NWIMS. Online Backup Security Documentation



Similar documents
Blaze Vault Online Backup. Whitepaper Data Security

DataTrust Backup Software. Whitepaper Data Security. Version 6.8

Ahsay Online Backup. Whitepaper Data Security

Data Superhero Online Backup Whitepaper Data Security

DRAFT Standard Statement Encryption

BeamYourScreen Security

Is your data safe out there? -A white Paper on Online Security

MIKOGO SECURITY DOCUMENT

Security Policy Revision Date: 23 April 2009

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery

Spreed Keeps Online Meetings Secure. Online meeting controls and security mechanism.

eztechdirect Backup Service Features

How To Backup Your Hard Drive With Pros 4 Technology Online Backup

Analyzing the Security Schemes of Various Cloud Storage Services

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Brochure Achieving security with cloud data protection. Autonomy LiveVault

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

SVA Backup Plus Features

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA

Securing Data at Rest ViSolve IT Security Team

CrashPlan Security SECURITY CONTEXT TECHNOLOGY

PENN. Social Sciences Computing a division of SAS Computing. SAS Computing SSC. File Security. John Marcotte Director of SSC.

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Sync Security and Privacy Brief

You re FREE Guide SSL. (Secure Sockets Layer) webvisions

Obtaining a user account and password: To obtain a user account, please submit the following information to AJRR staff:

Product Overview. Initial Seeding

Introduction. Ease-of-Use

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM

Complying with PCI Data Security

SSL A discussion of the Secure Socket Layer

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Overview Servers and Infrastructure Communication channels Peer-to-Peer connections Data Compression and Encryption...

Out of Harms Reach -A Whitepaper on Online Backup

Network Security Part II: Standards

Electronic Service Agent TM. Network and Transmission Security And Information Privacy

Network Security Protocols

HIPAA Privacy & Security White Paper

DigiVault Online Backup Manager. User Guide

Online Backup Solution Features

Question How do I access the router s web-based setup page? Answer

MQ Authenticate User Security Exit Overview

Virtual Private Networks

HIPAA COMPLIANCE AND

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

Online Backup by Mozy. Common Questions

EXAM questions for the course TTM Information Security May Part 1

RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release corrections. ADYTON Release 2.12.

The next generation of knowledge and expertise Wireless Security Basics

Transport Layer Security Protocols

The Secure Sockets Layer (SSL)

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

Chapter 7 Transport-Level Security

Single Sign-On Secure Authentication Password Mechanism

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...

Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow

Cloud Backup Express

1 Using DATABOKS Online Backup Manager

Features Security. File Versioning. Intuitive User Interface. Fast and efficient Backups

WS_FTP Professional 12. Security Guide

Chapter 17. Transport-Level Security

The Encryption Technology of Automatic Teller Machine Networks

FAQ. Hosted Data Disaster Protection

introducing The BlackBerry Collaboration Service

CRYPTOGRAPHY IN NETWORK SECURITY

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Cornerstones of Security

E-Commerce: Designing And Creating An Online Store

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services

Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services

FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SSL/FTP (File Transfer Protocol over Secure Sockets Layer)

Lab 7. Answer. Figure 1

techsafe Features Technology Partners th Street - Vero Beach, FL (772) Page 1/

PCI Compliance Considerations

How To Understand And Understand The History Of Cryptography

Cleaning Encrypted Traffic

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

, ) I Transport Layer Security

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

IBM i Version 7.3. Security Digital Certificate Manager IBM

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Authentication in WLAN

ReadyNAS Remote White Paper. NETGEAR May 2010

Why you need secure

Web Security Considerations

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

MovieLabs Specification for Enhanced Content Protection Version 1.0

Encryption VIDEO COMMUNICATION SYSTEM-TECHNICAL DOCUMENTATION

Virtual Machine Encryption Basics

SSL. Secure Sockets Layer. - a short summary - By Christoph Gutmann and Khôi Tran

Transcription:

NWIMS Online Backup Security Documentation January 2010

Contents This product guide is designed to cover Security of NWIMS Online Backup. Secure 128-bit SSL Communication 2 Backup data area securely encrypted 2 Encrypting key is well protected 3 Best encryption algorithm is used 4 Restrict access to data by IP addresses 4 Data Centre Security 5-1 -

Secure 128-bit SSL Communication All communication between NWIMS Backup Server and your computer is transported in a 256-bit SSL (Secure Socket Layer) channel. Although all your backup files travel through a public network (internet), eavesdroppers have no knowledge of what has been exchanged. Backup data securely encrypted All of your files are first compressed and encrypted with your defined encrypting key before they are sent to the NWIMS Backup Server. To all people but you, your files sent and stored on the Backup Server are no more than some garbage files with random content. - 2 -

Encrypting Key is well protected The encrypting key used to encrypt your files resides only on your computer and is known only to you. It is never transmitted anywhere across the network. Thus, even the system administrators will not be able to decrypt and view the content of your files stored on the backup server without your permission. This unfortunately means if the encrypting key is lost, you will never be able to recover your backup files. Technical Details The encrypting key for the different backup sets are stored in the config.sys file, which is encoded by a proprietary algorithm: (windows) C:\Documentsand Settings\%username%\.obm\config\config.sys (Linux) ~/.obm/config/config.sys (Mac OS X) ~/.obm/config/config.sys If client software cannot locate the config.sys (due to accidental deletion or logon to a new machine with the same account), it will prompt the user to re-enter the encrypting key for the backup set and store it in the local config.sys. - 3 -

Best encryption algorithm is used Currently, the algorithm that we are using to encrypt your files is 256-bit AES, AES was announced by National Institute of Standards and Technology (NIST) as U.S. FIPS PUB 197 (FIPS 197) on November 26, 2001 after a 5-year standardization process in which fifiteen competing designs were presented and evaluated before Rijndael was selected as the most suitable (see Advanced Encryption standard process for more details). It became effective asa standard 26 May 2002. As of 2009, AES is one of the most popularar algorithms used in symmetric key cryptography. It is available in many different encryption packages. AES is the first publicly accessible and open cipher approved by the NSA for top secret information. Best encryption algorithm is used You can also restrict access to yoru backup files from the set of IP address you defined. If someone tries to access your data from an IP address not on your defined list, their access will be denied. This additional security ensures backup files are not open to all locations, even if the username and password are known. - 4 -

Data Center Your data is stored on highly secured servers located in Sheffield or Kendal. These online storage infrastructures can only be accessed by Security vetted NWIMS Staff. CCTV, motion detection, key fob access and a 24/7 guard presence ensure high levels of physical security. The access key fob system ensures high levels of entry security. Each Server Rack has combination locks as standard, allowing individual privacy and security. The APC UPS Systems are fully monitored and configured in an N+1 resilliant architecture. Other features of the centres include Bandit Proof Glass Onsite Security Including weekends Required Photo ID Cards Required Driving Licence ID Card or Passport Our servers are located behind 3 security checkpoints, 6 security key fob and combination locked doors Combination locked racks - 5 -