Adobe LiveCycle Record Security

0
0
1608 days ago, 522 views
PowerPoint PPT Presentation
Keen Documents can likewise catch information from filled structures and move that information to individuals and applications in view of characterized business rules. Adobe LiveCycle Software ...

Presentation Transcript

Slide 1

Adobe LiveCycle Document Security Theresia Devi Indriasari

Slide 2

Content Adobe LiveCycle Software Adobe LiveCycle Document Security Document Security Issue and Technologies Adobe Success Story Conclusion

Slide 3

Adobe LiveCycle Software What is Adobe Intelligent Document Platform? Spans the computerized and paper universes, making records more quick witted, more convenient, and more secure then ever some time recently. The stage utilizes Adobe Document Services to create PDF-based Intelligent Document. Adobe Document Services can be conveyed by Adobe Acrobat programming on the desktop and through Adobe LiveCycle programming.

Slide 4

Adobe LiveCycle Software

Slide 5

Adobe LiveCycle Software What is an Intelligent Document? Is a dynamic report resembles a paper archive and is anything but difficult to utilize. In sort of: frame, report, outline, or some other business archive. Clever Documents can likewise catch information from filled structures and move that information to individuals and applications in light of characterized business rules.

Slide 6

Adobe LiveCycle Software What is widespread customer? Is an interface amongst individuals and electronic reports that is accessible to everybody. Case: Adobe Reader programming and Web programs. What are Adobe Document Services? Are the fundamental advancements that make and coordinate Intelligent Documents with big business applications and business forms.

Slide 7

Adobe LiveCycle Software What is the Adobe LiveCycle? Is the family name of an effective arrangement of server-based programming modules that convey the most recent era of Adobe Document Services. This is finished by incorporating Intelligent Documents with an enterpreise's business procedure.

Slide 8

Adobe LiveCycle Software Which Adobe LiveCycle items are right now accessible? Adobe LiveCycle Designer lets frame originators rapidly make and keep up shape layouts and make a shape smart. Adobe LiveCycle Forms augments business forms past big business limits by sending dynamic electronic structures over the Web all the more safely and naturally catching information to center business frameworks. Adobe LiveCycle Document Security conveys computerized mark and encryption capacities in a server domain.

Slide 9

Adobe LiveCycle Software Which Adobe LiveCycle items are right now accessible? Adobe LiveCycle Reader Extensions initiates capacities covered up inside the free, universal Adobe Reader to spare Adobe PDF, permit the finish of smart structures disconnected, actuate remarking and inspecting instruments in Adobe PDF documents, and utilize advanced marks to sign Adobe PDF frames. Adobe LiveCycle Policy Server makes it conceivable to oversee and screen electronic records by applying tireless secrecy, protection, and responsibility strategies to electronic reports—on the web or disconnected, inside or outside the firewall—all through the archive lifecycle.

Slide 10

Adobe LiveCycle Document Security Overviews Many business procedures are not completely mechanized on account of security concerns. Paper based-frame and physical methods of conveyance are costly and tedious. Computerized handle utilizing secure correspondence convention still put the association at hazard.

Slide 11

Adobe LiveCycle Document Security How it functions Requires a PDF record (produced from Adobe LiveCycle Forms, Adobe Document Server) Then Adobe LiveCycle Document Security apply advanced marks and encryption to the record consequently.

Slide 12

Adobe LifeCycle Document Security Be utilized for Document marking Document beneficiaries can approve the genuineness and honesty of substance marked by the server utilizing advanced authentications from driving sellers. Computerized signature approval Adobe LiveCycle Document Security gets a PDF record from a client who has marked that report and approves the mark status. Encryption and decoding reports Documents that are consequently created can be encoded for dissemination, and scrambled records that have been submitted can be naturally unscrambled, giving extra affirmation that the substance of the archive are not got to by unapproved parties.

Slide 13

Adobe LiveCycle Document Security Key components Bring basic procedures on the web, while ensuring touchy data Meet administrative prerequisites for printed material end Leverage existing IT ventures

Slide 14

Adobe LiveCycle Document Security Certified Document Publishing

Slide 15

Adobe LiveCycle Document Security Secure Information Processing

Slide 16

Document Security Issue and Technologies Introduction Main motivation behind why association need to address the security of electronically shared reports: Regulatory necessities Return on speculation (ROI) Information security

Slide 17

Document Security Issue and Technologies Introduction Regulatory prerequisites Many organizations are straightforwardly or in a roundabout way influenced by government commands and controls for giving purchaser protection. Illustrations: Health Insurance Portability and Accountability Act (HIPAA)— Protection for wellbeing related information European Union Directive on Privacy and Electronic Communications Privacy Acts of Japan and Australia California AB 1950—Protection of client information

Slide 18

Document Security Issue and Technologies Introduction Return on venture (ROI) Significant ROI can be accomplished by moving to electronic business forms Automated work processes permit prospects, clients, accomplices, and providers to take an interest, empowering associations to procure huge cost funds while enhancing consumer loyalty and devotion. Be that as it may, numerous work processes can't be mechanized until sufficient securities are set up on the electronically shared data.

Slide 19

Document Security Issue and Technologies Introduction Information security Thefts of exclusive data are expanding, which can risk income, upper hand, and client connections; produce negative exposure; and result in huge punishments and fines for inability to conform to protection laws.

Slide 20

Document Security Issue and Technologies How to give record security The accompanying criteria characterize steady report security: Confidentiality — Who ought to have admittance to the archive? Approval — What authorizations does the client have for working with the archive? Responsibility — What has the beneficiary finished with the record? Trustworthiness — How would you know whether the report has been modified? Realness — How would you know where the report originated from? Non-revocation — Can the signatory deny marking the report?

Slide 21

Document Security Issue and Technologies How to give report security

Slide 22

Document Security Issue and Technologies How to give record security The two noteworthy security strategies used to set up these six archive security criteria are archive control and advanced marks.

Slide 23

Document Security Issue and Technologies Document Control-Confidentiality Encryption is the way toward changing data (plaintext) into an inconceivable frame (ciphertext) . Encryption is a viable strategy for overseeing archive get to. Decoding is the turn around process that changes ciphertext back to the first plaintext. Cryptography alludes to the two procedures of encryption and decoding and its usage is alluded to as a cryptosystem .

Slide 24

Document Security Issue and Technologies Document Control-Confidentiality Two principle sorts of encryption keys: Symmetric key cryptography utilizes a similar key for both encryption and unscrambling and is quick and hard to break with huge keys. Today, normal symmetric key encryption calculations are AES, DES, 3DES, and RC4. Adobe items influence AES (128-and 256-piece) and RC4 (128-piece) hilter kilter

Slide 25

Document Security Issue and Technologies Document Control-Confidentiality Two primary sorts of encryption keys: lopsided Asymmetric key cryptography, likewise called open key cryptography, utilizes key sets for encryption and decoding. An individual keeps the private key mystery, while people in general key is unreservedly dispersed to other people who wish to speak with the person. Some basic awry calculations are RSA, DSA, and El Gamal. Adobe influences RSA (512-, 1024-, and 2048-piece) as it has advanced into a worldwide standard.

Slide 26

Document Security Issue and Technologies Document Control-Confidentiality Hybrid Encryption One approach is to utilize deviated keys to ensure the symmetric keys, and after that utilization the symmetric keys for encoding the data. This method unravels both the key dissemination test of symmetric key cryptography while tackling the execution issue of topsy-turvy key cryptography.

Slide 27

Document Security Issue and Technologies Document Control Authorization indicates what a client can do with archive. Approval can be accomplished through: Permissions Dynamic archive control Permission Permissions administer a client's activities while working with an ensured record. Authorizations can determine regardless of whether a beneficiary who has admittance to the report is permitted to print or duplicate substance, fill in fields, include remarks or explain the archive, embed or expel pages, forward the record, get to the archive disconnected, carefully sign the record, et cetera.

Slide 28

Document Security Issue and Technologies Document Control-Authorization Dynamic report control Dynamic archive control keeps up get to rights and consents allocated to an electronic record once it has been distributed and circulated. An archive's creator can roll out improvements to a discharged record without having to physically redistribute it since the progressions are consequently pushed to every single existing variant of the report regardless of where they live.

Slide 29

Document Security Issue and Technologies Document Control-Authorization Dynamic record control incorporates the accompanying capabil

SPONSORS