keeping data safe n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Keeping Data Safe PowerPoint Presentation
Download Presentation
Keeping Data Safe

Loading in 2 Seconds...

play fullscreen
1 / 8
todd

Keeping Data Safe - PowerPoint PPT Presentation

154 Views
Download Presentation
Keeping Data Safe
An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Keeping Data Safe Revision Summer 2013

  2. How many ways can data be lost? • Start a list… • Physical Loss or Corruption of data • Accidental or Deliberate • Unauthorised disclosure

  3. Safe Practices • Backup and Archiving – what’s the difference? • Keeping Backups & Archives safe • Media • Location • Protection from accidents • Protection from deliberate damage

  4. Security Methods & Devices • User ID & Password – identifies the user • Encryption of Data • Restrict Physical Access • Restrict Data Access • Monitoring

  5. Avoiding Malicious Attacks • Avoid being attacked • Minimise Damage • From: • Viruses • Worms • Malware in General

  6. Today’s Tasks: Define each of the following in a sentence: • Hacking • Virus • Firewall • Download • Key Logging • Password • Cyber War • Encryption Keys • SSL Certificate • Two-factor Authentication • Corrupt Data • Back Up • Removable Media • Malware • Transaction Log • Archive

  7. Find: • Five types of backup media • Five ways to protect computers from Physical damage • Five ways to protect computers from unauthorised access • Five ways to avoid data corruption • Five ways to secure data • Five activities on a computer that need protection • Four levels of access to files

  8. Where is all this going? • http://www.theregister.co.uk/2013/05/31/motorola_tattoo_pill_authentication/ • http://www.theregister.co.uk/2013/06/05/nato_agrees_to_up_cyber_defence/ • http://www.theregister.co.uk/2013/06/05/nettraveler_cyberespionage/ • http://www.theregister.co.uk/2013/05/30/drupal_sites_hacked/ • http://www.theregister.co.uk/2013/05/23/google_upgrade_ssl_certificates_schedule/ • http://www.theregister.co.uk/2013/05/14/offshore_banking_leak_tax_evasion_probe/