Security Management Guide (G06.24+, H06.03+)
Concerns for the User
Security Management Guide—522283-008
5-16
Encryption
Encryption
You can also encrypt the contents of your files. Encryption ensures that the information
is accessible only to those who know the complete method by which the information
was encrypted. Encryption usually consists of:
•
An encryption algorithm (which is usually known)
•
A key (which is private)
HP does not provide a standard encryption package although such a package can be
built with the Atalla A-5000 High Performance Security Module (HPSM). For
information on the Atalla A-5000 HPSM, see the Atalla High Performance Security
Module (HPSM) User’s Guide.
You can also create software-only solutions using published algorithms.
Electronic Mail
Electronic mail systems include features to protect the privacy of information circulated
in the system. For example, when you use HP PS MAIL, you must present a password
to get access to your mail. However, you should take extra precautions in dealing with
sensitive mail.
Points of Vulnerability
Electronic mail has these points of vulnerability:
•
Your mail message is probably stored unencrypted in a disk file database. An
unscrupulous privileged user or intruder who knows the mail application owner’s
password can read your message. If your mail message contains sensitive
information (a password, for example), the intruder can gain the information
needed for a break-in.
•
The recipient of your message might save it in a disk file. Even if the disk files in
the mail transport system are secure, your recipient might create a new file to hold
your message. For example, if the recipient has a default security setting of CUCU
and does not resecure the file containing the saved mail, your message is readable
by all local and remote members of the recipient’s user group.
•
The recipient of your message might accidentally attach your message to another
message and send the message to a new recipient, or worse, to an entire
distribution list.
•
The recipient of your message might print a hard copy of it, which might be seen
by others in the printer room.
•
The recipient of your message might not exit from the mail application, which
leaves everything in the recipient’s mailbox vulnerable to intruders when the
terminal is unattended.