Data Superhero Online Backup Whitepaper Data Security



Similar documents
Ahsay Online Backup. Whitepaper Data Security

DataTrust Backup Software. Whitepaper Data Security. Version 6.8

Blaze Vault Online Backup. Whitepaper Data Security

NWIMS. Online Backup Security Documentation

eztechdirect Backup Service Features

Is your data safe out there? -A white Paper on Online Security

Security Policy Revision Date: 23 April 2009

BeamYourScreen Security

Online Backup Client User Manual

Out of Harms Reach -A Whitepaper on Online Backup

Virtual Private Networks

MIKOGO SECURITY DOCUMENT

How To Backup Your Hard Drive With Pros 4 Technology Online Backup

Securing Data at Rest ViSolve IT Security Team

SVA Backup Plus Features

DigiVault Online Backup Manager. User Guide

1 Using DATABOKS Online Backup Manager

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

1. Product Information

Online Backup Client User Manual Linux

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010

Introduction. Ease-of-Use

Sophisticated Password Policy

Online Backup by Mozy. Common Questions

Overview Servers and Infrastructure Communication channels Peer-to-Peer connections Data Compression and Encryption...

RecoveryVault Express Client User Manual

DRAFT Standard Statement Encryption

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20

Online Backup Linux Client User Manual

Online Backup Client User Manual

Online Backup Solution Features

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA

Product Overview. Initial Seeding

CRYPTOGRAPHY IN NETWORK SECURITY

Cloud Backup Express

CHAPTER 1 INTRODUCTION

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery

Sync Security and Privacy Brief

Security Architecture Whitepaper

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

Backup/Restore MySQL Server

Three attacks in SSL protocol and their solutions

Set Up Instructions

Backup/Restore Individual Brick Level Backup for Microsoft Exchange Server

Analyzing the Security Schemes of Various Cloud Storage Services

PENN. Social Sciences Computing a division of SAS Computing. SAS Computing SSC. File Security. John Marcotte Director of SSC.

Electronic Service Agent TM. Network and Transmission Security And Information Privacy

EXAM questions for the course TTM Information Security May Part 1

CrashPlan Security SECURITY CONTEXT TECHNOLOGY

Veeam Cloud Connect. Version 8.0. Administrator Guide

Minimizing Computer Data Loss Risks With Online Backup. Seven Devastating but Common Computer Backup Mistakes

RemotelyAnywhere. Security Considerations

SAS Data Set Encryption Options

White Paper. Enhancing Website Security with Algorithm Agility

cubesql ReadMe SQLabs, All rights reserved.

TABLE OF CONTENTS. Copyright Pro Softnet Corporation. All rights reserved. 2

DOCUMENTATION MySQL BACKUP & RESTORE OPERATIONS

Features Security. File Versioning. Intuitive User Interface. Fast and efficient Backups

The Security Behind Sticky Password

We look beyond IT. Cloud Offerings

High Security Online Backup. A Cyphertite White Paper February, Cloud-Based Backup Storage Threat Models

TeamViewer Security Information

Apptix Online Backup by Mozy

User Guide. G 4 Supreme. April AES 256 Encrypted USB Flash Drive. Prepared By: Md. Zakir Hosen

Transition Networks White Paper. Network Security. Why Authentication Matters YOUR NETWORK. OUR CONNECTION.

Why you need secure

SecureDoc for Mac v6.1. User Manual

Ciphermail for Android Quick Start Guide

ShareFile Security Overview

Authentication in WLAN

Symantec Backup Exec.cloud

CONTENT SECURITY KRAMER S APPROACH TO SECURING DATA WITHIN WIRELESS TRANSMISSION KRAMER WHITE PAPER

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup

Sophos SafeGuard Native Device Encryption for Mac quick startup guide. Product version: 7

TeamViewer Security Information

How Secure are your Channels? By Morag Hughson

IBM i Encryption in a Snap! Implement IBM FIELDPROC with a simple to use GUI and a few clicks of your mouse.

Expertcity GoToMyPC and GraphOn GO-Global XP Enterprise Edition

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services

2014 IBM Corporation

HIPAA COMPLIANCE AND

PC Business Banking. Technical Requirements

Software Engineering 4C03 Research Project. An Overview of Secure Transmission on the World Wide Web. Sean MacDonald

Web Security: Encryption & Authentication

DreamFactory Security Whitepaper Customer Information about Privacy and Security

Transcription:

Data Superhero Online Backup Whitepaper Data Security Cottage Computers Ltd. Page 1 of 5 (April 15, 2008)

Table of Contents Contents 1. Data Superhero Offsite Backup Server Secure, Robust and Reliable... 3 1.1. Secure 128-bit SSL communication... 3 1.2. Backup data are securely encrypted... 3 1.3. Encrypting key are well protected... 4 1.4. Best encryption algorithm is used... 4 1.5. Require 8.77 x 1017 years to crack the 128-bit encryption... 4 1.6. Restrict access to data by IP addresses... 5 Cottage Computers Ltd. Page 2 of 5 (April 15, 2008)

1. Data Superhero Offsite Backup Server Secure, Robust and Reliable 1.1. Secure 128-bit SSL communication All communications between Data Superhero Backup Server and your computer are transported in a 128-bitSSL (Secure Socket Layer) channel. Although all your backup files travel through a public network(internet), eavesdroppers have no knowledge of what has been exchanged. 1.2. Backup data are securely encrypted All of your files are first zipped and encrypted with your defined encrypting key before they are sent to Data Superhero backup server. To all people but you, your files stored on Data Superhero backup server are no more than some garbage files with random content. Cottage Computers Ltd. Page 3 of 5 (April 15, 2008)

1.3. Encrypting key are well protected The encrypting key used to encrypt your files resides only on your computer and is known only to you. It is never transmitted anywhere across the network. Thus, even the system administrators will not be able to decrypt and view the content of your files stored on the backup server without your permission. This unfortunately means if the encrypting key is lost, you will never be able to recover your backup files. Technical Details The encrypting key for the different backup sets are stored the config.sys file, which is encoded by a proprietary algorithm: (Windows) C:\Documents and Settings\administrator\.obm\config\config.sys (Linux) ~/.obm/config/config.sys (Mac OS X) ~/.obm/config/config.sys If client software cannot locate the config.sys (due to accidental deletion or logon to a new machine with the same account), it will prompt the user to re-enter the encrypting key for the backup set and then store it in the local config.sys. 1.4. Best encryption algorithm is used Currently, the algorithm that we are using to encrypt your files is 128-bit Twofish. It is a block cipher designed by Counterpane Labs. It was also one of the five Advanced Encryption Standard (AES) finalists chosen by National Institute of Standard and Technology (NIST). It subjects to frequent public reviews but no known attack against this algorithm has been reported. 1.5. Require 8.77 x 1017 years to crack the 128-bit encryption A 128-bit key size has 2128 or around 3.4 x 1038 possible combination. Even if you have the world best super computer, ASCI White, SP Power3 375 MHz manufactured by IBM as of November 2000, it would take 8.77 x 1017years to test all combinations. Assuming you have the super computer, ASCI White, SP Power3 375 MHz has 8192 processors which totals a capability of 12.3 teraflops (trillions of operations/second), available to you. Also it just needs one computer operation to test a possible combination (which is already faster than what it can do). To use brute force attack (checking all combinations) on this encryption algorithm. It would take: 3.4 x 1038 -------------- seconds ~ 2.76 x 1025sec 12.3 x 1012 i.e. 876530835323573935 years or 8.77 x 1017 years To successfully try all combinations. Let alone ASCI White cannot process as fast as what described here. You can be sure that your data stored on our server is 100% secured. Cottage Computers Ltd. Page 4 of 5 (April 15, 2008)

1.6. Restrict access to data by IP addresses You can also restrict access to your backup files from the set of IP addresses you defined. If someone tries to access your data from an IP address not on your defined list, their access will be denied. This additional security ensures backup files are not open to all location, even if the username and password are known. Cottage Computers Ltd. Page 5 of 5 (April 15, 2008)