Adobe LiveCycle Document Security Theresia Devi Indriasari.

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

Authentication of the Federal Register Charley Barth Director, Office of the Federal Register United States Government.
Digital Signatures and Hash Functions. Digital Signatures.
Microsoft Confidential Solution Overview: Foxit Software Corporation’s PDF Security Suite.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Cryptography Basic (cont)
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptographic Technologies
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Chapter 31 Network Security
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
© GlobalSign. A GMO Internet Inc group company. Authentication. Security. Trust. Code Signing Distributing trustworthy software over the Internet.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Module 9 Configuring Messaging Policy and Compliance.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
Network Security David Lazăr.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
What is Digital Signature Building confidentiality and trust into networked transactions. Kishankant Yadav
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Digital Signatures, Message Digest and Authentication Week-9.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Mort Anvari Introduction to Encryption Technology To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
Network Security Celia Li Computer Science and Engineering York University.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Accurate  Consistent  Compliant Contact: i4i the structured content company the structured content company.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
Computer Communication & Networks
IS3230 Access Security Unit 9 PKI and Encryption
Presentation transcript:

Adobe LiveCycle Document Security Theresia Devi Indriasari

Content Adobe LiveCycle Software Adobe LiveCycle Document Security Document Security Issue and Technologies Adobe Success Story Conclusion

Adobe LiveCycle Software What is Adobe Intelligent Document Platform? Bridges the digital and paper worlds, making documents smarter, more portable, and more secure then ever before. The platform employs Adobe Document Services to generate PDF-based Intelligent Document. Adobe Document Services can be delivered by Adobe Acrobat software on the desktop and through Adobe LiveCycle software.

Adobe LiveCycle Software

What is an Intelligent Document? Is a dynamic document looks like a paper document and is easy to use. In kind of: form, report, diagram, or any other business document. Intelligent Documents can also capture data from filled forms and move that data to people and applications based on defined business rules.

Adobe LiveCycle Software What is universal client? Is an interface between people and electronic documents that is available to everyone. Example: Adobe Reader software and Web browsers. What are Adobe Document Services? Are the underlying technologies that create and integrate Intelligent Documents with enterprise applications and business processes.

Adobe LiveCycle Software What is the Adobe LiveCycle? Is the family name of a powerful set of server- based software modules that deliver the latest generation of Adobe Document Services. This is done by integrating Intelligent Documents with an enterpreise’s business process.

Adobe LiveCycle Software Which Adobe LiveCycle products are currently available? Adobe LiveCycle Designer lets form designers quickly create and maintain form templates and make a form intelligent. Adobe LiveCycle Forms helps extend business processes beyond enterprise boundaries by deploying dynamic electronic forms over the Web more securely and automatically capturing data to core business systems. Adobe LiveCycle Document Security delivers digital signature and encryption capabilities in a server environment.

Adobe LiveCycle Software Which Adobe LiveCycle products are currently available? Adobe LiveCycle Reader Extensions activates functions hidden within the free, ubiquitous Adobe Reader to save Adobe PDF, allow the completion of intelligent forms offline, activate commenting and reviewing tools in Adobe PDF files, and use digital signatures to sign Adobe PDF forms. Adobe LiveCycle Policy Server makes it possible to manage and monitor electronic documents by applying persistent confidentiality, privacy, and accountability policies to electronic documents—online or offline, inside or outside the firewall—throughout the document lifecycle.

Adobe LiveCycle Document Security Overviews Many business processes are not fully automated because of security concerns. Paper based-form and physical modes of delivery are expensive and time consuming. Automated process using secure communication protocol still put the organization at risk.

Adobe LiveCycle Document Security How it works Requires a PDF document (generated from Adobe LiveCycle Forms, Adobe Document Server) Then Adobe LiveCycle Document Security apply digital signatures and encryption to the file automatically.

Adobe LifeCycle Document Security Be used for Document signing Document recipients can validate the authenticity and integrity of content signed by the server using digital certificates from leading vendors. Digital signature validation Adobe LiveCycle Document Security receives a PDF document from a user who has signed that document and validates the signature status. Encryption and decryption documents Documents that are automatically generated can be encrypted for distribution, and encrypted documents that have been submitted can be automatically decrypted, providing additional assurance that the contents of the document are not accessed by unauthorized parties.

Adobe LiveCycle Document Security Key features Bring critical processes online, while protecting sensitive information Meet regulatory requirements for paperwork elimination Leverage existing IT investments

Adobe LiveCycle Document Security Certified Document Publishing

Adobe LiveCycle Document Security Secure Information Processing

Document Security Issue and Technologies Introduction Main reason why organization need to address the security of electronically shared documents: Regulatory requirements Return on investment (ROI) Information security

Regulatory requirements Many companies are directly or indirectly affected by government mandates and regulations for providing consumer privacy. Examples: Health Insurance Portability and Accountability Act (HIPAA)—Protection for health-related data European Union Directive on Privacy and Electronic Communications Privacy Acts of Japan and Australia California AB 1950—Protection of customer data Document Security Issue and Technologies Introduction

Return on investment (ROI) Significant ROI can be achieved by migrating to electronic business processes Automated workflows allow prospects, customers, partners, and suppliers to participate, enabling organizations to reap significant cost savings while improving customer satisfaction and loyalty. However, many workflows cannot be automated until adequate protections are put in place on the electronically shared information. Document Security Issue and Technologies Introduction

Information security Thefts of proprietary information are increasing, which can jeopardize revenue, competitive advantage, and customer relationships; generate negative publicity; and result in significant penalties and fines for failure to comply with privacy laws. Document Security Issue and Technologies Introduction

The following criteria define persistent document security: Confidentiality—Who should have access to the document? Authorization—What permissions does the user have for working with the document? Accountability—What has the recipient done with the document? Integrity—How do you know if the document has been altered? Authenticity—How do you know where the document came from? Non-repudiation—Can the signatory deny signing the document? Document Security Issue and Technologies How to provide document security

The two major security techniques used to establish these six document security criteria are document control and digital signatures.

Encryption is the process of transforming information (plaintext) into an incomprehensible form (ciphertext). Encryption is an effective technique for managing document access. Decryption is the reverse process that transforms ciphertext back to the original plaintext. Cryptography refers to the two processes of encryption and decryption and its implementation is referred to as a cryptosystem. Document Security Issue and Technologies Document Control-Confidentiality

Two main types of encryption keys: symmetric Symmetric key cryptography uses the same key for both encryption and decryption and is very fast and difficult to break with large keys. Today, common symmetric key encryption algorithms are AES, DES, 3DES, and RC4. Adobe products leverage AES (128- and 256-bit) and RC4 (128-bit) asymmetric Document Security Issue and Technologies Document Control-Confidentiality

Two main types of encryption keys: asymmetric Asymmetric key cryptography, also called public key cryptography, uses key pairs for encryption and decryption. An individual keeps the private key secret, while the public key is freely distributed to others who wish to communicate with the individual. Some common asymmetric algorithms are RSA, DSA, and El Gamal. Adobe leverages RSA (512-, 1024-, and bit) as it has evolved into a global standard. Document Security Issue and Technologies Document Control-Confidentiality

Hybrid Encryption One approach is to use asymmetric keys to protect the symmetric keys, and then use the symmetric keys for encrypting the information. This technique helps to solve both the key distribution challenge of symmetric key cryptography while solving the performance problem of asymmetric key cryptography. Document Security Issue and Technologies Document Control-Confidentiality

Authorization specifies what a user can do with document. Authorization can be achieved via: Permissions Dynamic document control Permission Permissions govern a user’s actions while working with a protected document. Permissions can specify whether or not a recipient who has access to the document is allowed to print or copy content, fill in fields, add comments or annotate the document, insert or remove pages, forward the document, access the document offline, digitally sign the document, and so forth. Document Security Issue and Technologies Document Control-Authorization

Dynamic document control Dynamic document control maintains access rights and permissions assigned to an electronic document once it has been published and distributed. A document’s author can make changes to a released document without having to manually redistribute it since the changes are automatically pushed to all existing versions of the document no matter where they reside. Document Security Issue and Technologies Document Control-Authorization

Dynamic document control includes the following capabilities: Document expiration and revocation Offline access management Persistent version control Document Security Issue and Technologies Document Control-Authorization

Document auditing allows organizations to maintain accountability with regard to the use of protected documents, because they can know precisely: How a recipient has used a document How often each type of usage occurred When that usage occurred Accountability is achieved when an author can track each recipient’s use of a document for each permission assigned (such as allowing a user to fill in fields on a form, print, forward, save a copy, and so forth.) Document Security Issue and Technologies Document Control-Accountability

When enterprises distribute documents electronically, it is often important that recipients can verify: That the content has not been altered (integrity) That the document is coming from the actual person who sent it (authenticity) That an individual who has signed the document cannot deny the signature(non-repudiation) Document Security Issue and Technologies Digital signatures

Document Security Issue and Technologies Digital signatures-Integrity Methods for maintaining integrity include: Parity bits or cyclical redundancy checking (CRC) functions One-way hash A one-way hash creates a fixed-length value, called the hash value or message digest for a message of any length. A hash is like a unique fingerprint. With a hash attached to the original message, a recipient can determine if the message was altered by recomputing the hash and comparing his or her answer to the attached hash. Adobe has adopted the SHA-1 and SHA-256 algorithms Message Authentication Codes (MAC) A MAC prevents an attacker from obtaining the original message, modifying it, and attaching a new hash.

Document Security Issue and Technologies Digital signatures-Integrity

Digital signatures provide document authenticity by verifying a signer’s digital identity. The process that constitutes a digital signature is as follows: A hash is created of the original document. The digital signature is created, which encrypts the hash with a private key. The signature is included with the document. Document Security Issue and Technologies Digital signatures-Authenticity

Document Security Issue and Technologies Digital signatures-Non repudiation Non-repudiation is a document security service that prevents the signor of the document from denying that they signed the document.

Adobe Success Story Pennsylvania State University Pennsylvania State University Industry Education Challenges Streamline issuing 120,000 transcripts annually Ensure authenticity of electronically delivered student transcripts Prevent unauthorized changes to transcripts

Adobe Success Story Pennsylvania State University Solution Document Generation Document Control and Security Penn State is using Adobe solutions to provide an online certified transcript service to alumni worldwide Results Accelerated production and delivery of transcripts by more than 99% Reallocated administrative time to other student services Improved integrity and authenticity of transcripts Anticipated full ROI within one year of deployment In Partnership With GeoTrust Four Point Solutions SafeNet

Adobe Success Story Pennsylvania State University

Conclusion A significantly more effective solution for protecting an electronic document is to assign security parameters that are an integral part of the document itself. By applying security parameters to the individual document, organizations gain greater assurance in the confidentiality, authenticity, and integrity of electronically shared documents in addition to securing the communication line or storage location. As organizations accelerate online processing, Adobe security solutions deliver document control and digital signature services that simplify the process of protecting sensitive electronic documents and forms. Adobe document security provides persistent, end-to-end protection throughout an electronic document’s lifecycle, including desktop solutions that make it easy for every user in an organization to protect documents and server-based solutions that automate the application and monitoring of document protection on an enterprise- wide basis.