DataTrust Backup Software. Whitepaper Data Security. Version 6.8



Similar documents
DFW Backup Software. Whitepaper Data Security

Ahsay Online Backup. Whitepaper Data Security

Data Superhero Online Backup Whitepaper Data Security

Blaze Vault Online Backup. Whitepaper Data Security

ELPBack Online Backup Whitepaper Data Security Version 5.5.x Jun 2008 Protecting Tomorrow with yesterday ELPBack Offsite Backup Whitepaper Data

NWIMS. Online Backup Security Documentation

1. Secure 128-Bit SSL Communication 2. Backups Are Securely Encrypted 3. We Don t Keep Your Encryption Key VERY IMPORTANT:

eztechdirect Backup Service Features

Is your data safe out there? -A white Paper on Online Security

How To Backup Your Hard Drive With Pros 4 Technology Online Backup

SVA Backup Plus Features

Introduction. Ease-of-Use

Security Policy Revision Date: 23 April 2009

RecoveryVault Express Client User Manual

BeamYourScreen Security

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA

Online Backup Solution Features

Online Backup Linux Client User Manual

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery

Online Backup Client User Manual

MIKOGO SECURITY DOCUMENT

1. Product Information

Online Backup Client User Manual Linux

DataTrust Online Backup

1 Using DATABOKS Online Backup Manager

CRYPTOGRAPHY IN NETWORK SECURITY

Online Backup Client User Manual

Securing Data at Rest ViSolve IT Security Team

Virtual Private Networks

DRAFT Standard Statement Encryption

Overview Servers and Infrastructure Communication channels Peer-to-Peer connections Data Compression and Encryption...

Cloud Backup Express

Sophisticated Password Policy

Online Backup by Mozy. Common Questions

DigiVault Online Backup Manager. User Guide

Sync Security and Privacy Brief

Ensuring HIPAA Compliance with eztechdirect Online Backup and Archiving Services

High Security Online Backup. A Cyphertite White Paper February, Cloud-Based Backup Storage Threat Models

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

Analyzing the Security Schemes of Various Cloud Storage Services

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Why you need secure

SAS Data Set Encryption Options

SecureDoc for Mac v6.1. User Manual

EXAM questions for the course TTM Information Security May Part 1

Authentication in WLAN

Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow

E- Encryption in Unix

Backup/Restore MySQL Server

TeamViewer Security Information

Backup/Restore Individual Brick Level Backup for Microsoft Exchange Server

Set Up Instructions

Authenticated encryption

BackupAgent Management Console User Manual

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals

Dashlane Security Whitepaper

techsafe Features Technology Partners th Street - Vero Beach, FL (772) Page 1/

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services

netfusion Data Guardian Online Backup

HIPAA COMPLIANCE AND

Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services

TeamViewer Security Information

CrashPlan Security SECURITY CONTEXT TECHNOLOGY

Minimizing Computer Data Loss Risks With Online Backup. Seven Devastating but Common Computer Backup Mistakes

Question How do I access the router s web-based setup page? Answer

SSL A discussion of the Secure Socket Layer

1 Backup/Restore Files

Personal Security in the Cloud The Basics. Dr. David A. Cook Stephen F. Austin State University 1

Three attacks in SSL protocol and their solutions

TABLE OF CONTENTS. Copyright Pro Softnet Corporation. All rights reserved. 2

Product Overview. Initial Seeding

The Misuse of RC4 in Microsoft Word and Excel

A Standards-based Approach to IP Protection for HDLs

Features Security. File Versioning. Intuitive User Interface. Fast and efficient Backups

DataTrust Backup Software. Whitepaper DataTrust Backup Agent. Version 6.3

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Orixcloud Backup Client. Frequently Asked Questions

Apptix Online Backup by Mozy

CONTENT SECURITY KRAMER S APPROACH TO SECURING DATA WITHIN WIRELESS TRANSMISSION KRAMER WHITE PAPER

The Case For Secure

Out of Harms Reach -A Whitepaper on Online Backup

IBackup Drive User Guide

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Chapter 17. Transport-Level Security

Criteria for web application security check. Version

Backup/Restore Individual Brick Level Backup for Microsoft Exchange Server

How To Understand And Understand The History Of Cryptography

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Wireless Encryption Protection

Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Ciphermail for Android Quick Start Guide

CHAPTER 1 INTRODUCTION

Securing Data Stored On Tape With Encryption: How To Choose the Right Encryption Key Management Solution

Sophos SafeGuard Native Device Encryption for Mac quick startup guide. Product version: 7

Release 2.0. Cox Business Online Backup Quick Start Guide

Transcription:

Version 6.8

Table of Contents 1 Introduction... 3 2 DataTrust Offsite Backup Server Secure, Robust and Reliable... 4 2.1 Secure 128-bit SSL communication... 4 2.2 Backup data are securely encrypted... 4 2.3 Encrypting key are well protected... 5 2.4 Best encryption algorithm is used... 6 2.5 Require 1.46 x 10 54 years to crack the 256-bit encryption... 7 2.6 Restrict access to data by IP addresses... 8 DataTrust Limited Page 2 of 8 (01) 4045129

1 Introduction This document describes the security measures available in DataTrust Online Backup software from the user s perspective. It serves as a reference for partners when addressing customers queries on security. DataTrust Limited Page 3 of 8 (01) 4045129

2 DataTrust Offsite Backup Server Secure, Robust and Reliable 2.1 Secure 128-bit SSL communication All communications between DataTrust Backup Server and your computer are transported in a 128-bit SSL (Secure Socket Layer) channel. This is the technology used by the Banking Industry to Secure Customer Communications when using Online Banking. Although all your backup files travel through a public network (internet), eavesdroppers have no knowledge of what has been exchanged. 2.2 Backup data are securely encrypted All of your files are first zipped and encrypted with your defined encrypting key before they are sent to DataTrust backup server. To all people but you, your files stored on DataTrust backup server are nothing more than some garbage files with random content. This encrypted cyphertext is then transmitted to our Secure Data Centre over Secure Encrypted SSL Channel. ( Descibed in previous chapter 2.1 ) DataTrust Limited Page 4 of 8 (01) 4045129

2.3 Encrypting key are well protected The encrypting key used to encrypt your files resides only on your computer and is known only to you. Thus, even the DataTrust System Administrators will not be able to decrypt and view the content of your files stored on the backup server without your permission. This unfortunately means if the encrypting key is lost, you will never be able to recover your backup files. Technical Details The encrypting key for the different backup sets are stored the config.sys file, which is encoded by a proprietary algorithm: (Windows) (Linux) (Mac OS X) %USERPROFILE%\.obm\config\config.sys ~/.obm/config/config.sys ~/.obm/config/config.sys If client software cannot locate the config.sys (due to accidental deletion or logon to a new machine with the same account), it will prompt the user to re-enter the encrypting key for the backup set and then store it in the local config.sys. DataTrust Limited Page 5 of 8 (01) 4045129

2.4 Best encryption algorithm is used Currently, the algorithm that we are using to encrypt your files is Advanced Encryption Standard (AES), with 256-bit block ciphers. It is adapted from a larger collection originally published as Rijndael. AES is the first publicly accessible and open cipher approved by the National Security Agency (NSA) of USA for top secret information. DataTrust Limited Page 6 of 8 (01) 4045129

2.5 Require 1.46 x 10 54 years to crack the 256-bit encryption A 256-bit key size has 2 256 or around 1.16 x 10 77 possible combination. Even if you have the world best super computer, Tianhe-1A, with 14,336 Xeon X5670 (6 Core, 2.93GHz) processors developed by the Chinese National University of Defense Technology as of October 2010, it would take 1.46 x 10 54 years to test all combinations. Assuming you have the super computer, Tianhe-1A which totals a capability of 2.507 petaflops (quadrillion of operations/second), available to you. Also it just needs one computer operation to test a possible combination (which is already faster than what it can do). To use brute force attack (checking all combinations) on this encryption algorithm, it would take: 1.16 x 10 77 -------------- seconds ~ 4.621 x 10 61 sec 2.507 x 10 15 i.e. 1.46 x 10 54 years to successfully try all combinations. Let alone Tianhe-1A cannot process as fast as what described here. You can be sure that your data stored on our server is 100% secured. DataTrust Limited Page 7 of 8 (01) 4045129

2.6 Restrict access to data by IP addresses DataTrust Backup Software You can also restrict access to your backup files from the set of IP addresses you define. If someone tries to access your data from an IP address not on your defined list, their access will be denied. This additional security ensures backup files are not open to all location, even if the username, password and Encryption Key were known. DataTrust Limited Page 8 of 8 (01) 4045129