Data security: Data does not land, presenting a variety of allure and resistance, half push and half pull

0 24
Who does the data belong to?We all say that in the era of informatization, data...

Who does the data belong to?

We all say that in the era of informatization, data is wealth, data is assets, this metaphor is very good, indicating more is the importance of data. However, compared with money, data has more particular characteristics. For individuals, the money in the wallet, the balance in the bank account, belongs to themselves, others can't see or touch it, let alone use it arbitrarily.

However, this guy, data, does not have exclusivity. You say who it belongs to, and it is difficult to define. For example, when I bought a piece of clothing on Taobao, a piece of order data was generated, which contains a wealth of data, such as your name, home address, phone number, product content. So many data, you say, does it belong to this Taobao platform, or to you personally? Subjectively, consumers naturally believe that data is their own privacy, belonging to themselves, but the problem is that the data is generated by the Taobao platform, and at the same time, merchants need to use it, and logistics couriers also need to see it, and the community express delivery station also needs to review it. You say it belongs to you, but you have no control over it.

Data security: Data does not land, presenting a variety of allure and resistance, half push and half pull

Taobao order data

Looking at it this way, data is said to be wealth. At a superficial level, it is not the wealth of individuals at all; it can be Taobao's wealth, because this data helps Taobao better understand your interests and hobbies; it may be the wealth of a logistics company, because it helps the logistics company know you, and when the logistics company wants to do local life business or other new local delivery business, it can conveniently send you marketing messages; it may be the wealth of a community kiosk, through which the kiosk knows all the contact information of the owners, and when other owners of the community ask the kiosk where they can rent a parking space, it can also directly serve as an information relay station.

Who is most capable of protecting data has the responsibility to protect data security

Data, in terms of reasonableness, belongs to individuals, and in terms of protection responsibility, belongs to institutions or enterprises, which is also the target of various national laws and regulations (Data Security Law, Cybersecurity Law, Personal Information Protection Law).

Personal data not only exists in public applications or platforms, but also within enterprises, various employees may come into contact with and process these data. In addition to establishing strict operational specifications and procedures, enterprises also spare no effort in adopting various technical means to protect the security of personal privacy data. What is worth mentioning here is the endless variety of so-called data non-landing technical solutions.

The general meaning of data non-landing is that (the enterprise) allows you (employees) to use the data, but you (employees) cannot take away these data. The mindset of enterprises and employees is like a tug-of-war during the Spring Festival.

Definition and goal of data non-landing

In a broad sense, any persistent data with a fixed carrier that does not disappear instantly is considered as landed data, such as data stored on hard drives. Correspondingly, data stored in memory or transmitted over the network, which disappears after use, is not landed data. In an enterprise, any data that employees can edit and process without downloading to local devices can be understood as non-landed data.

Data not landing on the ground solution - cloud desktop

This is not an educational article. Readers who can be patient and read to this point should not need to普及 the definition of cloud desktops anymore. There are many similar names, and there are differences in product differences, but the essence is the same, such as DaaS (Desktop As A Service), VDI, virtual desktop, remote desktop. Using internal systems in an independent Windows desktop environment, processing documents, writing source code, and ensuring that data cannot leave this desktop environment through measures such as blocking USB and network communication.

Summarize several keywords according to the overall characteristics, comprehensive, expensive, slow, heavy.


Security effect


Comprehensive, can manage client software and Web applications, can write documents, and can write source code


Internal network system


Manageable


External network system


Can't control


Price


Expensive, software needs to be authorized and fees, and a lot of servers need to be prepared


Performance


Slow, always slower than local computers, and domestic virtualization protocols are relatively backward compared to foreign ones


Implementation and operation and maintenance


Heavy, server management, network configuration, thin client management, daily operations and maintenance


Applicable population


Rich, general government, general finance, automotive, education, where security is more important than efficiency

Data not landing on the ground - sandbox (Sandbox)

This is a localization solution with Chinese characteristics for the zero-trust security concept in China. Early sandboxes referred to lightweight virtual machines running in the operating system, where software runs without affecting the outer layer operating system. It can even be compared to the cloud desktop above, where the inner logic is consistent, and it is also to establish an isolated environment for processing data, just that one is in the cloud and this one is in the terminal computer, and the implementation technology is also different. Early applications of this technology were in virus analysis, where security personnel put the virus into this sandbox to analyze it to prevent the virus from damaging the outer layer local computer. Now, various security companies, in order to cater to the popularity of data security, have begun to turn their thinking and use this technology in data leakage prevention scenarios.

Sandbox, also known as sandbox, is a network programming virtual machine execution environment, which is a virtual system program. It creates an environment logically isolated from the personal environment on the terminal through driver layer or application layer redirection technology, and controls all system operations of the software (application) running in the sandbox, and can implement communication encryption, file encryption on the ground, isolation of internal and external network access, clipboard control, external device control, program control, and file external control and other data protection functions. This article directly quotes the following article, which analyzes the sandbox from a technical perspective and is very comprehensive.

https://www.freebuf.com/articles/endpoint/355519.html


Security effect


Comprehensive, can manage client software and Web applications, can write documents, and can write source code


Internal network system


Manageable


External network system


Can't control


Price


Moderate


Performance


Excellent local experience


Implementation and operation and maintenance


Heavy, requires network configuration, terminal compatibility issues are numerous, software adaptation issues are numerous, and high computer configuration requirements


Applicable population


Game industry source code protection, material protection

Transparent encryption and decryption for data not landing

Transparent encryption and decryption refers to the process in which encrypted software automatically encrypts the data to be stored at the moment and automatically decrypts it when used, in order to prevent the possibility of data leakage when used abnormally. Corresponding security products include those for databases and terminal files. The common ones are for terminal files. Dynamic encryption and decryption at the database level are generally not used. Any unstable factors may cause business paralysis and permanent data loss, which is too risky.

Transparent encryption and decryption of databases

Transparent encryption and decryption effect of terminal files, for example, taking a Word document as an example, it is actually encrypted when stored on the disk. When an employee opens an encrypted document to edit and use it, it will be automatically decrypted in memory, and the employee can use it normally without any impact. However, when trying to send the file through WeChat, QQ, and other channels, the decryption process will not be triggered, and the file sent out is just an encrypted file. Even if the recipient receives it, it has no significance.

Such products have existed for more than 20 years. At present, all traditional security companies are standard products, but the ancestor-level in China is still IP-Guard this one.


Security effect


Not comprehensive, not divided by software type, but can only manage unstructured data


Internal network system


Manageable


External network system


Manageable


Price


Moderate


Performance


Excellent local experience


Implementation and operation and maintenance


Moderate


Applicable population


Manufacturing, drawings, and other unstructured data are the main scene, which is intuitive

Browser kernel security for data not landing

This is a completely new model, which still relies on the background of cloud computing. Everything is moving to the cloud, and now the main business systems of various enterprises are in the cloud, data is in the cloud, and applications are in the cloud. Enterprise office is also increasingly relying on online office models, such as online document writing, online meetings, and online collaboration. This means that all data is in the cloud. The new office form requires a new security solution, and all data access is gradually narrowed down to the browser. Then, based on the security protection of the browser kernel and the data not landing solution, it is a trial to cater to the times and dare to innovate in security.

There is not much reference material for this, because there is only one company in the market doing this content, and its technical threshold and direction are completely different from the traditional model. It is recommended that everyone pay attention.

Shadows of the Planet - The next generation of digital office space, helping enterprises reduce costs and increase efficiency, and secure office work


Security effect


Not comprehensive, can manage structured and unstructured data, but cannot manage terminal client software systems


Internal network system


Manageable


External network system


Manageable


Price


Moderate


Performance


Excellent local experience


Implementation and operation and maintenance


Lightweight, no software adaptation, no terminal adaptation, no software conflict


Applicable population


All enterprises

Data not landing

The above-mentioned are all for enterprise office types, employee data operation, non-local solutions, and there is another block for scenarios and solutions where data computation does not land, which refers to scenarios where large amounts of data are computed online or on the server side, such as Homomorphic encryption, multi-party computation, SGX Wait, another chapter will be introduced later.

你可能想看:

As announced today, Glupteba is a multi-component botnet targeting Windows computers. Google has taken action to disrupt the operation of Glupteba, and we believe this action will have a significant i

Distributed Storage Technology (Part 2): Analysis of the architecture, principles, characteristics, and advantages and disadvantages of wide-column storage and full-text search engines

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

89% of the use of enterprise generative AI goes unnoticed by the IT department, exposing data security vulnerabilities

Announcement regarding the addition of 7 units as technical support units for the Ministry of Industry and Information Technology's mobile Internet APP product security vulnerability database

(3) Is the national secret OTP simply replacing the SHA series hash algorithms with the SM3 algorithm, and becoming the national secret version of HOTP and TOTP according to the adopted dynamic factor

Article 2 of the Cryptography Law clearly defines the term 'cryptography', which does not include commonly known terms such as 'bank card password', 'login password', as well as facial recognition, fi

Ensure that the ID can be accessed even if it is guessed or cannot be tampered with; the scenario is common in resource convenience and unauthorized vulnerability scenarios. I have found many vulnerab

Internal and external cultivation | Under the high-confrontation offensive and defensive, internal network security cannot be ignored

最后修改时间:
admin
上一篇 2025年03月28日 07:02
下一篇 2025年03月28日 07:24

评论已关闭