Data Storage, Backup, and Security Prepared by: Christopher Eaker, University of Tennessee, Knoxville CC BY-NC.

Slides:



Advertisements
Similar presentations
Encryption Applications George Bailey Information Security Ivy Tech Community College Tech Day – Columbus, Indiana.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
GRAD 521, Research Data Management Winter 2014 – Lecture 7 Amanda L. Whitmire, Asst. Professor.
Secure Transit & Storage HOW TO SECURELY STORE & SEND CONFIDENTIAL DATA by The UTHSC Information Security Team.
Data Storage and Security Best Practices for storing and securing your data The goal of data storage is to ensure that your research data are in a safe.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Protection of personal mobile computer devices Information Security Isaac Fernandes, mci12009 Sofia Nunes, mci12014.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Archiving and Preservation Prepared by: Christopher Eaker, University of Tennessee, Knoxville CC BY-NC.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Amber Vision – June 25, 2010 Presentation to: West Virginia Board of Education Superintendent’s Leadership Institute.
New Data Regulation Law 201 CMR TJX Video.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
General Awareness Training
Operating System Utility Programs & Stand-alone utility Programs.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
1.1 System Performance Security Module 1 Version 5.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Murphy’s Law If anything can go wrong, it will.. 2 Data Security and Confidentiality “… a firm belief in Murphy’s Law and in the necessity to try and.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Types of Electronic Infection
Android Mobile Security Krystal Salerno. Introductions.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
TAX-AIDE Security 2013 Regional Meetings1. TAX-AIDE Security ● This year in the AARP Foundation Tax-Aide program there were: Two(2)confirmed laptops reported.
Chapter 2 Securing Network Server and User Workstations.
Discovery 2 Internetworking Module 8 JEOPARDY K. Martin.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Chap1: Is there a Security Problem in Computing?.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
1 3/13/08 Michael O’Connor Nicoleta Kourouniotis Michelle LaNasa Samantha Bonar Michael O’Connor Nicoleta Kourouniotis Michelle LaNasa Samantha Bonar.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
© 2013 Toshiba Corporation B2B PC Training Mailer - Toshiba Device Access Control.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Introduction to Networking. What is a Network? Discuss in groups.
 Digital Rights Management  To prevent you from making copies of audio files you have downloaded on your personal media player. It also prevent from.
E-Commerce & Bank Security By: Mark Reed COSC 480.
First Tuna Data Workshop (TDW-1) October 2006, Noumea, New Caledonia Oceanic Fisheries Programme (OFP) Secretariat of the Pacific Community (SPC)
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
Information Systems Design and Development Security Precautions Computing Science.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Security Issues in Information Technology
Slide Template for Module 4 Data Storage, Backup, and Security
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Working at a Small-to-Medium Business or ISP – Chapter 8
TECHNOLOGY GUIDE THREE
UNIT 19 Data Security 2.
Definition, DIS/Advantages & Services
ICT meeting Business needs
PREPARED BY: RUMMY MIRANDA
Systems Design Chapter 6.
INFORMATION SYSTEMS SECURITY and CONTROL
Network Security Mark Creighton GBA 576 6/4/2019.
Presentation transcript:

Data Storage, Backup, and Security Prepared by: Christopher Eaker, University of Tennessee, Knoxville CC BY-NC

Learning Objectives 1.Understand why data storage, backup, and security of research data are important 2.Understand data storage, backup, and security methods for research data 3.Understand best practices for research data storage, access control, migration to newer storage media, and security for research data 4.Identify an approach to creating a data storage, backup, and security plan Module 4: Data Storage, Backup, and Security

Storage Personal computers Networked storage External storage Remote/cloud storage Physical storage Module 4: Data Storage, Backup, and Security

Backup Store 2 copies Set up a backup routine Digital surrogates Test your system Module 4: Data Storage, Backup, and Security

A Word of Caution Module 4: Data Storage, Backup, and Security ≠

Other Considerations File formatting Data migration Responsibility Module 4: Data Storage, Backup, and Security

Security Access Systems Integrity Module 4: Data Storage, Backup, and Security

Protecting Access Login credentials Centralized systems Role-based rights Limitations of wireless devices Module 4: Data Storage, Backup, and Security

Protecting Computer Systems Anti-virus software Up-to-date software Firewalls Intrusion detection software Physical access Module 4: Data Storage, Backup, and Security

Ensuring Data Integrity Encryption Electronic signatures Watermarks Module 4: Data Storage, Backup, and Security

UT UT's Office of Information Technology provides you with services to help ensure the safety and security of you research data. The following services can be utilized by all UTK researchers: Vault: share large amount of data and send messages to project collaborators securely. (vault.utk.edu) TrueCrypt: Free on-the-fly software and file encryption. Identify Finder: Prevent identity fraud by ensuring sensitive information is not easily accessible. 2-Factor Authentication Crashplan: cloud-based backup service Contact Bob Hillhouse for more information on the preceding services at or Module 4: Data Storage, Backup, and Security

Activity Read through the Data Storage, Backup, and Security checklist and think of how you would accommodate some of the items in your projects. Discuss among yourselves. Module 4: Data Storage, Backup, and Security