data stealth file server proposal - cidisk stealth file server proposal.pdf · data stealth file...

15
DATA STEALTH File Server Proposal Company and Core Technology Description CIDISK CLOAK OF INVISIBILITY DISK

Upload: lynhi

Post on 27-Jul-2019

277 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: DATA STEALTH File Server Proposal - CIDISK STEALTH File Server Proposal.pdf · DATA STEALTH File Server Proposal Company and Core Technology Description CIDISK CLOAK OF INVISIBILITY

DATA STEALTH File Server Proposal

Company and Core Techno logy Descr ip t ion

CIDISKCLOAK OF INVISIBILITY DISK

Page 2: DATA STEALTH File Server Proposal - CIDISK STEALTH File Server Proposal.pdf · DATA STEALTH File Server Proposal Company and Core Technology Description CIDISK CLOAK OF INVISIBILITY

2Strictly Private and Confidential

Contents

I. Background

II. Technology

III. Product

- Ransomware outbreak- Increased damage due to Ransomware's intelligence- Problems with existing file sharing systems

- DST/Data Stealth Technology- Strengths and expectations of DST- Cases of DST Validation and Certification

- Specification- Functionality- System configuration diagram- Key Features- Recommended use

Page 3: DATA STEALTH File Server Proposal - CIDISK STEALTH File Server Proposal.pdf · DATA STEALTH File Server Proposal Company and Core Technology Description CIDISK CLOAK OF INVISIBILITY

3Strictly Private and Confidential

I. Background – Ransomware outbreak.

Increased damage due to Ransomware's intelligence

“Despite outburst of the second-generation Ransomware … Korea lacks cyber shield”

“If Internet only is connected, the system will be infected, the largest global 'Ransomware' attack ever “

“Europol Ransomware 'Warner Cry', an unprecedented level in the history...At least 200 countries have suffered damage in 150 countries“

Now anyone can become a hacker to deploy Ransomware

“It has become an era when Ransomware tools are popular products on the Internet. Hackers can easily purchase a variety of Ransomware tools, just like a cookie.”

“Anti-Virus is DEAD”-Brian Dye, Symantec’s SVP

Page 4: DATA STEALTH File Server Proposal - CIDISK STEALTH File Server Proposal.pdf · DATA STEALTH File Server Proposal Company and Core Technology Description CIDISK CLOAK OF INVISIBILITY

4Strictly Private and Confidential

I. Background – Increased damage due to Ransomware's intelligence.

“Damages at Warner Cry by Ransomware” – May 2017

[Various types of attacks and damage : ITWorld] http://www.itworld.co.kr/news/101250

- Penetrating the all-in-one connected to the network, distribute the Ransomware.- Send a spoofed email to corporate contact to run the attached Ransomware.- In hospitals, after the first infection, secondary spread to medical equipment such as radiation machines paralyzes the business.- Attacked by the same Ransomware again two weeks after data recovery through completion of ransom payment.- Manually attack after acquiring Remote Assistance privilege by impersonating an external IT service representative.- After first attacking weak security devices such as IOT and smart TV, spread Ransomware.- Using the vulnerability of the Server Message Block (SMB) protocol used when sharing files in Microsoft Windows, the infection

spreads to another computer on the same network connected to the infected computer by self-duplication (Warner Cry, Petya), increase the damage.

Page 5: DATA STEALTH File Server Proposal - CIDISK STEALTH File Server Proposal.pdf · DATA STEALTH File Server Proposal Company and Core Technology Description CIDISK CLOAK OF INVISIBILITY

5Strictly Private and Confidential

I. Background – Problems with existing file sharing systems.

1) Complex sharing of file server is required for security:

Because of the complexity, setting to default security are frequently vulnerable..

2) As users use using it as a network drive and this is accessible by all malicious codes.

- If a particular user's computer is infected, all files in the shared folder on the file server are also infected simultaneously through the network drive path

- If the server administrator's privilege is taken over, it's far more dangerous.

- Because new kinds of Ransomware attempts to replicate itself even if you are not connected to a network drive, even for computers which are simply connected to the network, infection is occurring(Wanna Cry, Petra)

3) The same vulnerability exists because some document centralization and backup systems eventually use the network

drive format or the virtual disk drive format.- For backup systems that are recommended as the only alternative for Ransomware, there is no way of taking action for Ransomware

attacks at the time of the backup.

“More convenient and complete Ransomware readiness is required”

Page 6: DATA STEALTH File Server Proposal - CIDISK STEALTH File Server Proposal.pdf · DATA STEALTH File Server Proposal Company and Core Technology Description CIDISK CLOAK OF INVISIBILITY

6Strictly Private and Confidential

II. Technology - DST/Data Stealth Technology

DST = Proactive Solution

What if there were no target of a hack?

Outside the computer

Inside the computer

Even if you enter the computer, it is of no meaningless

CIDISK's data concealment technology (DST) supports full response to any disk forensics as well as data loss.

?

Technology to neutralize the purpose of hacking itself Illegal acquisition and destruction of data

Outside the computer

Inside the computer

Page 7: DATA STEALTH File Server Proposal - CIDISK STEALTH File Server Proposal.pdf · DATA STEALTH File Server Proposal Company and Core Technology Description CIDISK CLOAK OF INVISIBILITY

7Strictly Private and Confidential

II. Technology - Strengths and expectations of DST

2. CIDISK DST works independently of Windows OS.

The working principle of CIDISK DST is independent of OS. Security solutions existing on OS are useless when OS is hacked, but CIDISK DST does not depend on OS and keeps data in CIDISK DST storage space securely.

3. It is 100% safe even if the disc is lost or stolen.

Disks with CIDISK DST will have invisible storage space so that if a PC or its disk is stolen or lost, its contents can not be verified without your permission.

4. Even if you replace the PC, the data in the DST area is safe.

In general, data stored on a disc can be recovered by requesting it from the Recovery Center even if it is deleted or formatted on a disc. However, the data stored in the DST storage space is encrypted in real time and can not be recovered(reverse-analysis).

1. It is safe from general Ransomware, Wanna Cries and Petya Ransomware..

The new Raswareware that exploits the vulnerability of Windows OS is very destructive and existing security solutions cannot cope with. CIDISK DST is a next-generation technology that essentially destroys all malicious programs and prevents malicious programs from infiltrating and doing harm even if they run on your computer.

6. With real-time automatic backup function, use it conveniently …

With the CIDISK DST security zone, you can automatically backup in real time the data of the data in general area to the DST security zone through the bookmark. In addition, as a dedicated explorer in the form of a general explorer is used, you do not have to learn how to use it easily.

5. Storage disk is safe even when open

Generally, for the encryption storage technology, container-based file-based encryption or encrypted storage is used. This encryption method is not secure when opened as a virtual drive. However, in the case of CIDISK DST storage space, it is provided in a form that the drive can not be identified by OS, so even if it is opened, it is safe from malicious code or Ransomware.

Page 8: DATA STEALTH File Server Proposal - CIDISK STEALTH File Server Proposal.pdf · DATA STEALTH File Server Proposal Company and Core Technology Description CIDISK CLOAK OF INVISIBILITY

8Strictly Private and Confidential

II. Technology – Cases of DST Validation and Certification

CIDISK DST has been continuously supplied for three years since its development

1) Various certification materials

Korean Patent(2 cases Claim 100% acquired) US Patent(Claims 90% Acquired) Korea Information

Security Society

adopted the paper

Spain UPC Test Report

Korea Natinal

University

Test Certificate

2) Major Customers

Government

Information Agency

Planned to adopt

before Jan 2018

Saehan Credit Information

Planned to adopt before Jan 2018

Pilot introduction and

under technology

review

Donated license for industry-

university cooperation and

research

TAPS(LA)

Page 9: DATA STEALTH File Server Proposal - CIDISK STEALTH File Server Proposal.pdf · DATA STEALTH File Server Proposal Company and Core Technology Description CIDISK CLOAK OF INVISIBILITY

9Strictly Private and Confidential

III. Product – Specification

DST File Server provides a secure and convenient file sharing environment within the enterprise

1) DST File Server

Classification Specification

OS [Microsoft] Windows 10 Pro K(Genuine)

CPU [intel] i5-7600K

Memory [SAMSUNG] DDR4 4G PC4-17000 Single face

SSD [Barium Electronics] OJ500i (128GB) [MLC]

HDD[Seagate] 1TB Barracuda ST2000DM006 (SATA3/7200/64M)

(Scalable on demand)

Power Aproman (Middle power)760PW

Size 360 x 175 x 408mm (DxWxH)

Color Silver

Database MariaDB 10.2.7 – Freeware

Application Server CIDISK™ STEALTH File Server2) DST Explorer

(Provide a dedicated explorer installation file)

Classification Specification

OS Microsoft Windows 7 or later (Supports both 32-bit and 64-bit)

Memory 1GB or more, 2GB or more recommended

HDDAt least 100 MB free space(Separate space required if local STEALTH area configuration is required)

Network TCP / IP-based network environment

LicenseCAL for STEALTH File ServerLocal STEALTH License (Only for locally configuring the STEALTH area)

※ Only the solution can be supplied without hardware (separated inquiry required)

Page 10: DATA STEALTH File Server Proposal - CIDISK STEALTH File Server Proposal.pdf · DATA STEALTH File Server Proposal Company and Core Technology Description CIDISK CLOAK OF INVISIBILITY

10Strictly Private and Confidential

III. Product – Specification

System Function classification Function details

User( DST Explorer )

STEALTH Server connection

Login to STEALTH File Server

Connect to shared STEALTH area

Disconnect from shared STEALTH area

Environment setupChange Password

Automatic locking

Favorites Add favorite / edit / delete / set backup function

Local STEALTH functionLocal STEALTH partition creation (requires separate license), delete

Digital key backup, setting whether STEALTH list display, STEALTH area format

Log management View and export user file operation history log

Multiple STEALTH connection support Local STEALTH device and shared STEALTH can be used simultaneously up to 128

Administrator( DST Explorer )

STELATH Server connection STEALTH File Server Admin login

Disk managementDisk Management on the STEALTH Server

Create / delete STEALTH partition

STEALTH management

Create / Delete STEALTH area

STEALTH Name management / Change password

STEALTH area connection / disconnection / automatic connection

STEALTH area format

User management

Add / Edit / Delete User

User Classification User / Administrator

Permission Normal / Pause / Suspension

Share management

Add / Edit / Delete Shares

Sharing Permission Normal / Pause / Suspension

Setting Shared User Rights (Create / Read / Write / Delete / Rename)

Access control management policyAccess to server IP control IP range designation

Allow / Block / Disable Access

System setupAccess port designation / Maximum allowable number / Waiting time / Login lock failure count

Access control log

Access control log search

Keyword search / processing date / client address / period search

Export search results to Excel

Operation log

Search operation log

Keyword search / processing date / client address / period search

Log Classification - Search Full / Normal Operation / File Operation

Operational Classification - Detailed search by log classification

Page 11: DATA STEALTH File Server Proposal - CIDISK STEALTH File Server Proposal.pdf · DATA STEALTH File Server Proposal Company and Core Technology Description CIDISK CLOAK OF INVISIBILITY

11Strictly Private and Confidential

- III. Product – System configuration diagram

Configure DST File

Server and DAS to

allow the creation of

additional STEALTH

regions

DST File Server

DST ExplorerAdmin UI

Notebook computer DST Explorer Installed

External hard disk

USB

Dedicated storage server

(optional))DST File Server

Computers within the company

STEALTH File Server administration

External use setup

100% secure file sharing system is completed from Ransomware by allowing user to freely create STEALTH area to share with organization members in storage of DST file server, and to perform sharing and privilege management!

DST File Server It is possible to connect to the inside of the company as well as the external internet environment if necessary.

Internal network hubor switch

Internet router

Page 12: DATA STEALTH File Server Proposal - CIDISK STEALTH File Server Proposal.pdf · DATA STEALTH File Server Proposal Company and Core Technology Description CIDISK CLOAK OF INVISIBILITY

12Strictly Private and Confidential

- III. Product – Key Features

※ All the path of data movement are STEALTHRIZED

Any data in all of the sectors that use DST File Server will be STEALTHrized

No information is exposed on the disk of the server you are using, and the disk of the server is not exposed to the explorer.(No access to data even if server privilege is hijacked.)

There is a STEALTH area in the disk of the real server configured by use.

User access management and share management of STEALTH area by DST File Server

User can freely log into the DST File Server using the DST Explorer.

All packets to and from the server are encrypted(Setting system options)

Users can connect STEALTH area of desired local / server using DST Explorer and work freely. (The connected shared file / folder is not exposed to the existing explorer)

[Working with existing explorers in various ways]• Drag and drop• Clipboard cut and paste• DST Explorer Favorites

Automatic backup using setup• Edit the STEALTH article

directly

Page 13: DATA STEALTH File Server Proposal - CIDISK STEALTH File Server Proposal.pdf · DATA STEALTH File Server Proposal Company and Core Technology Description CIDISK CLOAK OF INVISIBILITY

13Strictly Private and Confidential

III. Product – Key Features(Continued)

※ Easy to understand and follow the manual even for beginners "Simple and clear management function”

No advanced IT knowledge is required to configure and operate the DST File Server.

Connection management (common to administrator

/ general user)

Disk Management (Administrator only) STEALTH Administration (administrators only)

User Management (Administrator only)

Share Management (Administrator only)Access control policy management

(administrators only)

System Settings (Administrator only)

Operation log management (common to administrator / general user)

“When you create a STEALTH zone, register

users, set up sharing and assign permissions,

you are ready to use!!”

Log Settings(Administrator only)

Access control log management(Administrator only)

Page 14: DATA STEALTH File Server Proposal - CIDISK STEALTH File Server Proposal.pdf · DATA STEALTH File Server Proposal Company and Core Technology Description CIDISK CLOAK OF INVISIBILITY

14Strictly Private and Confidential

- III. Product – Recommended use

The following places are recommended to use the DST File Server.

Small Business where initial investment to IT infrastructure is difficult

Small or personal Hospital / Clinic

Local or overseas office / technology institute of enterprise

or institution

Department / TFT unit organization within businesses and other

organizations

Educational institutionssuch as elementary /

middle / high / university

Stores such as mobile communication

dealers sensitive to customer's personal

information

“Talk to CIDISK now!”

Page 15: DATA STEALTH File Server Proposal - CIDISK STEALTH File Server Proposal.pdf · DATA STEALTH File Server Proposal Company and Core Technology Description CIDISK CLOAK OF INVISIBILITY

15Strictly Private and Confidential

100% Secure yourself

CIDISK KOREA INC. | www.CIDISK.com

T : 02)2283-1646 | F:0505-955-2646 | E : [email protected]