Ahsay Online Backup. Whitepaper Data Security



Similar documents
Data Superhero Online Backup Whitepaper Data Security

DataTrust Backup Software. Whitepaper Data Security. Version 6.8

Blaze Vault Online Backup. Whitepaper Data Security

NWIMS. Online Backup Security Documentation

Ahsay Online Backup Suite v5.1. Brick-Level Exchange Backup

Is your data safe out there? -A white Paper on Online Security

Security Policy Revision Date: 23 April 2009

eztechdirect Backup Service Features

BeamYourScreen Security

Online Backup Client User Manual

Virtual Private Networks

MIKOGO SECURITY DOCUMENT

DigiVault Online Backup Manager. User Guide

Securing Data at Rest ViSolve IT Security Team

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Out of Harms Reach -A Whitepaper on Online Backup

1. Product Information

Online Backup Client User Manual Linux

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010

Overview Servers and Infrastructure Communication channels Peer-to-Peer connections Data Compression and Encryption...

RecoveryVault Express Client User Manual

How To Backup Your Hard Drive With Pros 4 Technology Online Backup

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20

Online Backup Linux Client User Manual

Online Backup Client User Manual

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Product Overview. Initial Seeding

SVA Backup Plus Features

CRYPTOGRAPHY IN NETWORK SECURITY

CHAPTER 1 INTRODUCTION

1 Using DATABOKS Online Backup Manager

Sync Security and Privacy Brief

TABLE OF CONTENTS. Copyright Pro Softnet Corporation. All rights reserved. 2

Sophisticated Password Policy

Introduction. Ease-of-Use

Online Backup by Mozy. Common Questions

Three attacks in SSL protocol and their solutions

Set Up Instructions

Analyzing the Security Schemes of Various Cloud Storage Services

DRAFT Standard Statement Encryption

Startup guide for Zimonitor

PENN. Social Sciences Computing a division of SAS Computing. SAS Computing SSC. File Security. John Marcotte Director of SSC.

Electronic Service Agent TM. Network and Transmission Security And Information Privacy

EXAM questions for the course TTM Information Security May Part 1

CrashPlan Security SECURITY CONTEXT TECHNOLOGY

RemotelyAnywhere. Security Considerations

Online Backup Solution Features

SAS Data Set Encryption Options

White Paper. Enhancing Website Security with Algorithm Agility

Cloud Backup Express

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA

cubesql ReadMe SQLabs, All rights reserved.

Guidelines on use of encryption to protect person identifiable and sensitive information

DOCUMENTATION MySQL BACKUP & RESTORE OPERATIONS

The Security Behind Sticky Password

Zen Internet. Online Data Backup. Zen Vault Express for Windows. Issue:

TeamViewer Security Information

User Guide. G 4 Supreme. April AES 256 Encrypted USB Flash Drive. Prepared By: Md. Zakir Hosen

Features Security. File Versioning. Intuitive User Interface. Fast and efficient Backups

Why you need secure

SecureDoc for Mac v6.1. User Manual

ShareFile Security Overview

Ciphermail for Android Quick Start Guide

PCI Data Security. Meeting the Challenges of PCI DSS Payment Card Security

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Authentication in WLAN

Security of Cloud Storage: - Deduplication vs. Privacy

Sophos SafeGuard Native Device Encryption for Mac quick startup guide. Product version: 7

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery

TeamViewer Security Information

1. Please login to the Own Web Now Support Portal ( with your address and a password.

How Secure are your Channels? By Morag Hughson

Expertcity GoToMyPC and GraphOn GO-Global XP Enterprise Edition

IBM i Encryption in a Snap! Implement IBM FIELDPROC with a simple to use GUI and a few clicks of your mouse.

2014 IBM Corporation

Lepide Active Directory Self Service. Configuration Guide. Follow the simple steps given in this document to start working with

Authenticated encryption

PC Business Banking. Technical Requirements

Web Security: Encryption & Authentication

Veeam Cloud Connect. Version 8.0. Administrator Guide

Software Engineering 4C03 Research Project. An Overview of Secure Transmission on the World Wide Web. Sean MacDonald

Hardware and Software Requirements for Installing California.pro

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

SSL A discussion of the Secure Socket Layer

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

FIPS Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

Transcription:

Ahsay Online Backup Version 5.x Jun 2006

Table of Content 1 Introduction...3 2 Server Secure, Robust and Reliable...4 2.1 Secure 128-bit SSL communication...4 2.2 Backup data are securely encrypted...4 2.3 Encrypting key are well protected...4 2.4 Best encryption algorithm is used...5 2.5 Require 8.77 x 10 17 years to crack the 128-bit encryption...5 2.6 Restrict access to data by IP addresses...5 Leb Shama Company Limited Page 2 of 5

1 Introduction This document describes the security measures available in Ahsay Online Backup software from the user s perspective. It serves as a reference for partners when addressing customers queries on security. Leb Shama Company Limited Page 3 of 5

2 Server Secure, Robust and Reliable 2.1 Secure 128-bit SSL communication All communications between Ahsay Backup Server and your computer are transported in a 128-bit SSL (Secure Socket Layer) channel. Although all your backup files travel through a public network (internet), eavesdroppers have no knowledge of what has been exchanged. 2.2 Backup data are securely encrypted All of your files are first zipped and encrypted with your defined encrypting key before they are sent to Ahsay backup server. To all people but you, your files stored on Ahsay backup server are no more than some garbage files with random content. 2.3 Encrypting key are well protected The encrypting key used to encrypt your files resides only on your computer and is known only to you. It is never transmitted anywhere across the network. Thus, even the system administrators will not be able to decrypt and view the content of your files stored on the backup server without your permission. This unfortunately means if the encrypting key is lost, you will never be able to recover your backup files. Technical Details The encrypting key for the different backup sets are stored the config.sys file, which is encoded by a proprietary algorithm: (Windows) C:\Documents and Settings\administrator\.obm\config\config.sys (Linux) ~/.obm/config/config.sys (Mac OS X) ~/.obm/config/config.sys Leb Shama Company Limited Page 4 of 5

If client software cannot locate the config.sys (due to accidental deletion or logon to a new machine with the same account), it will prompt the user to re-enter the encrypting key for the backup set and then store it in the local config.sys. 2.4 Best encryption algorithm is used Currently, the algorithm that we are using to encrypt your files is 128-bit Twofish. It is a block cipher designed by Counterpane Labs. It was also one of the five Advanced Encryption Standard (AES) finalists chosen by National Institute of Standard and Technology (NIST). It subjects to frequent public reviews but no known attack against this algorithm has been reported. 2.5 Require 8.77 x 10 17 years to crack the 128-bit encryption A 128-bit key size has 2 128 or around 3.4 x 10 38 possible combination. Even if you have the world best super computer, ASCI White, SP Power3 375 MHz manufactured by IBM as of November 2000, it would take 8.77 x 10 17 years to test all combinations. Assuming your have the super computer, ASCI White, SP Power3 375 MHz has 8192 processors which totals a capability of 12.3 teraflops (trillions of operations/second), available to you. Also it just needs one computer operation to test a possible combination (which is already faster than what it can do). To use brute force attack (checking all combinations) on this encryption algorithm. It would take: 3.4 x 1038 -------------- seconds ~ 2.76 x 10 25 sec 12.3 x 1012 i.e. 876530835323573935 years or 8.77 x 10 17 years to successfully try all combinations. Let alone ASCI White cannot process as fast as what described here. You can be sure that your data stored on our server is 100% secured. 2.6 Restrict access to data by IP addresses You can also restrict access to your backup files from the set of IP addresses you defined. If someone tries to access your data from an IP address not on your defined list, their access will be denied. This additional security ensures backup files are not open to all location, even username and password are known. Leb Shama Company Limited Page 5 of 5