Presentation on theme: "Indian Institute of Information Technology, Allahabad."— Presentation transcript:
Indian Institute of Information Technology, Allahabad
Problems related to file security What is asset register How to analyze asset Grading of algorithms Solution of problem Conclusion
Many of the breaches making headline news are caused by the loss or theft of laptops and other portable devices. How to encrypt data present in file according to their criticality and sensitivity. How to decide the criticality and sensitivity of file. How to select a algorithm which would be most suitable to encrypt data prevailing inside file.
To protect themselves from financial and reputational damage, Asset register encryption technologies can reduce risks by ensuring the information on such devices is secure when users are on the move.
Anything that has value to the agency that can be communicated or documentary material, regardless of its physical form or characteristics is called an Asset. Includes, but is not limited to, paper, electronic, digital, images, and voice mail. Information technology hardware and software are not information assets for classification purposes.
Priority is determined on the basis of following parameters : Confidentiality level (c, 1-10) Integrity level (i, 1-10) Availability level (a, 1-10) Number of user (n) Then, Priority=(c+ (1/n * 10) + i + a)/ (no. of question)
Algo IdAlgo NameBrute Force AttackBEnPercentileAlgo Grade A1Caesar Cipher A2Monoalphabetic Cipher 26! Or 4* A3Playfair Cipher4* A4Rail Fence Ciphere x ( x is message length)
S. NoFile NameConfidentialityIntegrityAvailabilityNo. of UsersPriorityAlgo Id 1.Cust_Info A3 2.Withdrawl_Info A3 3.Deposit_Info A3 4.Cust_Form A4 According to above table, files having different priorities may be encrypted with corresponding algorithm on the basis of Algo Grade.