keeping data safe n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Keeping Data Safe PowerPoint Presentation
Download Presentation
Keeping Data Safe

Loading in 2 Seconds...

play fullscreen
1 / 8

Keeping Data Safe - PowerPoint PPT Presentation


  • 141 Views
  • Uploaded on

Keeping Data Safe. Revision Summer 2013. How many ways can data be lost?. Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised disclosure . Safe Practices. Backup and Archiving – what’s the difference? Keeping Backups & Archives safe Media

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Keeping Data Safe' - todd


Download Now An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
keeping data safe

Keeping Data Safe

Revision

Summer 2013

how many ways can data be lost
How many ways can data be lost?
  • Start a list…
  • Physical Loss or Corruption of data
  • Accidental or Deliberate
  • Unauthorised disclosure
safe practices
Safe Practices
  • Backup and Archiving – what’s the difference?
  • Keeping Backups & Archives safe
    • Media
    • Location
  • Protection from accidents
  • Protection from deliberate damage
security methods devices
Security Methods & Devices
  • User ID & Password – identifies the user
  • Encryption of Data
  • Restrict Physical Access
  • Restrict Data Access
  • Monitoring
avoiding malicious attacks
Avoiding Malicious Attacks
  • Avoid being attacked
  • Minimise Damage
  • From:
  • Viruses
  • Worms
  • Malware in General
today s tasks define each of the following in a sentence
Today’s Tasks: Define each of the following in a sentence:
  • Hacking
  • Virus
  • Firewall
  • Download
  • Key Logging
  • Password
  • Cyber War
  • Encryption Keys
  • SSL Certificate
  • Two-factor Authentication
  • Corrupt Data
  • Back Up
  • Removable Media
  • Malware
  • Transaction Log
  • Archive
slide7
Find:
  • Five types of backup media
  • Five ways to protect computers from Physical damage
  • Five ways to protect computers from unauthorised access
  • Five ways to avoid data corruption
  • Five ways to secure data
  • Five activities on a computer that need protection
  • Four levels of access to files
where is all this going
Where is all this going?
  • http://www.theregister.co.uk/2013/05/31/motorola_tattoo_pill_authentication/
  • http://www.theregister.co.uk/2013/06/05/nato_agrees_to_up_cyber_defence/
  • http://www.theregister.co.uk/2013/06/05/nettraveler_cyberespionage/
  • http://www.theregister.co.uk/2013/05/30/drupal_sites_hacked/
  • http://www.theregister.co.uk/2013/05/23/google_upgrade_ssl_certificates_schedule/
  • http://www.theregister.co.uk/2013/05/14/offshore_banking_leak_tax_evasion_probe/