Enterprise Digital Rights Management:Solutions against Information Theft by Insiders
نویسندگان
چکیده
Insider attack is one of the most serious cybersecurity threats to corporate America. Among all insider threats, information theft is considered the most damaging in terms of potential financial loss. Moreover, it is also especially difficult to detect and prevent, because in many cases the attacker has the proper authority to access the stolen information. Enterprise Digital Rights Management (E-DRM) protects sensitive information by managing and enforcing access and usage rights to the information throughout its lifecycle, no matter where the information is distributed. However, the self-protection strength of the DRM client software has always been a potential weakness for all DRM solutions, and application-specific implementation also restricts the deployment of many E-DRM systems. In this report, we review the general DRM architecture and several commercial systems, and describe the design, implementation and evaluation of an industrial-strength system called Display-Only File Server (DOFS), which can transparently and effectively stop information theft by insiders in most cases, even if the insiders have proper authorities to read/write the protected information. The DOFS architecture ensures that bits of a sensitive file never leave a protected server after the file is checked in and users can still interact with the protected file in the same way as if it is stored locally. Essentially, DOFS decouples “display access” from other types of accesses to a protected file, and provides users only the “display image” rather than bits of the file. Therefore, DOFS can have less dependency on the trusted client software against information theft by insiders. 1. INFORMATION THEFT Nowadays most organizations such as government agencies, financial institutions and professional companies have been storing and processing their confidential information in digital format in their daily life. The confidential information might include product overviews, marketing plans, customer lists and sales reports in the format of Microsoft Office, Adobe pdf, HTML, etc. Organizations normally process the information by sharing those digital files from protected file servers and distributing them by downloads or email messages. Compared with the traditional print format, the digital format can significantly improve the efficiency of handling the confidential information as well as maintaining its reliability. However, the digital format also makes the
منابع مشابه
The Politics of Russian Enterprise Reform: Insiders, Local Governments, and the Obstacles to Restructuring
Russia and other countries in the Commonwealth of Independent States that have implemented voucher privatization programs have to account for the puzzling behavior of insiders—manager-owners—who, in stripping assets from the firms they own, appear to be stealing from one pocket to fill the other. This article suggests that asset stripping and the absence of restructuring result from interaction...
متن کاملIgnorance to Awareness: towards an Information Security Awareness Process
With most employees in small and medium enterprise (SME) engineering firms now having access to their own personal workstations, the need for information security management to safeguard against loss/alteration or theft of the firms’ important information has increased. These SMEs tend to be more concerned with vulnerabilities from external threats, although industry research suggests that a su...
متن کاملInsider threats: Detecting and controlling malicious insiders
Malicious insiders are posing unique security challenges to organizations due to their knowledge, capabilities, and authorized access to information systems. Data theft and IT sabotage are two of the most recurring themes among crimes committed by malicious insiders. This paper aims to investigate the scale and scope of malicious insider risks and explore the impact of such threats on business ...
متن کاملAn Authentication Middleware for Prevention of Information Theft
Information theft or data leakage is a growing concern for companies as well as individual users. Intruders can easily copy huge amount of confidential data using hand-held devices such as USB flash drives, iPods, digital cameras or any other external storage devices. Data theft can simply occur through both insiders and outsiders of a corporation. It is becoming the biggest challenge for corpo...
متن کاملمدیریت کلید در سیستمهای مدیریت حقوق دیجیتال در حالت برونخطی
By expanding application of digital content in the world of information technology, supervision and control over the data, and also preventing the copy of documents is considered. In this relation digital rights management systems are responsible for the secure distribution of digital content, and for this purpose the common functions in the field of cryptography and utilize Digital watermarkin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004