Dr Joanna Goodger Information Hertfordshire With Bill Worthington and Mohamed Hansraj Research Data Management For Researchers.

Slides:



Advertisements
Similar presentations
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Advertisements

KEEP IT SAFE - BACK UP! Research Data Management.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
For further information computersecurity.wlu.ca
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
Keeping You Connected Through Citrix Access your applications Access your network shares and documents Access your …and do it remotely!
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Cloud Backup. Current Backup failures  Bad media (tapes have limited lifespan, HDD’s can fail)  Backup software fault  Operating system fault  Human.
Back Up and Recovery Sue Kayton February 2013.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
STORAGE SOLUTIONS Research Data Management. Keeping your data just on your working machine, be it lap top or desktop, is the perfect way to loose your.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
REMOTE ACCESS Research Data Management. On Campus There are two networks – the staff network and the student network. Staff network: Access to the shared.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
New Data Regulation Law 201 CMR TJX Video.
November 2009 Network Disaster Recovery October 2014.
Section 6.1 Explain the development of operating systems Differentiate between operating systems Section 6.2 Demonstrate knowledge of basic GUI components.
Your storage on the ground; Your files in the cloud.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Chapter 7 Working with Files.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Module 13: Configuring Availability of Network Resources and Content.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Chapter 9: Novell NetWare
1.1 System Performance Security Module 1 Version 5.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Chapter Fourteen Windows XP Professional Fault Tolerance.
Chapter 18: Windows Server 2008 R2 and Active Directory Backup and Maintenance BAI617.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
SECURITY Research Data Management. Research Data Management Security Laptops go missing very regularly; Intel’s study in 2012 surveying 329 private and.
Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏
Please Note: Information contained in this document is considered LENOVO CONFIDENTIAL For Lenovo Internal Use Only Do Not Copy or Distribute!! For Lenovo.
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
| nectar.org.au NECTAR TRAINING Module 9 Backing up & Packing up.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Continuous Backup for Business CrashPlan PRO offers a paradigm of backup that includes a single solution for on-site and off-site backups that is more.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
| nectar.org.au NECTAR TRAINING Module 9 Backing up & Packing up.
Page 1 of 38 Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please Note: Information contained in.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
EUDAT receives funding from the European Union's Horizon 2020 programme - DG CONNECT e-Infrastructures. Contract No B 2 DROP User.
Enw / Name. What is a on-line / paper based data capture form Can you give an example where each are used? Automated data capture systems are used around.
Computer Security Sample security policy Dr Alexei Vernitski.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
CloudBerry Explorer for S3. CB Explorer Free to use Browse and manage files PowerShell functions Open and edit files  CloudBerry Explorer is an easy.
Dr Joanna Goodger Information Hertfordshire With Bill Worthington, Sara Hajnassiri, and Mohamed Hansraj Research Data Management For Researchers.
Google Apps for Education Account Overview for Staff.
Backup Strategies A Discussion November 19, 2015 Tom Davis.
Dial-In Number: 1 (631) Webinar ID: FHC Tech Talk Automation and Efficiency Series Talk #1 Carbonite automated backup.
Chapter 6 Protecting Your Files
Getting Connected to NGS while on the Road…
Chapter Objectives In this chapter, you will learn:
Create setup scripts simply and easily.
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
File Stream and Team Drives
More than just File Sync and Share.
Back Up and Recovery Sue Kayton October 2015.
Getting Connected to NGS while on the Road…
Connecting Remotely Winter 2014.
IT Office hours – 1 Data Sharing 101
Presentation transcript:

Dr Joanna Goodger Information Hertfordshire With Bill Worthington and Mohamed Hansraj Research Data Management For Researchers

SAFEGUARDING DATA Research Data Management

Research Data Management Decisions making In this module, we’ll discuss how best to set up your research: Storage solutions – where should you keep you data Keep your work safe; keep it backed up Remote access – carry on working off campus and on other devices Share your data safely with collaborators Keep you sensitive data secure Safeguarding data with Research Data Management

STORAGE SOLUTIONS Research Data Management

Keeping your data just on your working machine, be it a laptop or a desktop, is the perfect way to loose your data easily and permanently – this is not what you want! UH offers a range of facilities for securing your data helping it live a long and useful life. UH personal storage space (U: drive) UH shared drives (X: drives) UH research drives UH Document Management System (DMS) All these help to keep your data safe and accessible to you and your collaborators within and without UH. Research Data Management Storage Solutions My Project Safeguarding data with Research Data Management

Research Data Management UH Shared Drives Safeguarding data with Research Data Management DriveCapacitySecurityBack UpHelp My Docs on local machine machine disc capacity password protectedUp to you! contact your local IT staff U: personal network drive Staff, 5GB students, 2GB password protected Daily UH backups held at College Lane and de Havilland data centres. Helpdesk: ext or RDM Website Research networked drive > 5GB password protected and accessed by authorised members only School networked drive Unlimited (within reason) password protected but accessed by all of the school members. Document Management System (DMS) > 5BG password protected and accessed limited to group members only as selected by the project PI. Replicated the Disaster Recovery System on the other campus. Nightly backups to tape.

Document Management SystemResearch Drive External access Device independent Consistent file structure in place Granular security Automatic retention Automatic file reporting and auditing Full text search Scanning straight to file Free of file structure No automatic version control Ideal for large files which are not documents, and would be costly to duplicate after every alteration. Safeguarding data with Research Data Management Research Data Management UH Shared Drives

Research Data Management UH Storage The shared storage is accessible using Novell and the UH intranet. On Windows machines, from off campus, or when connected to the student network, you need to activate Network Connect before logging into Novell. This allocates your connection a UH IP address. On Linux machines, you need to use a Windows Virtual Machine to run Novell, but you can configure the network settings directly and do not need to run Network Connect. Mac users should be able to connect direct to the drives without using Novell. - Novell - Network Connect Safeguarding data with Research Data Management

Research Data Management Document Management System (DMS) Sign in with your staff user name and password. In order to use the “drag and drop” facility you need to download additional add-ons. Your project will be equipped with a project file structure, secure to your group with additional security for sensitive files in personnel and consent folders. Safeguarding data with Research Data Management

Research Data Management Document Management System (DMS) Safeguarding data with Research Data Management

KEEP IT SAFE - BACK UP! Research Data Management

Research Data Management Back Up Backing up should be an automatic part of your everyday research activities. In 2005, an electrical fault in the electronics and laser research building at the University of Southampton cost £50-100M including temporary building hire and transfer of work to Holland. Imagine if a fire or similar disaster happened at UH How much would it cost you‽ Storing your data on the UH network means that it is stored at de Havilland and at College Lane in the data centres. Mountbatten Building, So’ton Uni. Safeguarding data with Research Data Management

Research Data Management Back Up Theft and Loss are real risks: Next time you travel, make sure that your device is labelled and locked your data is backed up. In 2012, a Dell survey demonstrated that laptops per week are left at US airport security points. They cannot be turned on or analysed so unless your name is on the outside of your mobile device, it will not be returned to you. You have 30 days before auctioning them as government property. Safeguarding data with Research Data Management Dr Sarah Harding Boston University, MA

UH PC laptop local drive Networked drives U: and X: Networked drives U: and X: UH server Cluster External HD DVD, Tape Research Data Management Back Up There are UH facilities, but these should be considered secondary back ups. You should have your own back up. Safeguarding data with Research Data Management

Set an autom ated backu p throug h contro l panel Windows Backup and restore Back up your entire content to another disk or to the net. Mac Time machine Research Data Management Back Up Safeguarding data with Research Data Management

Updates the changes to files between two directories and servers rsync Timed schedule to perform tasks – your rsync for example cron /usr/bin/rsync -avu /data/someuser/ /local/data/ /usr/bin/rsync -avu /home/someuser/ /local/data/home/ SHELL=/bin/tcsh PATH=/sbin:/bin:/usr/sbin:/usr/bin 17 3 * * * /usr/bin/rsync -avu /data/someuser/ /local/data/ Research Data Management Back Up Safeguarding data with Research Data Management

SHARING Research Data Management

c Research Data Management Sharing Many methods for sharing data and documents during the analysis and the writing up of projects have been developed by researchers, but most are unsecure and violate the UH data policy. s have a limit to the attachment size and can be intercepted or simply miss-sent Web space is generally unsecured and openly accessible Cloud storage is unreliable and gives third parties access to your data Storage media, such as DVDs and flash pens, can be lost, intercepted, or broken in transit Safeguarding data with Research Data Management

c Research Data Management Sharing Access only to UH members Versioning OS independent Set file structure DMS Access only to UH members Undefined file structure No versioning Research Drives Send large files using the UH server Web based only Open and Free UH FTP Safeguarding data with Research Data Management

Research Data Management Sharing UH Sharing solutions are more secure and reliable accessible on multiple operating systems and on the web, accessible on and off campus. accessed by listed members only Collaborators can be granted visiting member status; on a separate hierarchy so your collaborators will only be able to access folders that you assign to them. Safeguarding data with Research Data Management

Research Data Management Sharing Cloud solutions are easy to use, but open your data up to third parties; some providers take ownership of your data but most declare that you are alone responsible for your data and that you retain your intellectual property rights, the rules change depending on where in the world your data is being held, back-up policies and versioning vary, providers reserve the right to close your account if they decide that you have misused it – there’s no appeal process, providers scan your files for illicit files including political and commercial threats, providers will report files that are deemed illegal, you may not be able to use encryption or password protection on your files. Safeguarding data with Research Data Management

Research Data Management Sharing across OS Sharing between operating systems can also be achieved using the shared drives and DMS; however, WinSCP is a fast, effective way of moving data between operating systems. Safeguarding data with Research Data Management Free SFTP, SCP and FTP client for Windows Log into a server from a windows machine. Move files across using drag and drop.

REMOTE ACCESS Research Data Management

On Campus There are two networks – the staff network and the student network. Staff network: Access to the shared drives using Novell on Windows Access to StaffNet and core services Student network: Access to student system personal drive only. To access StaffNet, core services, and the shared drives, you need to activate network connect and log into Novell. Research Data Management Remote Access Safeguarding data with Research Data Management

Network Connect – allocate your computer a UH IP address adding it to the staff network. First time: log in to the UH VPN at Using your UH member and the password. Research Data Management Remote Access Safeguarding data with Research Data Management

Select Start to activate Network Connect. Activating network connect will initiate a download of the Java application to your machine. Next time, you will not need to web interface, you can activate it directly from the Start menu. Enter your and password. You can then browse the online services; core, StaffNet, and engage, as you would at your desk on campus. Research Data Management Remote Access Safeguarding data with Research Data Management

Next log into Novell; - This enables connections to your staff personal drive and shared drives. Research Data Management Remote Access You will need to install the Novell package onto your machine including the UH settings. Safeguarding data with Research Data Management A11BCD

Research Data Management Remote Access s The University of Hertfordshire uses a Windows Microsoft Exchange server. This requires manual setup on most devices, and a number of different domain, server and URL details. Step by step instructions are provided in the UH Remote Access guide. Safeguarding data with Research Data Management

SECURITY Research Data Management

Research Data Management Security Laptops go missing very regularly; Intel’s study in 2012 surveying 329 private and public organizations demonstrated that On average, 2.3% of laptops assigned to employees are lost each year 7.1% of employee laptops were lost or stolen before the end of their usefulness lifespan In education & research that rises to 3.7% per year with 10.8% of laptops being lost before the end of their useful life 75% are lost outside the workplace, such as in cars, on public transport, in hotels. Have you lost one yet? Safeguarding data with Research Data Management

Research Data Management Security If you lost your laptop or it was stolen, how easily could your data be stolen? Safeguarding data with Research Data Management Source: BBC.co.uk/news

Research Data Management Security Password protect your devices: Do not write your password down and leave it lying around in full view Do not use the same password for personal and work related activities Do not reuse an old password when asked to update your password Do not share your password with others for any reason Do not enable the save password option on your computer Lock your machine when you step away from your desk ( ⊞ +L on windows) Safeguarding data with Research Data Management

Research Data Management Personal Confidential Information (PCi) At UH, the UPR12 Data Management Policy refers to how staff should handle their PCi: The Managing Personal & Confidential Information (PCi) Guide : personal-and-confidential-data/ Unacceptable, but common practice: Saving PCi on a non-University computer; Use of portable media devices to store or backup PCi; Regular transfer or unencrypted transfer of PCi via portable media Safeguarding data with Research Data Management

password protected, 128-bit or 256-bit AES encryption. Encrypt the entire device, folder or file Windows 7+ only Bitlocker password protected, 128-bit or 256-bit AES encryption. automatically expands Mac Secure disk image Safeguarding data with Research Data Management Research Data Management Encryption

If you’re sharing with collaborators and partners with unknown operating system, or without root access – use TrueCrypt. Creates a virtual encrypted disk within a file and mounts it as a real disk. No installation required for sharing; can be packaged with mobile software Encryption is automatic, real-time (on-the-fly) and transparent. Encryption can be hardware-accelerated on modern processors. Provides plausible deniability, in case an adversary forces you to reveal the password: Hidden volume (steganography) and hidden operating system. Safeguarding data with Research Data Management

Research Data Management Anonymisation If you have information that is not vital to the study, then don’t share it, anonymise it. Remove direct identifiers (e.g., personal information such as addresses) Aggregate or reduce the precision of variables that might be identifiable (such as postcode). Generalise text variables to reduce identifiability Restrict continuous variables to reduce outliers Pay particular attention to anonymising relational data - some anonymised variables may become identifiable when considered in combination. Whenever editing is done, researchers need to be aware of the potential for distorting the data. For example, deleting all possible identifiers from text or sound recordings is a simple but blunt tool that creates data that are confidential but may be unusable. UK Data Archive Safeguarding data with Research Data Management