8
Keeping Data Safe Revision Summer 2013

Keeping Data Safe Revision Summer 2013. How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised

Embed Size (px)

Citation preview

Page 1: Keeping Data Safe Revision Summer 2013. How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised

Keeping Data Safe

RevisionSummer 2013

Page 2: Keeping Data Safe Revision Summer 2013. How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised

How many ways can data be lost?

• Start a list…

• Physical Loss or Corruption of data

• Accidental or Deliberate

• Unauthorised disclosure

Page 3: Keeping Data Safe Revision Summer 2013. How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised

Safe Practices

• Backup and Archiving – what’s the difference?

• Keeping Backups & Archives safe–Media– Location

• Protection from accidents• Protection from deliberate damage

Page 4: Keeping Data Safe Revision Summer 2013. How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised

Security Methods & Devices

• User ID & Password – identifies the user• Encryption of Data• Restrict Physical Access• Restrict Data Access• Monitoring

Page 5: Keeping Data Safe Revision Summer 2013. How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised

Avoiding Malicious Attacks

• Avoid being attacked• Minimise Damage

• From:• Viruses• Worms• Malware in General

Page 6: Keeping Data Safe Revision Summer 2013. How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised

Today’s Tasks: Define each of the following in a sentence:

• Hacking• Virus• Firewall• Download• Key Logging• Password• Cyber War• Encryption Keys• SSL Certificate

• Two-factor Authentication • Corrupt Data• Back Up• Removable Media• Malware• Transaction Log• Archive

Page 7: Keeping Data Safe Revision Summer 2013. How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised

Find:

• Five types of backup media• Five ways to protect computers from Physical

damage• Five ways to protect computers from unauthorised

access• Five ways to avoid data corruption• Five ways to secure data• Five activities on a computer that need protection• Four levels of access to files