1 / 30

Data Security

Data Security. Unit F. Objectives. Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict Access Use Antivirus Software. Objectives. Introduce Data Backup Examine Backup Procedures Explore Backup Hardware and Media

promero
Download Presentation

Data Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Data Security Unit F

  2. Objectives • Know What Can Go Wrong • Explore Data Security Issues • Introduce Computer Viruses • Understand How viruses Spread • Restrict Access • Use Antivirus Software

  3. Objectives • Introduce Data Backup • Examine Backup Procedures • Explore Backup Hardware and Media • Explore Backup Strategies • Explore Backup Software

  4. What Can Go Wrong • Operator errors • Direct source input device (scanners) • Software errors • Power Failures • Power spike • Power surge • UPS (Uninterruptible Power Supply) • Surge strip vs. power strip • Unplug during storm

  5. Data Security Issues • Hardware failure: data loss possible • MTBF: mean time between failures is a reliability measurement • Physical damage from smoke, fire, water, breakage, theft • Data vandalism like viruses and hackers

  6. How You Can Protect Yourself • Data security are the techniques that provide protection for your data • Risk management is the process of weighing threats to computer data vs. the amount of expendable data and the cost of protecting crucial data • Disaster Recover Centers provide emergency computing facilities

  7. Computer Virus A set of program instructions that attaches itself to a file, reproduces itself and spreads to other files.

  8. Computer Virus – It’s a CRIME!! • Trigger event (payload) often keyed to specific date • Can be classified by types of files they infect: • File virus (games) • Boot sector virus (system files) • Macro virus (applications)

  9. Trojan Horse • A computer program that seems to perform one function while actually doing something else. • Good at stealing passwords

  10. Worms • Designed to spread from computer to computer • Travels within e-mail and TCP/IP packets • Love Bug • Some flood network with useless traffic causing Denial of Service attacks

  11. How Viruses Spread • Shared files • E-mail attachments • Usually have .exe extensions • Cannot infect you if you don’t open them • Two extension filenames highly suspect • E-mail messages • HTML format can spread them • Web site downloads • Macro viruses in attachments or files on disk

  12. Virus Symptoms • Vulgar/annoying messages displayed on computer • Unusual visual or sound effects • Difficulty saving files or files disappear • Computer very slow • Computer reboots unexpectedly • Executable files increase in size unaccountably • Computer sends out emails on its own

  13. Restricting User Access • Physically • Restrict access to computer area • Keep backup disks in locked vault • Keep offices locked • Keep computer case locked • Restrict data access to authorized users • Passwords • User rights

  14. Restricting User Access • Personal identification • Something a person carries (badge) • Something a person knows (IDs and passwords) • Some unique physical trait (biometrics) Fingerprint Scanner Retinal Scanner

  15. Antivirus Software A set of utility programs that looks for and eradicates a wide spectrum of problems, such as viruses, Trojan horses and worms.

  16. Antivirus Protection Methods • File length • Checksum • Virus signature

  17. Viruses Escape By: • Multi-partite viruses infect multiple target types • Polymorphic viruses mutate by changing signature • Stealth viruses remove their signatures • Retro viruses attack antivirus software

  18. Other Virus Issues • Keep antivirus software running full-time in background • Easier to keep virus out than to eradicate it • Keep your software updated with new versions • Not 100% reliable

  19. Virus Hoaxes • E-mail containing dire warnings • Strategy to avoid the virus • Recommends e-mailing friends • Usually have long list of people in To: and CC: boxes • Recommends dangerous procedure for eradicating virus

  20. Data Backup • Backup: copy one or more files in case the original files become damaged • Restore: copy the backup files back onto a hard disk • Full vs. partial backups • Software files vs. data files • Keep all data files in My Documents

  21. Important Files to Backup • Internet connection data • E-mail folders • E-mail address book • Favorite URLs • Downloads • Windows Registry

  22. Backup Procedures Full backup:all files Incremental backup:only files added/changed since any backup Differential backup:only files added/changed since last full backup

  23. Backup Hardware and Media • Tape Drives: best for PCs • Inexpensive • Can hold entire hard drive • 1 GB in 15-20 minutes • Floppy disks, Zip disks • Writable CDs and DVDs: slower than tape • Second hard disk drive: least reliable • Remote storage on network for a fee

  24. Backup Strategies • Run up-to-date antivirus software before backing up • Create a boot disk • Recovery CD from computer manufacturer • Windows Startup Disk • Rescue disk created from antivirus software

  25. 1 2 3 Backup Strategies • Decide on storage medium • Make rotating sets of backups • Test backups • Store backups in safe place

  26. Backup Software • Copy Disk utility via operating system • Backup software from • Windows, Accessories, System Tools • Supplied with backup devices • Keep original backup software CD

  27. TechTalk: Securing a LAN • Password protection • Personal firewall software that analyzes and controls incoming/outgoing packets • Network address translation (NAT): using private IP addresses within LAN

  28. TechTalk: Securing a LAN • DOCSIS (Data Over Cable Service Interface Specification) filters packets to certain ports • Disable file and print sharing • Shut down the computer when not in use

  29. Issue: Is It a Crime?

  30. Data Security End

More Related