1 / 14

Slide Template for Module 4 Data Storage, Backup, and Security

Slide Template for Module 4 Data Storage, Backup, and Security. Learner Objectives. 1 . Understand why data storage, backup, and security of research data are important 2. Understand data storage, backup, and security methods for research data

brilliant
Download Presentation

Slide Template for Module 4 Data Storage, Backup, and Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Slide Template for Module 4Data Storage, Backup, and Security

  2. Learner Objectives 1. Understand why data storage, backup, and security of research data are important 2. Understand data storage, backup, and security methods for research data 3. Understand best practices for research data storage, access control, migration to newer storage media, and security of research data 4. Identify an approach to creating a data storage, backup, and security plan for a project

  3. Storage, Backup, and Security • They are fundamental and interrelated components of a data management strategy. • Together they ensure the ongoing integrity of research data. • Project planning and data management must account for all three.

  4. Storage • The media to which you save your data files and software • Optical, magnetic • All storage media are vulnerable to risk. • Evaluateand refresh regularly.

  5. Storage • Internal, local hard drives • Networked storage • External storage devices • Remote storage services (The Cloud) • Physical storage (Label, label, label! See Module x on Metadata.)

  6. Storage • Remote storage services • Data sharingis notdata storage. • Read terms of service. • Consult your PI or institutional policies on file-sharing services.

  7. Backup • Allows you to restore your data if it is lost. • Hardware or software malfunction • Environmental disaster (fire, flood) • Theft • Unauthorized access Does your operating system and/or network administrator already have existing backup protocols and tools in place?

  8. Security Best Practice: 3 Copies

  9. Backup • Backup Procedure • Full • Differential incremental • Cumulative incremental • Backup Frequency • Daily • Weekly • Monthly • Test your strategy!

  10. Other Considerations • File formats • Data migration • Responsibility assignments

  11. Levels of Security • Safeguard your data from malicious or accidental access to your system. • Access • Systems • Data Integrity Does your network administrator have security services that meet your needs?

  12. Security • Limit the availability of your data. • User ID/passwords • Role-based access rights • Limitations of wireless devices

  13. Security • Protect the hardware and software systems you use. • Anti-virus software • Up-to-date versions of software and storage media • Firewalls • Intrusion detection software • Limit physical access

  14. Security • Protect the integrity of your data at the file level • Encryption • Electronic signatures • Watermarking

More Related