Document print control is one of the most

Share ideas, strategies, and trends in the crypto database.
Post Reply
rakhirhif8963
Posts: 543
Joined: Mon Dec 23, 2024 3:14 am

Document print control is one of the most

Post by rakhirhif8963 »

At the same time, the use of network printers and MFPs, accessible simultaneously to many departments of organizations, only increases the risks of leaks through the print channel, maintaining the relevance of this threat. It is no coincidence that the current regulatory government acts and industry standards in the field of information security require protecting information in any form, including, of course, printed documents. It is a paper document that is most accessible for quick perception and understanding, easy to copy and ideal for covert movement outside the organization - which means deliberate leakage. In particular, the industry standard of the Bank of Russia RS BR IBBS-2.9-2016 indicates that information leakage is one of the most pressing threats to information security that can be implemented by internal violators of information security; among the most significant potential channels for information leakage, printing and (or) copying information onto paper media are not forgotten.

typical examples of such a misconception about an “outdated, uninteresting threat” combined with a lack of knowledge about the tasks and capabilities of information control. The above-mentioned “fresh” article about print control on the topic of information security had only one paragraph, but at least it was there. The author suggested using iran mobile database DLP systems in combination with smart cards or other means of access control to printing equipment. However, the author calls DLP systems print monitoring tools and for some reason is sure that they are not able to stop unauthorized printing, but at least they can detect it after some time. This, according to the author, is enough for a potential insider to be wary of sending confidential documents to the printer. This is what is called a lack of knowledge on the part of a journalist, which is caused in turn by the imitation of vigorous activity on the part of vendors producing such pseudo DLP systems.

Ensuring information security in organizations with network centralized printing of documents includes a whole range of tasks - ensuring confidentiality of information, integrity, accounting of documents at all stages of the printing process, including sending from personal computers, ensuring secure processing and formation of a print job, ensuring secure delivery of a job to a network printer. The information security market offers a wide range of information security products and technologies, including encryption of documents before sending for printing; storing images of printed documents in the printer memory in encrypted form until the moment of printing; delimitation of access to printers on a personal basis; printing a document only after its initiator has authenticated locally; guaranteed deletion of copies of documents from printers after they have been printed; centralized registration of printing events and storing electronic copies of printed documents in a database for analysis and audit purposes.
Post Reply