120 likes | 319 Views
Data Storage, Backup, and Security. Prepared by: Christopher Eaker, University of Tennessee, Knoxville. Learning Objectives. Understand why data storage, backup, and security of research data are important Understand data storage, backup, and security methods for research data
E N D
Data Storage, Backup,and Security Prepared by: Christopher Eaker, University of Tennessee, Knoxville CC BY-NC
Learning Objectives Understand why data storage, backup, and security of research data are important Understand data storage, backup, and security methods for research data Understand best practices for research data storage, access control, migration to newer storage media, and security for research data Identify an approach to creating a data storage, backup, and security plan Module 4: Data Storage, Backup, and Security
Storage • Personal computers • Networked storage • External storage • Remote/cloud storage • Physical storage Module 4: Data Storage, Backup, and Security
Backup • Store 2 copies • Set up a backup routine • Digital surrogates • Test your system Module 4: Data Storage, Backup, and Security
A Word of Caution ≠ Back up Preservation Module 4: Data Storage, Backup, and Security
Other Considerations • File formatting • Data migration • Responsibility Module 4: Data Storage, Backup, and Security
Security • Access • Systems • Integrity Module 4: Data Storage, Backup, and Security
Protecting Access • Login credentials • Centralized systems • Role-based rights • Limitations of wireless devices Module 4: Data Storage, Backup, and Security
Protecting Computer Systems • Anti-virus software • Up-to-date software • Firewalls • Intrusion detection software • Physical access Module 4: Data Storage, Backup, and Security
Ensuring Data Integrity • Encryption • Electronic signatures • Watermarks Module 4: Data Storage, Backup, and Security
Resources @ UT UT's Office of Information Technology provides you with services to help ensure the safety and security of you research data. The following services can be utilized by all UTK researchers: Vault: share large amount of data and send messages to project collaborators securely. (vault.utk.edu) TrueCrypt: Free on-the-fly software and file encryption. Identify Finder: Prevent identity fraud by ensuring sensitive information is not easily accessible. 2-Factor Authentication Crashplan: cloud-based backup service Contact Bob Hillhouse for more information on the preceding services at bob@utk.edu or 865-974-8445 . Module 4: Data Storage, Backup, and Security
Activity Read through the Data Storage, Backup, and Security checklist and think of how you would accommodate some of the items in your projects. Discuss among yourselves. Module 4: Data Storage, Backup, and Security