1 / 8

Keeping Data Safe

Keeping Data Safe. Revision Summer 2013. How many ways can data be lost?. Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised disclosure . Safe Practices. Backup and Archiving – what’s the difference? Keeping Backups & Archives safe Media

todd
Download Presentation

Keeping Data Safe

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Keeping Data Safe Revision Summer 2013

  2. How many ways can data be lost? • Start a list… • Physical Loss or Corruption of data • Accidental or Deliberate • Unauthorised disclosure

  3. Safe Practices • Backup and Archiving – what’s the difference? • Keeping Backups & Archives safe • Media • Location • Protection from accidents • Protection from deliberate damage

  4. Security Methods & Devices • User ID & Password – identifies the user • Encryption of Data • Restrict Physical Access • Restrict Data Access • Monitoring

  5. Avoiding Malicious Attacks • Avoid being attacked • Minimise Damage • From: • Viruses • Worms • Malware in General

  6. Today’s Tasks: Define each of the following in a sentence: • Hacking • Virus • Firewall • Download • Key Logging • Password • Cyber War • Encryption Keys • SSL Certificate • Two-factor Authentication • Corrupt Data • Back Up • Removable Media • Malware • Transaction Log • Archive

  7. Find: • Five types of backup media • Five ways to protect computers from Physical damage • Five ways to protect computers from unauthorised access • Five ways to avoid data corruption • Five ways to secure data • Five activities on a computer that need protection • Four levels of access to files

  8. Where is all this going? • http://www.theregister.co.uk/2013/05/31/motorola_tattoo_pill_authentication/ • http://www.theregister.co.uk/2013/06/05/nato_agrees_to_up_cyber_defence/ • http://www.theregister.co.uk/2013/06/05/nettraveler_cyberespionage/ • http://www.theregister.co.uk/2013/05/30/drupal_sites_hacked/ • http://www.theregister.co.uk/2013/05/23/google_upgrade_ssl_certificates_schedule/ • http://www.theregister.co.uk/2013/05/14/offshore_banking_leak_tax_evasion_probe/

More Related