Upload
loraine-hutchinson
View
212
Download
0
Embed Size (px)
Citation preview
Keeping Data Safe
RevisionSummer 2013
How many ways can data be lost?
• Start a list…
• Physical Loss or Corruption of data
• Accidental or Deliberate
• Unauthorised disclosure
Safe Practices
• Backup and Archiving – what’s the difference?
• Keeping Backups & Archives safe–Media– Location
• Protection from accidents• Protection from deliberate damage
Security Methods & Devices
• User ID & Password – identifies the user• Encryption of Data• Restrict Physical Access• Restrict Data Access• Monitoring
Avoiding Malicious Attacks
• Avoid being attacked• Minimise Damage
• From:• Viruses• Worms• Malware in General
Today’s Tasks: Define each of the following in a sentence:
• Hacking• Virus• Firewall• Download• Key Logging• Password• Cyber War• Encryption Keys• SSL Certificate
• Two-factor Authentication • Corrupt Data• Back Up• Removable Media• Malware• Transaction Log• Archive
Find:
• Five types of backup media• Five ways to protect computers from Physical
damage• Five ways to protect computers from unauthorised
access• Five ways to avoid data corruption• Five ways to secure data• Five activities on a computer that need protection• Four levels of access to files
Where is all this going?
• http://www.theregister.co.uk/2013/05/31/motorola_tattoo_pill_authentication/
• http://www.theregister.co.uk/2013/06/05/nato_agrees_to_up_cyber_defence/
• http://www.theregister.co.uk/2013/06/05/nettraveler_cyberespionage/
• http://www.theregister.co.uk/2013/05/30/drupal_sites_hacked/
• http://www.theregister.co.uk/2013/05/23/google_upgrade_ssl_certificates_schedule/
• http://www.theregister.co.uk/2013/05/14/offshore_banking_leak_tax_evasion_probe/