100 likes | 253 Views
ASSET REGISTER FOR DATA PROTECTION USING FILE ENCRYPTION MECHANISM. Indian Institute of Information Technology, Allahabad. Objective. Problems related to file security What is asset register How to analyze asset Grading of algorithms Solution of problem Conclusion. Problem:.
E N D
ASSET REGISTER FOR DATA PROTECTION USING FILE ENCRYPTION MECHANISM Indian Institute of Information Technology, Allahabad
Objective Problems related to file security • What is asset register • How to analyze asset • Grading of algorithms • Solution of problem • Conclusion
Problem: • Many of the breaches making headline news are caused by the loss or theft of laptops and other portable devices. • How to encrypt data present in file according to their criticality and sensitivity . • How to decide the criticality and sensitivity of file. • How to select a algorithm which would be most suitable to encrypt data prevailing inside file.
Cont. • To protect themselves from financial and reputational damage, Asset register encryption technologies can reduce risks by ensuring the information on such devices is secure when users are on the move.
Asset Register: • Anything that has value to the agency that can be communicated or documentary material, regardless of its physical form or characteristics is called an Asset. • Includes, but is not limited to, paper, electronic, digital, images, and voice mail. • Information technology hardware and software are not information assets for classification purposes.
Analysis of Assets:- Priority is determined on the basis of following parameters : • Confidentiality level (c, 1-10) • Integrity level (i, 1-10) • Availability level (a, 1-10) • Number of user (n) Then, Priority=(c+ (1/n * 10) + i + a)/ (no. of question)
Grading of algorithms • To Grade different encryption algorithm we use the percentile value as follows: • Percentile = ((B + 0.5E)/n)*100 • Where B = number of algorithms having less Brute Force Attack E = number of algorithms having equal Brute Force Attack n = Total number of Algorithms • AlgoGrade = Percentile/10
Solution of problem • According to above table, files having different priorities may be encrypted with corresponding algorithm on the basis of Algo Grade.
Conclusion • By applying the concept of Asset Register to secure the files, we are able to encrypt more critical files using more secure encrypting algorithm based on the Grading of algorithms. Hence, the goals for achieving a security mechanism which do not only secure files and data but also consider the need and requirement of the user which makes it an effective and simple technique. • In the perspective of banking transaction, it can be incorporated to make all the security of the files very much safe and sound and as a future orientation this technique can be applied in remote transaction in the same organization in different domain.