducing the risk of unintended information disclosure through off-line media such as USB thumb drives.
 
In addition, Cisco IronPort does not support Microsoft Exchange Online, the current email system of the university. As such, the Central IT had focused entirely on the evaluation of Azure RMS in the past few months.
 
Microsoft Azure Rights Management (Azure RMS)

Azure RMS uses encryption, identity, and authorization policies to protect email messages. Office documents, including Word, Excel and PowerPoint files, will be protected automatically by Azure RMS when they are attached to a protected email message. Once protected, users must be:
  • Authenticated. Every time the protected email message or the corresponding protected attachments are being accessed, the Azure RMS will request for users' credentials. Users must be authenticated by signing in to Office 365 with their O365 accounts.
  • Authorized. After authentication, Azure RMS processes the document policy associated with the email (or the corresponding
    protected attachments) and then decides if the authenticated user should be granted permission to view, print or forward the email/attachments. 
It works across multiple devices—phones, tablets, PCs and Macs. The following table summarizes the platform and client tools that work with Azure RMS protected email.

 

Device Operating System
Email
Email Attachments protected with Azure RMS (Word, Excel, PowerPoint)
Windows
Outlook 2010/2013
Outlook Web App (OWA) via browsers such as Internet Explorer, Firefox, and Google Chrome
Office 2010/2013
Office Online via browsers such as Internet Explorer, Firefox and Google Chrome
Mac OS X
Outlook for Mac (Office Pro Plus)
Outlook Web App (OWA) via browsers such as Safari, Firefox and Google Chrome
Office Online via browsers such as Safari, Firefox and Google Chrome
iOS
OWA for iOS
Not supported at the moment
Android
OWA for Android
Not supported at the moment
Windows Phone 8.1
Outlook Mobile
Not supported at the moment

 

To share PDF and image files securely over email, Azure RMS provides a tool called “RMS Sharing Application”. With RMS Sharing Application, users may protect PDF and image files with Azure RMS by converting them into pfiles (protected files). Pfiles, such as PPDF (protected PDF), can be viewed with RMS Sharing Application of various platforms (including Windows, Mac OS X, iOS, Android, and Windows Phone) by authorized users.

To be available soon

The infrastructure of providing Azure RMS for the university is in place and the Central IT is now piloting and fine-tuning the service. It will be available for all university staff in Semester A 2015-2016. If departments would like to have a try on the service beforehand, please feel free to contact the Computing Services Centre at csc@cityu.edu.hk.
 
References
 
 

 

 

快乐之都| 百家乐官网赌博在线娱乐| 太阳城百家乐官网出千技术| 汇丰百家乐娱乐城| 百家乐之三姐妹赌博机| 迪威百家乐娱乐场| 全讯网官方| 足球投注| 百家乐官网有送体验金| 百家乐官网海滨网现场| 百家乐官网园蒙| 怎么看百家乐的路| 百家乐官网玩法和技巧| 百家乐官网博娱乐网赌百家乐官网的玩法技巧和规则 | 澳门百家乐官网群代理| 娱乐城在线| 澳门百家乐官网战法| 百家乐手机投注平台| 大发888怎么能不卡| 卢氏县| 迪威百家乐官网娱乐网| 圆梦城百家乐官网娱乐城| 大发888游戏下载官方下载| 百家乐官网娱乐城公司| 百家乐有方式赢钱吗| 华人棋牌游戏| 百家乐官网sxcbd| 赌球术语| 百家乐官网英皇娱乐场| 香港六合彩报码室| 百家乐游戏出售| 巴登娱乐城真人娱乐| 百家乐庄闲符号记| 百家乐官网视频百家乐官网| 威尼斯人娱乐城送宝马| 网上百家乐官网洗码技巧| 查找百家乐群| 百家乐tt娱乐城| 巫溪县| 百家乐赌博游戏平台| 岢岚县|