Storing and securing your data

26
Storing and securing your data Research Data Management Support Services UK Data Service University of Essex April 2014

Transcript of Storing and securing your data

Page 1: Storing and securing your data

Storing and securing

your data

Research Data Management Support Services

UK Data Service

University of Essex

April 2014

Page 2: Storing and securing your data

Overview

Looking after research data for the longer-term and protecting them

from unwanted loss requires having good strategies in place for

securely storing, backing-up, transmitting, and disposing of data.

Collaborative research brings challenges for the shared storage of,

and access to, data.

Areas of coverage • Making back-ups

• Data storage

• File sharing and collaborative environments

• Data security

• Data transmission and encryption

• Data disposal

Page 3: Storing and securing your data

Stuff happens: fieldwork nightmare

• “I’m sorry but we had to blow up your laptop.”

• “What….all my client case notes and testimony, writing, pictures,

music and applications. Years of work. NO!!!!”

• Source: lilysussman.wordpress.com

Page 4: Storing and securing your data

Stuff happens: data inferno

• What if this was your university, your office, your data?

• Fire destroyed a University of Southampton research centre

resulting in significant damage to data storage facilities

• Source: BBC

Page 6: Storing and securing your data

Backing-up data

• It’s not a case of if you will lose data, but when you will lose

data

• Make sure you don’t lose it for good by keeping additional

backup copies

• Protect against: software failure, hardware failure, malicious

attacks, loss, accidents etc.

• Ask yourself: would your data survive a disaster?

Page 7: Storing and securing your data

Backing-up strategy

Consider:

• What needs to be backed-up? All, some, just the bits you

change?

• What media? External hard drive, DVD, online etc.

• Where? Original copy, external local and remote copies

• What method/software? Duplicating, syncing, mirroring

• How often? Assess frequency and automate the process

• For how long? How long you will manage these backups for

• How can you be sure? Never assume, regularly test a restore,

and use verification methods

Page 8: Storing and securing your data

Local data storage

• All digital media are fallible

• Optical (CD, DVD) & magnetic media (hard drives, tape)

degrade – lifespan even lower if kept in poor conditions

• Physical storage media become obsolete e.g. floppy disks

• Copy data files to new media two to five years after first

created

Page 9: Storing and securing your data

Storage services

• Online or ‘cloud’ services increasingly popular

• Google Drive, DropBox, Microsoft SkyDrive etc.

• Accessible anywhere

• Background syncing

• Mirror files

• Mobile apps available

• Very convenient

• Everyone uses them, and that’s ok BUT precautions

must be taken..

• Consider if appropriate, as services can be hosted outside

the EU (DPA for personal data)

• Encrypt anything sensitive or avoid services altogether

Page 10: Storing and securing your data

Other storage options

• Your university or department may have options available e.g. • secure backed up storage space

• VPN giving access to external researchers

• locally managed Dropbox-like services such as ownCloud and ZendTo

• secure file transfer protocol (FTP) server

• Data repository or archive • a repository acts as more of a ‘final destination’ for data

• many universities have data repositories now catering to its researchers

• UK Data Service has it’s own recently launched service called ‘ReShare’, for social science data of any kind

Page 11: Storing and securing your data

Demo: SyncToy synchronising

• For syncing two folders - free download from Microsoft

• User friendly, at the price of power

Page 12: Storing and securing your data

Verification and integrity checks

• Ensure that your backup method is working as intended

• Be wary when using sync tools in particular

• mirror in the wrong direction or using the wrong method, and you could

lose new files completely

• Applies to online DropBox-like syncing services too

• You can use checksums to verify the integrity of a backup

• Also useful when transferring files

• Checksum somewhat like a files’ fingerprint

• …but changes when the file changes

Page 13: Storing and securing your data

Demo: MD5 checksum checks

• Calculate the MD5 checksum value of a file to check its integrate,

e.g. after back-up or transfer

• Example using free ‘MD5summer’ software

(http://www.md5summer.org/)

• Mac OSX has built in MD5 functionality

• Online version of demo: www.data-

archive.ac.uk/media/361550/storingyourdata_checksumexercise.pdf

Page 14: Storing and securing your data

Version control

• Keep track of different copies or versions of data files

• useful for files kept in multiple locations

• or which have multiple users

• a way to safeguard against accidental changes

• File names are a good way to do this

• unique descriptive names for files

• include date and/or version number in name

• indicate relationships between files

e.g. FoodInterview_1_draft; FoodInterview_1_final; HealthTest_06-

04- 2008; BGHSurveyProcedures_00_04

Page 15: Storing and securing your data

Example: version control table

Page 16: Storing and securing your data

Example: Google Drive version control

• Collaboratively edit documents in ‘the cloud’ while tracking version

history

Page 17: Storing and securing your data

Non-digital storage

Printed materials, photographs

• degradation from sunlight and contact (sweat on skin, acid in paper)

• use high quality media for long-term storage/preservation e.g. using acid-free paper &

boxes, non-rust paperclips (no staples), no sellotape

Confidential items, e.g. signed consent forms, interview notes

• store securely, in locked container

• separate from data files

Source: http://www.tramway.co.uk/ Source: Florida State Archives

Page 18: Storing and securing your data

Data security

• Protect data from unauthorised access, use, change, disclosure and

destruction

• Personal data need more protection – always keep separate and

secure

• Who knows who’s watching..!

Page 19: Storing and securing your data

Data security strategy

• Control access to computers:

• use passwords, lock your machine when away from it

• anti-virus and firewall protection, power surge protection

• all devices: desktops, laptops, memory sticks, mobile devices

• all locations: work, home, travel

• restrict access to sensitive materials e.g. consent forms, patient

records

• Control physical access to buildings, rooms, cabinets

• Proper disposal of data and equipment

• Even reformatting the hard drive is not sufficient

Page 20: Storing and securing your data

• Always encrypt personal or sensitive data

• = anything you would not send on a postcard

• e.g. moving files, interview transcripts

• e.g. storing files to shared areas or insecure devices

• Basic principles

• applies an algorithm that makes a file unreadable

• need a ‘key’ of some kind (passphrase, file) to decrypt

• The UK Data Service recommends Pretty Good Privacy (PGP)

• more complicated than just a password, but much more secure

• involves use of multiple public and private keys

Encryption

Image source: RRZEicons

Page 21: Storing and securing your data

Encryption software

• Many free software options that are easy to use

TrueCrypt

http://www.truecrypt.org/

Free, cross platform

• Encrypt hard drives, or partitions of hard drives,

• Encrypt files and folders

• Encrypt portable storage devices such as USB flash drives

AxCrypt*

http://www.axantum.com/axcrypt/

Free, Windows only

*Note: take caution when installing AxCrypt to ensure that you uncheck

options to install extra ‘bundled’ software

Page 22: Storing and securing your data

Demo: Encryption with TrueCrypt

• You can use TrueCrypt to create a reusable encrypted storage

space (or ‘volume’)

• See also alternative demo of encryption with Safehouse Explorer

(Windows only): www.data-

archive.ac.uk/media/312652/storingyourdata_encryptionexercise.pdf

Page 23: Storing and securing your data

Data destruction

• When you delete a file from a hard drive, the chances are it’s still

retrievable – even after emptying the recycle bin

• Files need to be overwritten (ideally multiple times) with random

data to ensure they are irretrievable

File on hard disk drive

File deleted from disk

X X X X

File securely deleted from disk

Page 24: Storing and securing your data

Data destruction software

• BCWipe - uses ‘military-grade procedures to

surgically remove all traces of any file’

• Can be applied to entire disk drives

• AxCrypt* - free open source file and folder

shredding

• Integrates into Windows well, useful for single files

• If in doubt, physically destroy the

drive using an approved secure

destruction facility

• Physically destroy portable media,

as you would shred paper

*Note: take caution when installing AxCrypt to ensure that you uncheck options to install extra ‘bundled’

software

Page 25: Storing and securing your data

Summary of best practise in data storage

and security

• Have a personal backup/storage strategy – original local copy,

external local copy and external remote copy

• Copy data files to new media two to five years after first created

• Know your institutional back-up strategy

• Check data integrity of stored data files regularly (checksum)

• Create new versions of files using a consistent, transparent system

• Encrypt sensitive data – crucial if using web to transmit/share

• Know data retention policies that apply: funder, publisher, home

institution – and remove sensitive data securely where necessary

Page 26: Storing and securing your data

Contacts

Collections Development team

UK Data Service

University of Essex

[email protected]