Slide Template for Module 4 Data Storage, Backup, and Security

Slides:



Advertisements
Similar presentations
Utility program + driver program Thomas Wat 4D (21)
Advertisements

GRAD 521, Research Data Management Winter 2014 – Lecture 7 Amanda L. Whitmire, Asst. Professor.
Data Storage, Backup, and Security Prepared by: Christopher Eaker, University of Tennessee, Knoxville CC BY-NC.
Backup Strategy. An Exam question will ask you to describe a backup strategy. Be able to explain: Safe, secure place in different location. Why? – For.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Understand Database Backups and Restore Database Administration Fundamentals LESSON 5.2.
Security Controls – What Works
The Ultimate Backup Solution.
®® Microsoft Windows 7 for Power Users Tutorial 10 Backing Up and Restoring Files.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Procedures for Backup and Recovery Section 14. Key points and questions What data should be backed up and how often? What do we mean by full backup, incremental.
New Data Regulation Law 201 CMR TJX Video.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7.
1.1 System Performance Security Module 1 Version 5.
Chapter 4 Solving Data Backup Challenges Prepared by: Khurram N. Shamsi.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Module 7. Data Backups  Definitions: Protection vs. Backups vs. Archiving  Why plan for and execute data backups?  Considerations  Issues/Concerns.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Managing Your Data: Backing Up Your Data Robert Cook Oak Ridge National Laboratory Version 1.0 Review Date.
© 2001 by Prentice Hall11-1 Local Area Networks, 3rd Edition David A. Stamper Part 4: Installation and Management Chapter 11 LAN Administration: Backup.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Information Systems Security
Managing Your Data: Backing Up Your Data Robert Cook Oak Ridge National Laboratory Section: Local Data Management Version 1.0 October 2012.
Backups CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Note1 (Admi1) Overview of administering security.
Component 8/Unit 9bHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 9b Creating Fault Tolerant.
Working with HIT Systems
Module 9: Designing Security for Data. Overview Creating a Security Plan for Data Creating a Design for Security of Data.
Discovery 2 Internetworking Module 8 JEOPARDY K. Martin.
Chap1: Is there a Security Problem in Computing?.
The Ultimate Backup Solution.
Data Storage, Backup, and Security Module 4. Questions from last week?
Component 8 Installation and Maintenance of Health IT Systems Unit 9b Creating Fault-Tolerant Systems, Backups, and Decommissioning This material was developed.
© 2013 Toshiba Corporation B2B PC Training Mailer - Toshiba Device Access Control.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
UMassD Data Workshop Series Class 3 – Storage, Security, Repositories, Preservation October - 20 Dawn Gross, Zac Painter, Liz Winiarz.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Securing Information Systems
Securing Information Systems
Local Area Networks, 3rd Edition David A. Stamper
Securing Network Servers
INFORMATION SYSTEMS SECURITY AND CONTROL.
AS ICT Module 2 Objectives: Security of Data
Working at a Small-to-Medium Business or ISP – Chapter 8
Data Compromises: A Tax Practitioners “Nightmare”
UNIT 19 Data Security 2.
Systems Software Keywords Utilities and Backups
Securing Information Systems
Backup your Data © EIT, Author Gay Robertson, 2017.
CYB 110 Competitive Success/snaptutorial.com
CYB 110 Teaching Effectively-- snaptutorial.com
CYB 110 Education for Service-- tutorialrank.com
LO2: Understand Computer Software
The Ultimate Backup Solution.
Final HIPAA Security Rule
Data integrity and security
INFORMATION SYSTEMS SECURITY and CONTROL
The Ultimate Backup Solution.
Backup and restoration of data, redundancy
Guarding against loss of data
Presentation transcript:

Slide Template for Module 4 Data Storage, Backup, and Security

Learner Objectives 1. Understand why data storage, backup, and security of research data are important 2. Understand data storage, backup, and security methods for research data 3. Understand best practices for research data storage, access control, migration to newer storage media, and security of research data 4. Identify an approach to creating a data storage, backup, and security plan for a project

Storage, Backup, and Security They are fundamental and interrelated components of a data management strategy. Together they ensure the ongoing integrity of research data. Project planning and data management must account for all three.

Storage The media to which you save your data files and software Optical, magnetic All storage media are vulnerable to risk. Evaluate and refresh regularly.

Storage Internal, local hard drives Networked storage External storage devices Remote storage services (The Cloud) Physical storage (Label, label, label! See Module x on Metadata.)

Storage Remote storage services Data sharing is not data storage. Read terms of service. Consult your PI or institutional policies on file-sharing services.

Backup Allows you to restore your data if it is lost. Hardware or software malfunction Environmental disaster (fire, flood) Theft Unauthorized access Does your operating system and/or network administrator already have existing backup protocols and tools in place?

Security Best Practice: 3 Copies Original External Local External Remote

Backup Backup Procedure Backup Frequency Test your strategy! Full Differential incremental Cumulative incremental Backup Frequency Daily Weekly Monthly Test your strategy!

Other Considerations File formats Data migration Responsibility assignments

Levels of Security Safeguard your data from malicious or accidental access to your system. Access Systems Data Integrity Does your network administrator have security services that meet your needs?

Security Limit the availability of your data. User ID/passwords Role-based access rights Limitations of wireless devices

Security Protect the hardware and software systems you use. Anti-virus software Up-to-date versions of software and storage media Firewalls Intrusion detection software Limit physical access

Security Protect the integrity of your data at the file level Encryption Electronic signatures Watermarking