Questions tagged [documents]
The documents tag has no summary.
47 questions
1 vote
2 answers
126 views
Security risk from installing a third-party Add-in in MS Word
Background: Our procurement team is considering using Pincites to review contracts made with vendors. For Pincites to review the Word document where the contract is written, it needs the procurement ...
8 votes
1 answer
2k views
What sort of security does Docusign provide?
In the last days I have seen two apparent "breaches" of Docusign's security. Neither are good evidence, but they illustrate the point: Wall Street Millennial's youtube review of Joonko's ...
1 vote
1 answer
73 views
PCI Compliance for Contract Management Software with User-Entered Card Data
I'm evaluating a contract management software that claims PCI compliance for my CC data. However, I am going to use the software to issue contracts to my customers where they directly enter credit ...
0 votes
1 answer
131 views
Is Digital Signature really necessary for an open system considered by FDA's 21 CFR Part 11?
21 CFR Part 11's Subpart B for Electronic Records has a section on 'Controls for Open Systems" stating that: Persons who use open systems to create, modify, maintain, or transmit electronic ...
2 votes
1 answer
163 views
How to feasibly digital sign high volume documents with CA issued digital certificate?
My organisation, say Acme, is building an e-signature platform where global businesses sign up and use the platform to send out e-signature requests. And when signers in a particular e-sign request ...
1 vote
3 answers
3k views
Sharing internal security policies with potential customers?
We have a set of ISMS documents like master security policy, supplier relations etc. classified as INTERNAL according to data classification policy. Now a potential customers infosec department is ...
4 votes
1 answer
200 views
Need help collating resources for an information/cyber security audit document for an MSP
I am currently serving out an internship with a small MSP (4 employees, 50-100 clients with between a couple and 100 employees). My main project is to work on a information/cyber security audit ...
0 votes
1 answer
168 views
Can a structured (text) document be effectively encrypted
My situation: I want to encrypt an HTML document. My question is, if the following is known, is that going to weaken encryption? It is a text-based document It starts with <DOCTYPE HTML> or a ...
35 votes
2 answers
13k views
Should I present forged documents in a Penetration Test/Red team engagement?
A previous question of mine lead to this discussion which mentioned the subject of Document forgery. I've seen many people (in videos) forge IDs and employee badges for such engagements so that seems ...
1 vote
2 answers
412 views
Can a document be digitally signed multiple times, successively by different users?
The question is, if a document that is collaboratively edited, one user per time, could be digitally signed by every editor before it is passed to the next editor. And if yes, could the final receiver ...
1 vote
2 answers
197 views
How to sign a text in a way, so it can not be altered or split in parts unacknowledged
Given, I want to create a document (text-only for the sake of this question) and give it to someone I do not trust. I am not allowed to publish it myself. It's probably not going to be published (...
1 vote
1 answer
458 views
Is it possible to verify that a signature was made prior to the content of the document it is found on?
In What to do after I signed a blank sheet of paper given to me by my manager?, a distressed individual (B) has signed a blank piece of paper and given it to an adversary (A). A has openly stated to ...
3 votes
1 answer
196 views
Hundreds of old MS Office files increased by about 10kb
We have most of our documents backed up and syncing in MS Sharepoint. That has worked very well for us. However, I just noticed an old folder I created on the C: drive at the time of setting all this ...
1 vote
1 answer
115 views
How to determine and compare risk in methods for document exchange
Lets say you are talking to a representative of a bank or government institution on the phone, and the representative requests that you send some documents, e.g. document A, B, and C. You ask if you ...
1 vote
1 answer
178 views
How is it secure to open documents with embedded/linked fonts and images
There were some kernel exploits and CVEs (for example ms11-087 and CVE-2017-8682) about fonts. And there were some malware campaigns like duqu which used zerodays in fonts embedded into docx files. I ...