ASPECTS OF INFORMATION SECURITY IN THE ELECTRONIC DOCUMENT MANAGEMENT SYSTEM (EDMS) FOR BANK SYSTEM
Keywords:
confidentiality; authorization; accountability; integrity; authenticity; reliabilityAbstract
This article provides an overview of current document security issues and technologies, and presents a suite of document security solutions. This article also summarizes implementations of document control and digital signatures for protecting electronic documents. As organizations move more and more business processes online, protecting the confidentiality and security of the information used in these processes, as well as ensuring the authenticity and integrity, is essential. Since many automated processes rely on electronic documents containing sensitive information, organizations must properly protect these documents. Many information security solutions attempt to protect electronic documents only when they are stored or in transit. However, these solutions do not provide protection for the entire life cycle of an electronic document. When the document reaches the recipient, the protection is lost and the document can be intentionally or unintentionally forwarded and viewed by unauthorized recipients. A much more efficient solution is to secure the document by assigning security parameters that are passed along with it. To ensure more effective protection of an electronic document throughout its life cycle, six criteria must be met: confidentiality, authorization, accountability, integrity, authenticity and non-repudiation. The two main security methods used to establish these six document security criteria are document management and digital signatures. The Electronic Security Suite provides document control and digital signature services that simplify the process of securing sensitive electronic documents and forms. Organizations can easily integrate electronic document security solutions into their current business processes and corporate infrastructure to support a wide range of simple and complex processes. The solutions dynamically protect electronic documents both on and off the network, online and offline, providing end-to-end security throughout the entire lifecycle of an electronic document.
References
http://www.en.wikipedia.org/wiki/Digital_preservation
http://www.en.wikipedia.org/wiki/six_key_criteria_for_providing_document_peristant_security
https://www.gov.uk/data/NC_framework_document_-_FINAL.pdf
http://www.en.wikipedia.org/wiki/Document_security
Adrian Spalka, Armin Cremers, and Hanno Langweg. Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse. In IFIP Security Conference, 2001