Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce...
-
Upload
gilbert-cain -
Category
Documents
-
view
216 -
download
1
Transcript of Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce...
Data SecurityData Security
Unit FUnit F
ObjectivesObjectives
Know What Can Go WrongKnow What Can Go Wrong
Explore Data Security IssuesExplore Data Security Issues
Introduce Computer VirusesIntroduce Computer Viruses
Understand How viruses SpreadUnderstand How viruses Spread
Restrict AccessRestrict Access
Use Antivirus SoftwareUse Antivirus Software
ObjectivesObjectives
Introduce Data BackupIntroduce Data Backup
Examine Backup ProceduresExamine Backup Procedures
Explore Backup Hardware and Explore Backup Hardware and MediaMedia
Explore Backup StrategiesExplore Backup Strategies
Explore Backup SoftwareExplore Backup Software
What Can Go WrongWhat Can Go Wrong
Operator errorsOperator errors– Direct source input device (scanners)Direct source input device (scanners)
Software errorsSoftware errors
Power FailuresPower Failures– Power spikePower spike– Power surgePower surge– UPS (Uninterruptible Power Supply)UPS (Uninterruptible Power Supply)– Surge strip vs. power stripSurge strip vs. power strip– Unplug during stormUnplug during storm
Data Security IssuesData Security Issues
Hardware failure: data Hardware failure: data loss possibleloss possibleMTBF: mean time MTBF: mean time between failures is a between failures is a reliability measurementreliability measurementPhysical damage from Physical damage from smoke, fire, water, smoke, fire, water, breakage, theft breakage, theft Data vandalism like Data vandalism like viruses and hackersviruses and hackers
How You Can Protect YourselfHow You Can Protect Yourself
Data securityData security are the techniques are the techniques that provide protection for your that provide protection for your datadataRisk managementRisk management is the process is the process of weighing threats to computer of weighing threats to computer data vs. the amount of expendable data vs. the amount of expendable data and the cost of protecting data and the cost of protecting crucial datacrucial dataDisaster Recover CentersDisaster Recover Centers provide provide emergency computing facilitiesemergency computing facilities
Computer VirusComputer Virus
A set of program instructions A set of program instructions that attaches itself to a file, that attaches itself to a file,
reproduces itself and reproduces itself and spreads to other files.spreads to other files.
Computer Virus – It’s a CRIME!!Computer Virus – It’s a CRIME!!
Trigger event (payload) often Trigger event (payload) often keyed to specific datekeyed to specific date
Can be classified by types of files Can be classified by types of files they infect:they infect:– File virus (games)File virus (games)– Boot sector virus (system files)Boot sector virus (system files)– Macro virus (applications)Macro virus (applications)
Trojan HorseTrojan Horse
A computer program that seems A computer program that seems to perform one function while to perform one function while actually doing something else.actually doing something else.
Good at stealing passwordsGood at stealing passwords
WormsWorms
Designed to spread from Designed to spread from computer to computercomputer to computerTravels within e-mail and Travels within e-mail and TCP/IP packetsTCP/IP packetsLove BugLove BugSome flood network with Some flood network with useless traffic causing useless traffic causing Denial of Service attacksDenial of Service attacks
How Viruses SpreadHow Viruses Spread
Shared filesShared filesE-mail attachmentsE-mail attachments– Usually have .exe extensionsUsually have .exe extensions– Cannot infect you if you don’t open themCannot infect you if you don’t open them– Two extension filenames highly suspectTwo extension filenames highly suspect
E-mail messages E-mail messages – HTML format can spread themHTML format can spread them
Web site downloadsWeb site downloadsMacro viruses in attachments or files Macro viruses in attachments or files on diskon disk
Virus SymptomsVirus Symptoms
Vulgar/annoying messages displayed Vulgar/annoying messages displayed on computeron computer
Unusual visual or sound effectsUnusual visual or sound effects
Difficulty saving files or files disappearDifficulty saving files or files disappear
Computer very slowComputer very slow
Computer reboots unexpectedlyComputer reboots unexpectedly
Executable files increase in size Executable files increase in size unaccountablyunaccountably
Computer sends out emails on its ownComputer sends out emails on its own
Restricting User AccessRestricting User Access
PhysicallyPhysically– Restrict access to computer areaRestrict access to computer area– Keep backup disks in locked vaultKeep backup disks in locked vault– Keep offices lockedKeep offices locked– Keep computer case lockedKeep computer case locked
Restrict data access to Restrict data access to authorized usersauthorized users– PasswordsPasswords– User rightsUser rights
Restricting User AccessRestricting User Access
Personal identificationPersonal identification– Something a person carries (badge)Something a person carries (badge)– Something a person knows (IDs and Something a person knows (IDs and
passwords)passwords)– Some unique physical trait (biometrics)Some unique physical trait (biometrics)
FingerprintScanner
RetinalScanner
Antivirus SoftwareAntivirus Software
A set of utility programs that A set of utility programs that looks for and eradicates a looks for and eradicates a
wide spectrum of problems, wide spectrum of problems, such as viruses, Trojan such as viruses, Trojan
horses and worms.horses and worms.
Antivirus Protection MethodsAntivirus Protection Methods
File lengthFile length
ChecksumChecksum
Virus signatureVirus signature
Viruses Escape By:Viruses Escape By:
Multi-partite viruses infect Multi-partite viruses infect multiple target typesmultiple target typesPolymorphic viruses Polymorphic viruses mutate by changing mutate by changing signaturesignatureStealth viruses remove Stealth viruses remove their signaturestheir signaturesRetro viruses attack Retro viruses attack antivirus softwareantivirus software
Other Virus IssuesOther Virus Issues
Keep antivirus software Keep antivirus software running full-time in running full-time in backgroundbackground
Easier to keep virus out than Easier to keep virus out than to eradicate itto eradicate it
Keep your software updated Keep your software updated with new versionswith new versions
Not 100% reliableNot 100% reliable
Virus HoaxesVirus Hoaxes
E-mail containing dire E-mail containing dire warningswarnings
Strategy to avoid the virusStrategy to avoid the virus
Recommends e-mailing Recommends e-mailing friendsfriends
Usually have long list of Usually have long list of people in To: and CC: boxespeople in To: and CC: boxes
Recommends dangerous Recommends dangerous procedure for eradicating virusprocedure for eradicating virus
Data BackupData Backup
Backup: copy one or more Backup: copy one or more files in case the original files files in case the original files become damagedbecome damagedRestore: copy the backup Restore: copy the backup files back onto a hard diskfiles back onto a hard diskFull vs. partial backupsFull vs. partial backupsSoftware files vs. data filesSoftware files vs. data filesKeep all data files in My Keep all data files in My DocumentsDocuments
Important Files to BackupImportant Files to Backup
Internet connection dataInternet connection data
E-mail foldersE-mail folders
E-mail address bookE-mail address book
Favorite URLsFavorite URLs
DownloadsDownloads
Windows RegistryWindows Registry
Backup ProceduresBackup Procedures
Full backup:Full backup: all filesall filesFull backup:Full backup: all filesall files
Differential backup:Differential backup: only files only files added/changed since last full backupadded/changed since last full backupDifferential backup:Differential backup: only files only files added/changed since last full backupadded/changed since last full backup
Incremental backup:Incremental backup: only files only files added/changed since any backupadded/changed since any backupIncremental backup:Incremental backup: only files only files added/changed since any backupadded/changed since any backup
Backup Hardware and MediaBackup Hardware and Media
Tape Drives: best for PCsTape Drives: best for PCs– InexpensiveInexpensive– Can hold entire hard driveCan hold entire hard drive– 1 GB in 15-20 minutes1 GB in 15-20 minutes
Floppy disks, Zip disks Floppy disks, Zip disks Writable CDs and DVDs: slower than Writable CDs and DVDs: slower than tapetapeSecond hard disk drive: least reliableSecond hard disk drive: least reliableRemote storage on network for a feeRemote storage on network for a fee
Backup StrategiesBackup Strategies
Run up-to-date antivirus Run up-to-date antivirus software before backing upsoftware before backing up
Create a boot diskCreate a boot disk– Recovery CD from computer Recovery CD from computer
manufacturermanufacturer– Windows Startup DiskWindows Startup Disk– Rescue disk created from antivirus Rescue disk created from antivirus
softwaresoftware
Backup StrategiesBackup Strategies
Decide on storage mediumDecide on storage medium
Make rotating sets of backupsMake rotating sets of backups
Test backupsTest backups
Store backups in safe placeStore backups in safe place
1 2 3
Backup SoftwareBackup Software
Copy Disk utility via operating Copy Disk utility via operating systemsystem
Backup software fromBackup software from– Windows, Accessories, System ToolsWindows, Accessories, System Tools– Supplied with backup devicesSupplied with backup devices
Keep original backup software Keep original backup software CDCD
TechTalk: Securing a LANTechTalk: Securing a LAN
Password protectionPassword protection
Personal firewall software Personal firewall software that analyzes and controls that analyzes and controls incoming/outgoing packetsincoming/outgoing packets
Network address translation Network address translation (NAT): using private IP (NAT): using private IP addresses within LANaddresses within LAN
TechTalk: Securing a LANTechTalk: Securing a LAN
DOCSIS (Data Over Cable DOCSIS (Data Over Cable Service Interface Service Interface Specification) filters packets Specification) filters packets to certain portsto certain ports
Disable file and print sharing Disable file and print sharing
Shut down the computer Shut down the computer when not in usewhen not in use
Issue: Is It a Crime?Issue: Is It a Crime?
Data SecurityData Security
EndEnd