Saturday, April 9, 2016

With new software identify people who steal information – Research and Development

One of the biggest problems facing both the government and business sectors is the theft of information, according to a report by specializing in computer security RSA company, it meant organizations with a loss of 4.5 billion dollars in 2014.

through specialized software document security, specialists and Research Center Advanced Studies (CINVESTAV) pose not only reinforce security levels for documents, but should be shared illegally have the ability to identify the person responsible.

the software was developed in the Laboratory Technologies of Information Cinvestav Unit Tamaulipas by the research group led by Jose Juan Garcia Hernandez, who said that currently does not exist in the marking of computer security a product with the same characteristics, so expect to market in the short term among organizations and companies.

The program was conducted in C language, Linux system, so it is possible to migrate to other computer so it easy marketing platforms.

“the system is installed on a server where are stored documents, such as contracts or reports trade secret, but is available at terminals or computers of members of an organization so that they can upload files and apply encryption and a tracking code can identify if shared illegally, “explained Garcia Hernandez.

the researcher noted that the program operates in a simple way for anyone in the organization can apply to a document, because from any terminal or computer company requests that the security codes to the file is applied and performed automatically, without requiring to make another action.

“users request that security software is applied to the document but do not have access to the encryption code or the tracking; just enter your username and password, automatically the system performs the process and the file is saved on the server, “he added Garcia Hernandez.

To access the documents can be sent as any other mail mail, a person of the organization that serves as system administrator assigns the type of credentials to the document sent; ie specify whether the recipient of the file can view them on screen or have permission to download and print, among other actions.

We did not have any of those authorizations and to corrupt the encryption to print or share illegally the software developed in the Cinvestav has the ability to identify the person who performed the action, thanks to the tracking code.

with the protection offered by the system developed in the Cinvestav is possible to identify only four seconds to the person who shared the document illegally, a period that while it is appropriate in terms of computer security, developers hope to improve in the short term.

according to Garcia Hernandez, research it made for the system was part of a publication in a scientific journal indexed, and the next step is to get your intellectual property protection and then market it

Source:. Agency Conacyt

LikeTweet

No comments:

Post a Comment