波音游戏源码-波音博彩公司评级_百家乐园天将_新全讯网3344111.c(中国)·官方网站

Improving Email Security with Information Rights Management

by Wilson Wong
 
 
What is Information Rights Management?

Information Rights Management (IRM) is a technology that protects sensitive information from unauthorized access. It allows information owners/publishers to distribute sensitive information to specific individuals.  When an email or a document is protected by IRM, it becomes encrypted and a set of access/usage restrictions may be applied to it. Typical restrictions include preventing recipients from forwarding the email, printing the document or copying the text.
 
Service Architecture

Public Key Infrastructure (PKI) and Identity Based Encryption (IBE) are two commonly used architectures for distributing encrypted (protected) information. We will briefly discuss a simplified version of the two architectures here.
 
Public Key Infrastructure (PKI)

Public Key encryption uses a key pair to protect and access sensitive information. The key pair consists of a public key and a private key. Suppose John wants to share sensitive information with Peter securely. John will use Peter’s public key to protect (encrypt) the information and share the encrypted information with Peter. When Peter receives the encrypted information, Peter has to use his own private key to decrypt it, otherwise, he will not be able to read the information.
 
To ensure the integrity and ownership of keys (or certificates), a trusted party, called Certification Authority (CA), is required in PKI for managing the issuing, distribution, verification, and revoking of certificates. We will not go into details here.
 
Identity Based Encryption (IBE)

IBE, as compared with PKI, eliminates the need of a complicated structure for certificate management. Instead, a Key Server is introduced here. The sender, John, uses the email address of the recipient, Peter, to generate Peter’s public key for encrypting the information he wants to share with Peter. When Peter receive the encrypted information, Peter authenticates to the Key Server, automatically and transparently obtains his private key to decrypt the information. This mechanism equally protects sensitive information but is both simple and easy to use.
 
IBE relies on the authentication mechanisms which in turn depend on the awareness of users in protecting their own credentials. In the event that a user disclosed his/her credential (usually username/password) unintentionally, IBE-protected contents could also be leaked. Similarly, PKI-protected contents will be leaked if the corresponding private key is stolen.
 
However, changing the password could immediately stop IBE-protected contents from being further distributed if there is an incident of credential disclosure. Yet if the unintended recipients have already made a copy in an alternative format, e.g. hardcopy, prior to the password change, obviously there is no way you can make the contents inaccessible to them.   In contrast, for PKI, if an incident of private key disclosure occurs, there is no way to stop those stolen PKI-protected contents from being further distributed, as the newly generated PKI key pair could only protect new contents.
 
Secure Email Solution

According to the Gartner report in July 2014, market leaders such as Proofpoint, Cisco IronPort and Microsoft Azure Rights Management (Azure RMS) are all using Identity Based Encryption (IBE) for providing secure email solutions. While Proofpoint does not have local Hong Kong presence, the Central IT has performed an evaluation and made a comparison between Cisco IronPort and Microsoft Azure RMS.
 
One of the advantages of Microsoft Azure RMS over Cisco IronPort is the access control on the attachments remains enforced even after they are detached from email. This offline protection feature of Azure RMS is effective in reducing the risk of unintended information disclosure through off-line media such as USB thumb drives.
 
In addition, Cisco IronPort does not support Microsoft Exchange Online, the current email system of the university. As such, the Central IT had focused entirely on the evaluation of Azure RMS in the past few months.
 
Microsoft Azure Rights Management (Azure RMS)

Azure RMS uses encryption, identity, and authorization policies to protect email messages. Office documents, including Word, Excel and PowerPoint files, will be protected automatically by Azure RMS when they are attached to a protected email message. Once protected, users must be:
  • Authenticated. Every time the protected email message or the corresponding protected attachments are being accessed, the Azure RMS will request for users' credentials. Users must be authenticated by signing in to Office 365 with their O365 accounts.
  • Authorized. After authentication, Azure RMS processes the document policy associated with the email (or the corresponding
    protected attachments) and then decides if the authenticated user should be granted permission to view, print or forward the email/attachments. 
It works across multiple devices—phones, tablets, PCs and Macs. The following table summarizes the platform and client tools that work with Azure RMS protected email.

 

Device Operating System
Email
Email Attachments protected with Azure RMS (Word, Excel, PowerPoint)
Windows
Outlook 2010/2013
Outlook Web App (OWA) via browsers such as Internet Explorer, Firefox, and Google Chrome
Office 2010/2013
Office Online via browsers such as Internet Explorer, Firefox and Google Chrome
Mac OS X
Outlook for Mac (Office Pro Plus)
Outlook Web App (OWA) via browsers such as Safari, Firefox and Google Chrome
Office Online via browsers such as Safari, Firefox and Google Chrome
iOS
OWA for iOS
Not supported at the moment
Android
OWA for Android
Not supported at the moment
Windows Phone 8.1
Outlook Mobile
Not supported at the moment

 

To share PDF and image files securely over email, Azure RMS provides a tool called “RMS Sharing Application”. With RMS Sharing Application, users may protect PDF and image files with Azure RMS by converting them into pfiles (protected files). Pfiles, such as PPDF (protected PDF), can be viewed with RMS Sharing Application of various platforms (including Windows, Mac OS X, iOS, Android, and Windows Phone) by authorized users.

To be available soon

The infrastructure of providing Azure RMS for the university is in place and the Central IT is now piloting and fine-tuning the service. It will be available for all university staff in Semester A 2015-2016. If departments would like to have a try on the service beforehand, please feel free to contact the Computing Services Centre at csc@cityu.edu.hk.
 
References
 
 

 

 

澳门百家乐官网游戏玩法| 澳门百家乐怎玩| 网络百家乐官网必胜投注方法| 博士百家乐官网现金网| 盈博国际娱乐城| 澳门百家乐官网技术| 百家乐在线赌场娱乐网规则| 元游棋牌下载| 百家乐视频官网| 太子娛樂城网址| 百家乐小九梭哈| 大发888真人网| 百家乐官网庄闲分布概率| 太阳神百家乐官网的玩法技巧和规则| 德州扑克边池| 高档百家乐桌子| 桃江县| 德州百家乐官网扑克桌| 亿酷棋牌世界下载| 搓牌百家乐技巧| 百家乐官网有不有作弊| 24山灶位吉凶歌| bet365主页yalanad| 百家乐烫金筹码| 百家乐官网娱乐分析软| 百家乐缩水| 在线百家乐官网下| 永利博| 太阳城百家乐祖玛| 百家乐官网赌博破解| 博彩e族天上人间| 大发888娱乐城菲律宾| 澳门百家乐现场真人版| 百家乐官网电子游戏试| 杭州百家乐官网西园| 百家乐官网投注方法新版| 体球网| 东莞百家乐的玩法技巧和规则| 百家乐怎么玩啊| 金域百家乐官网的玩法技巧和规则| 百家乐官网出千赌具|