17
Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri 120050144 5 Steps To Secure Your Data

Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri 120050144 5 Steps To Secure Your Data

Embed Size (px)

Citation preview

Page 1: Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri 120050144 5 Steps To Secure Your Data

Information Security Principles

Supervised ByMs. Eman El Ajramy

Presented by

Moamer.T.Sawafiri

120050144

5 Steps To Secure Your Data

Page 2: Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri 120050144 5 Steps To Secure Your Data

Overview

Identify your data Organize your data Secure your data Backup Recover

Page 3: Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri 120050144 5 Steps To Secure Your Data

Identify your data

The first step toward data security is to identify what your data is and where it is. What?

Word Excel Email, etc…

Where? Local Storage: Hard Drive Network Storage: Network Drive Removable Storage: Flash Drive, CD, Floppy

Page 4: Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri 120050144 5 Steps To Secure Your Data

Organize your data

Determine what data needs to be protected. Considerations

FERPA – Family Educational Rights and Privacy Act Customer Confidentiality Agreements State Computing Policies

Page 5: Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri 120050144 5 Steps To Secure Your Data

Group your data. Classify

C1-Sensitive (FERPA) C2-Departmental (No personal data but sensitive to

department or university) C3-Non-sensitive (Memo’s, Office hour, Public

Information) All data should be considered sensitive until it has been

verified to be non-sensitive. Everyone in the group should use the same system of

classification to limit confusion. Make it the office standard.

Page 6: Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri 120050144 5 Steps To Secure Your Data

Create a standard on where sensitive data should be stored. Make it a habit to automatically save/move sensitive data to the

appropriate location. Audit your stored data to ensure the proper handling.

Page 7: Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri 120050144 5 Steps To Secure Your Data

Secure your data

Now that your sensitive data has been organized you need to protect it.

Encrypt and Decrypt (EFS)

Page 8: Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri 120050144 5 Steps To Secure Your Data

Encryption

Does not need to be used on all data. Are you planning on sharing the data? Does it contain any sensitive information?

What does encryption do to my data?

Page 9: Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri 120050144 5 Steps To Secure Your Data

Windows Encryption (EFS)

EFS: Encrypting File System Short for Encrypting File System, part of the Microsoft New

Technology File System (NTFS) file system. EFS is a transparent public key encryption technology that works in conjunction with NTFS permissions to grant and deny users access to files and folders in Windows NT (excluding NT4), 2000 and XP (excluding XP Home Edition) operating systems.

NOTE: You can encrypt files and folders only on volumes that use the NTFS file system.

Page 10: Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri 120050144 5 Steps To Secure Your Data

EFS: Encrypting File System (cont’d) EFS uses a public key and a private key for encryption. If the

user does not have one, the EFS generates the key pair automatically. Files can be encrypted individually, or a folder can be designated as encrypted, so that any file written to that folder is automatically encrypted. Because EFS encryption technology integrates into the file system, users can't access the hard disk without going through the file system.

Page 11: Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri 120050144 5 Steps To Secure Your Data

Encrypting a folder in Windows XP Click Start, point to All Programs, point to Accessories, and then

click Windows Explorer. Locate and right-click the folder that you want, and then click

Properties. On the General tab, click Advanced. Under Compress or Encrypt attributes, select the Encrypt contents

to secure data check box, and then click OK. Click OK. In the Confirm Attribute Changes dialog box that appears, use one

of the following steps: If you want to encrypt only the folder, click Apply changes to

this folder only, and then click OK. If you want to encrypt the existing folder contents along with

the folder, click Apply changes to this folder, subfolders and files, and then click OK.

Page 12: Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri 120050144 5 Steps To Secure Your Data

Backup

No matter what you do to protect your data, without a backup all your hard work could be for naught.

It isn't data if you can’t access it. Back up your security certificate

Make sure you can access your data.

Page 13: Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri 120050144 5 Steps To Secure Your Data

Backup – Windows XP

Creating a folder backup using the Windows Backup utility.

Easy to follow instructions: http://www.microsoft.com/windowsxp/using/setup/learnmore/bott_03july14.mspx

Page 14: Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri 120050144 5 Steps To Secure Your Data

Backup – Outlook 2003

Outlook 2003 data can easily backed up using an MS utility. Easy to follow instructions:

http://www.microsoft.com/downloads/details.aspx?FamilyID=8b081f3a-b7d0-4b16-b8af-5a6322f4fd01&DisplayLang=en

Page 15: Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri 120050144 5 Steps To Secure Your Data

Disaster Recovery

Disaster recovery is the ability to continue work after any number of catastrophic problems, ranging from a computer virus or hacker attack to a natural disaster such as flood, fire, or earthquake. Having a disaster recovery plan in place takes a little time and effort, but the peace of mind it brings and the ability to continue work after the unthinkable are well worth it.

Computer Disaster Recovery Planning Checklist for Small Systems: First part of database disaster recovery is easy - backup database systems on a

regular basis. You should maintain a minimum of 3 consecutive copies before overwriting. Consider doing a backup each day of the week and put Friday's backup off site.  How: 1) Take a copy home 2) Send to a website located in another city/state 3) Regular courier to another corporate office 4) Establish an off site backup service with courier pickup (for more critical databases).

Page 16: Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri 120050144 5 Steps To Secure Your Data

Recovery Practice

Practice Make sure that you have gone though recovering data.

Set up a practice schedule.

New employees should get to practice as part of their welcome.

Page 17: Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri 120050144 5 Steps To Secure Your Data

The EndThe End