1 / 11

Protecting Data In Transit

Protecting Data In Transit. By : Tia Hayati (118090024) Husain Athfal H (118090026) Rahmat Hidayat (118090027) Dhimas Wahyu Ardito (118091015) Kelas IK-33-01 Tugas Pengantar Ilmu Komputasi. Protecting Data In Transit.

cedric
Download Presentation

Protecting Data In Transit

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Protecting Data In Transit By : • Tia Hayati (118090024) • Husain Athfal H (118090026) • RahmatHidayat (118090027) • DhimasWahyuArdito (118091015) Kelas IK-33-01 TugasPengantarIlmuKomputasi

  2. Protecting Data In Transit In December 2007, the office of David Nicholson CBE, the Chief Executive of the NHS in England, wrote to all Chief Executives of all Strategic Health Authorities, Special Health Authorities, NHS Trusts and Primary Care Trusts, restating the key responsibilities and accountabilities for securing effective information governance and to clarify required actions. Within the content of the letter (Gateway reference number 9185) are specific requirements for securing data in transit. There are a variety of methods available for securing your data while you are moving around with your computer. These range from the simple, such as password protecting your machine, to more complicated method, such as full disk encryption. You also need to be concerned about protecting sensitive or confidential information when you are sending it from one computer to another (e.g., via e-mail or to a server). The methods below describe options available for securing data sent from one machine to another.

  3. Virtual Private Network (authentication required) To encrypt all data as it travels between your computer and the Dartmouth Machine Room.

  4. Using Secure Connections To gain access to servers that require a secure connection for terminal emulation (telnet) sessions.

  5. Safe File Sharing To allow access to and transfer of files between desktop computers.

  6. Consider Storing Important Data Separately There are many forms of storage media, including floppy disks, zip disks, CDs, DVDs, and removable flash drives (also known as USB drives or thumb drives). By saving your data on removable media and keeping it in a different location (e.g., in your suitcase instead of your laptop bag), you can protect your data even if your laptop is stolen. You should make sure to secure the location where you keep your data to prevent easy access.

  7. Encrypt Files By encrypting files, you ensure that unauthorized people can't view data even if they can physically access it. You may also want to consider options for full disk encryption, which prevents a thief from even starting your laptop without a passphrase. When you use encryption, it is important to remember your passwords and passphrases; if you forget or lose them, you may lose your data.

  8. Install and Maintain Anti-Virus Software Protect laptops and PDAs from viruses the same way you protect your desktop computer. Make sure to keep your virus definitions up to date (see Understanding Anti-Virus Software for more information).

  9. Install and Maintain a Firewall While always important for restricting traffic coming into and leaving your computer, firewalls are especially important if you are traveling and utilizing different networks. Firewalls can help prevent outsiders from gaining unwanted access (see Understanding Firewalls for more information).

  10. Back up Your Data Make sure to back up any data you have on your computer onto a CD-ROM, DVD-ROM, or network (see Good Security Habits and Real-World Warnings Keep You Safe Online for more information). Not only will this ensure that you will still have access to the information if your device is stolen, but it could help you identify exactly which information a thief may be able to access. You may be able to take measures to reduce the amount of damage that exposure could cause.

  11. Use Passwords Correctly In the process of getting to the information on your portable device, you probably encounter multiple prompts for passwords. Take advantage of this security. Don't choose options that allow your computer to remember passwords, don't choose passwords that thieves could easily guess, use different passwords for different programs, and take advantage of additional authentication methods (see Choosing and Protecting Passwords and Supplementing Passwordsfor more information).

More Related