310 likes | 348 Views
Data Security. Unit F. Objectives. Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict Access Use Antivirus Software. Objectives. Introduce Data Backup Examine Backup Procedures Explore Backup Hardware and Media
E N D
Data Security Unit F
Objectives • Know What Can Go Wrong • Explore Data Security Issues • Introduce Computer Viruses • Understand How viruses Spread • Restrict Access • Use Antivirus Software
Objectives • Introduce Data Backup • Examine Backup Procedures • Explore Backup Hardware and Media • Explore Backup Strategies • Explore Backup Software
What Can Go Wrong • Operator errors • Direct source input device (scanners) • Software errors • Power Failures • Power spike • Power surge • UPS (Uninterruptible Power Supply) • Surge strip vs. power strip • Unplug during storm
Data Security Issues • Hardware failure: data loss possible • MTBF: mean time between failures is a reliability measurement • Physical damage from smoke, fire, water, breakage, theft • Data vandalism like viruses and hackers
How You Can Protect Yourself • Data security are the techniques that provide protection for your data • Risk management is the process of weighing threats to computer data vs. the amount of expendable data and the cost of protecting crucial data • Disaster Recover Centers provide emergency computing facilities
Computer Virus A set of program instructions that attaches itself to a file, reproduces itself and spreads to other files.
Computer Virus – It’s a CRIME!! • Trigger event (payload) often keyed to specific date • Can be classified by types of files they infect: • File virus (games) • Boot sector virus (system files) • Macro virus (applications)
Trojan Horse • A computer program that seems to perform one function while actually doing something else. • Good at stealing passwords
Worms • Designed to spread from computer to computer • Travels within e-mail and TCP/IP packets • Love Bug • Some flood network with useless traffic causing Denial of Service attacks
How Viruses Spread • Shared files • E-mail attachments • Usually have .exe extensions • Cannot infect you if you don’t open them • Two extension filenames highly suspect • E-mail messages • HTML format can spread them • Web site downloads • Macro viruses in attachments or files on disk
Virus Symptoms • Vulgar/annoying messages displayed on computer • Unusual visual or sound effects • Difficulty saving files or files disappear • Computer very slow • Computer reboots unexpectedly • Executable files increase in size unaccountably • Computer sends out emails on its own
Restricting User Access • Physically • Restrict access to computer area • Keep backup disks in locked vault • Keep offices locked • Keep computer case locked • Restrict data access to authorized users • Passwords • User rights
Restricting User Access • Personal identification • Something a person carries (badge) • Something a person knows (IDs and passwords) • Some unique physical trait (biometrics) Fingerprint Scanner Retinal Scanner
Antivirus Software A set of utility programs that looks for and eradicates a wide spectrum of problems, such as viruses, Trojan horses and worms.
Antivirus Protection Methods • File length • Checksum • Virus signature
Viruses Escape By: • Multi-partite viruses infect multiple target types • Polymorphic viruses mutate by changing signature • Stealth viruses remove their signatures • Retro viruses attack antivirus software
Other Virus Issues • Keep antivirus software running full-time in background • Easier to keep virus out than to eradicate it • Keep your software updated with new versions • Not 100% reliable
Virus Hoaxes • E-mail containing dire warnings • Strategy to avoid the virus • Recommends e-mailing friends • Usually have long list of people in To: and CC: boxes • Recommends dangerous procedure for eradicating virus
Data Backup • Backup: copy one or more files in case the original files become damaged • Restore: copy the backup files back onto a hard disk • Full vs. partial backups • Software files vs. data files • Keep all data files in My Documents
Important Files to Backup • Internet connection data • E-mail folders • E-mail address book • Favorite URLs • Downloads • Windows Registry
Backup Procedures Full backup:all files Incremental backup:only files added/changed since any backup Differential backup:only files added/changed since last full backup
Backup Hardware and Media • Tape Drives: best for PCs • Inexpensive • Can hold entire hard drive • 1 GB in 15-20 minutes • Floppy disks, Zip disks • Writable CDs and DVDs: slower than tape • Second hard disk drive: least reliable • Remote storage on network for a fee
Backup Strategies • Run up-to-date antivirus software before backing up • Create a boot disk • Recovery CD from computer manufacturer • Windows Startup Disk • Rescue disk created from antivirus software
1 2 3 Backup Strategies • Decide on storage medium • Make rotating sets of backups • Test backups • Store backups in safe place
Backup Software • Copy Disk utility via operating system • Backup software from • Windows, Accessories, System Tools • Supplied with backup devices • Keep original backup software CD
TechTalk: Securing a LAN • Password protection • Personal firewall software that analyzes and controls incoming/outgoing packets • Network address translation (NAT): using private IP addresses within LAN
TechTalk: Securing a LAN • DOCSIS (Data Over Cable Service Interface Specification) filters packets to certain ports • Disable file and print sharing • Shut down the computer when not in use
Data Security End