Presentation is loading. Please wait.

Presentation is loading. Please wait.

Data Storage, Backup, and Security Prepared by: Christopher Eaker, University of Tennessee, Knoxville CC BY-NC.

Similar presentations


Presentation on theme: "Data Storage, Backup, and Security Prepared by: Christopher Eaker, University of Tennessee, Knoxville CC BY-NC."— Presentation transcript:

1 Data Storage, Backup, and Security Prepared by: Christopher Eaker, University of Tennessee, Knoxville CC BY-NC

2 Learning Objectives 1.Understand why data storage, backup, and security of research data are important 2.Understand data storage, backup, and security methods for research data 3.Understand best practices for research data storage, access control, migration to newer storage media, and security for research data 4.Identify an approach to creating a data storage, backup, and security plan Module 4: Data Storage, Backup, and Security

3 Storage Personal computers Networked storage External storage Remote/cloud storage Physical storage Module 4: Data Storage, Backup, and Security

4 Backup Store 2 copies Set up a backup routine Digital surrogates Test your system Module 4: Data Storage, Backup, and Security

5 A Word of Caution Module 4: Data Storage, Backup, and Security ≠

6 Other Considerations File formatting Data migration Responsibility Module 4: Data Storage, Backup, and Security

7 Security Access Systems Integrity Module 4: Data Storage, Backup, and Security

8 Protecting Access Login credentials Centralized systems Role-based rights Limitations of wireless devices Module 4: Data Storage, Backup, and Security

9 Protecting Computer Systems Anti-virus software Up-to-date software Firewalls Intrusion detection software Physical access Module 4: Data Storage, Backup, and Security

10 Ensuring Data Integrity Encryption Electronic signatures Watermarks Module 4: Data Storage, Backup, and Security

11 Resources @ UT UT's Office of Information Technology provides you with services to help ensure the safety and security of you research data. The following services can be utilized by all UTK researchers: Vault: share large amount of data and send messages to project collaborators securely. (vault.utk.edu) TrueCrypt: Free on-the-fly software and file encryption. Identify Finder: Prevent identity fraud by ensuring sensitive information is not easily accessible. 2-Factor Authentication Crashplan: cloud-based backup service Contact Bob Hillhouse for more information on the preceding services at bob@utk.edu or 865-974-8445. Module 4: Data Storage, Backup, and Security

12 Activity Read through the Data Storage, Backup, and Security checklist and think of how you would accommodate some of the items in your projects. Discuss among yourselves. Module 4: Data Storage, Backup, and Security


Download ppt "Data Storage, Backup, and Security Prepared by: Christopher Eaker, University of Tennessee, Knoxville CC BY-NC."

Similar presentations


Ads by Google