1 / 10

ASSET REGISTER FOR DATA PROTECTION USING FILE ENCRYPTION MECHANISM

ASSET REGISTER FOR DATA PROTECTION USING FILE ENCRYPTION MECHANISM. Indian Institute of Information Technology, Allahabad. Objective. Problems related to file security What is asset register How to analyze asset Grading of algorithms Solution of problem Conclusion. Problem:.

jeneil
Download Presentation

ASSET REGISTER FOR DATA PROTECTION USING FILE ENCRYPTION MECHANISM

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ASSET REGISTER FOR DATA PROTECTION USING FILE ENCRYPTION MECHANISM Indian Institute of Information Technology, Allahabad

  2. Objective Problems related to file security • What is asset register • How to analyze asset • Grading of algorithms • Solution of problem • Conclusion

  3. Problem: • Many of the breaches making headline news are caused by the loss or theft of laptops and other portable devices. • How to encrypt data present in file according to their criticality and sensitivity . • How to decide the criticality and sensitivity of file. • How to select a algorithm which would be most suitable to encrypt data prevailing inside file.

  4. Cont. • To protect themselves from financial and reputational damage, Asset register encryption technologies can reduce risks by ensuring the information on such devices is secure when users are on the move.

  5. Asset Register: • Anything that has value to the agency that can be communicated or documentary material, regardless of its physical form or characteristics is called an Asset. • Includes, but is not limited to, paper, electronic, digital, images, and voice mail. • Information technology hardware and software are not information assets for classification purposes.

  6. Analysis of Assets:- Priority is determined on the basis of following parameters : • Confidentiality level (c, 1-10) • Integrity level (i, 1-10) • Availability level (a, 1-10) • Number of user (n) Then, Priority=(c+ (1/n * 10) + i + a)/ (no. of question)

  7. Grading of algorithms • To Grade different encryption algorithm we use the percentile value as follows: • Percentile = ((B + 0.5E)/n)*100 • Where B = number of algorithms having less Brute Force Attack           E = number of algorithms having equal Brute Force Attack           n = Total number of Algorithms • AlgoGrade = Percentile/10

  8. Solution of problem • According to above table, files having different priorities may be encrypted with corresponding algorithm on the basis of Algo Grade.

  9. Conclusion • By applying the concept of Asset Register to secure the files, we are able to encrypt more critical files using more secure encrypting algorithm based on the Grading of algorithms. Hence, the goals for achieving a security mechanism which do not only secure files and data but also consider the need and requirement of the user which makes it an effective and simple technique. • In the perspective of banking transaction, it can be incorporated to make all the security of the files very much safe and sound and as a future orientation this technique can be applied in remote transaction in the same organization in different domain.

  10. Thanks for Your Patience

More Related