Keeping Data Safe Revision Summer 2013. How many ways can data be lost? Start a list… Physical...
-
Upload
loraine-hutchinson -
Category
Documents
-
view
212 -
download
0
Transcript of Keeping Data Safe Revision Summer 2013. How many ways can data be lost? Start a list… Physical...
![Page 1: Keeping Data Safe Revision Summer 2013. How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.](https://reader035.fdocuments.in/reader035/viewer/2022072010/56649db25503460f94aa22cd/html5/thumbnails/1.jpg)
Keeping Data Safe
RevisionSummer 2013
![Page 2: Keeping Data Safe Revision Summer 2013. How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.](https://reader035.fdocuments.in/reader035/viewer/2022072010/56649db25503460f94aa22cd/html5/thumbnails/2.jpg)
How many ways can data be lost?
• Start a list…
• Physical Loss or Corruption of data
• Accidental or Deliberate
• Unauthorised disclosure
![Page 3: Keeping Data Safe Revision Summer 2013. How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.](https://reader035.fdocuments.in/reader035/viewer/2022072010/56649db25503460f94aa22cd/html5/thumbnails/3.jpg)
Safe Practices
• Backup and Archiving – what’s the difference?
• Keeping Backups & Archives safe–Media– Location
• Protection from accidents• Protection from deliberate damage
![Page 4: Keeping Data Safe Revision Summer 2013. How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.](https://reader035.fdocuments.in/reader035/viewer/2022072010/56649db25503460f94aa22cd/html5/thumbnails/4.jpg)
Security Methods & Devices
• User ID & Password – identifies the user• Encryption of Data• Restrict Physical Access• Restrict Data Access• Monitoring
![Page 5: Keeping Data Safe Revision Summer 2013. How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.](https://reader035.fdocuments.in/reader035/viewer/2022072010/56649db25503460f94aa22cd/html5/thumbnails/5.jpg)
Avoiding Malicious Attacks
• Avoid being attacked• Minimise Damage
• From:• Viruses• Worms• Malware in General
![Page 6: Keeping Data Safe Revision Summer 2013. How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.](https://reader035.fdocuments.in/reader035/viewer/2022072010/56649db25503460f94aa22cd/html5/thumbnails/6.jpg)
Today’s Tasks: Define each of the following in a sentence:
• Hacking• Virus• Firewall• Download• Key Logging• Password• Cyber War• Encryption Keys• SSL Certificate
• Two-factor Authentication • Corrupt Data• Back Up• Removable Media• Malware• Transaction Log• Archive
![Page 7: Keeping Data Safe Revision Summer 2013. How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.](https://reader035.fdocuments.in/reader035/viewer/2022072010/56649db25503460f94aa22cd/html5/thumbnails/7.jpg)
Find:
• Five types of backup media• Five ways to protect computers from Physical
damage• Five ways to protect computers from unauthorised
access• Five ways to avoid data corruption• Five ways to secure data• Five activities on a computer that need protection• Four levels of access to files
![Page 8: Keeping Data Safe Revision Summer 2013. How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.](https://reader035.fdocuments.in/reader035/viewer/2022072010/56649db25503460f94aa22cd/html5/thumbnails/8.jpg)
Where is all this going?
• http://www.theregister.co.uk/2013/05/31/motorola_tattoo_pill_authentication/
• http://www.theregister.co.uk/2013/06/05/nato_agrees_to_up_cyber_defence/
• http://www.theregister.co.uk/2013/06/05/nettraveler_cyberespionage/
• http://www.theregister.co.uk/2013/05/30/drupal_sites_hacked/
• http://www.theregister.co.uk/2013/05/23/google_upgrade_ssl_certificates_schedule/
• http://www.theregister.co.uk/2013/05/14/offshore_banking_leak_tax_evasion_probe/