90 likes | 274 Views
Keeping Data Safe. Revision Summer 2013. How many ways can data be lost?. Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised disclosure . Safe Practices. Backup and Archiving – what’s the difference? Keeping Backups & Archives safe Media
E N D
Keeping Data Safe Revision Summer 2013
How many ways can data be lost? • Start a list… • Physical Loss or Corruption of data • Accidental or Deliberate • Unauthorised disclosure
Safe Practices • Backup and Archiving – what’s the difference? • Keeping Backups & Archives safe • Media • Location • Protection from accidents • Protection from deliberate damage
Security Methods & Devices • User ID & Password – identifies the user • Encryption of Data • Restrict Physical Access • Restrict Data Access • Monitoring
Avoiding Malicious Attacks • Avoid being attacked • Minimise Damage • From: • Viruses • Worms • Malware in General
Today’s Tasks: Define each of the following in a sentence: • Hacking • Virus • Firewall • Download • Key Logging • Password • Cyber War • Encryption Keys • SSL Certificate • Two-factor Authentication • Corrupt Data • Back Up • Removable Media • Malware • Transaction Log • Archive
Find: • Five types of backup media • Five ways to protect computers from Physical damage • Five ways to protect computers from unauthorised access • Five ways to avoid data corruption • Five ways to secure data • Five activities on a computer that need protection • Four levels of access to files
Where is all this going? • http://www.theregister.co.uk/2013/05/31/motorola_tattoo_pill_authentication/ • http://www.theregister.co.uk/2013/06/05/nato_agrees_to_up_cyber_defence/ • http://www.theregister.co.uk/2013/06/05/nettraveler_cyberespionage/ • http://www.theregister.co.uk/2013/05/30/drupal_sites_hacked/ • http://www.theregister.co.uk/2013/05/23/google_upgrade_ssl_certificates_schedule/ • http://www.theregister.co.uk/2013/05/14/offshore_banking_leak_tax_evasion_probe/