WHITE PAPER ON PROTECTING CONFIDENTIAL INFORMATION PUBLISHED
Nexor and FOX-IT have today published a new White Paper “Protecting confidential information using a Data Diode” in response to customer queries in the sector.
“We are regularly asked by our customers whether a data diode gives a protocol break; and what the relationship between the two is. There are also differing views in the sector of what a protocol break actually is. So to try and piece this all together we collaborated with our colleagues at FOX-IT to clarify the role of the data diode and show that it offers more than just one-way communication.”
When protecting an isolated network against outsider attacks, there are a number of objectives and technologies that are commonly used. Objectives typically boil down to C.I.A. – Confidentiality, Integrity and Availability.
An extremely good technology for confidentiality is the unidirectional network connection by means of a data diode. However, there is a lot of technology relating to data diodes that impacts integrity and availability. In particular, protocol breaks and content checking have a subtle relation to these objectives.
This briefing paper will explain how these technologies relate to one another and to the principal C.I.A. security objectives.
This newest addition to the Nexor resources library can now be downloaded from the White Papers section of our website.
RECENT BLOG POSTS
Nexor are pleased to announce that our Guardian solution has been enhanced with a number of key features in a new release 3.1 of the guard application which is now available: Increased Reliability: Deploy as an active -passive High-Availability ("HA") application...
One year on from our introductory blog on Zero Trust Architecture, what has changed and what friction points have started to appear for organisations after implementation? Crucially, where does Zero Trust fit within the to-do list, or the essential security risk...
What does Cyber Essentials cover? Cyber Essentials is a UK Government backed scheme that helps protect your business against a range of the most common cyber-attacks. Cyber-attacks can come in many forms and may be carried out against businesses of any size of...
Be the first to know about developments in secure information exchange