30
Data Security Data Security Unit F Unit F

Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

Embed Size (px)

Citation preview

Page 1: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

Data SecurityData Security

Unit FUnit F

Page 2: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

ObjectivesObjectives

Know What Can Go WrongKnow What Can Go Wrong

Explore Data Security IssuesExplore Data Security Issues

Introduce Computer VirusesIntroduce Computer Viruses

Understand How viruses SpreadUnderstand How viruses Spread

Restrict AccessRestrict Access

Use Antivirus SoftwareUse Antivirus Software

Page 3: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

ObjectivesObjectives

Introduce Data BackupIntroduce Data Backup

Examine Backup ProceduresExamine Backup Procedures

Explore Backup Hardware and Explore Backup Hardware and MediaMedia

Explore Backup StrategiesExplore Backup Strategies

Explore Backup SoftwareExplore Backup Software

Page 4: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

What Can Go WrongWhat Can Go Wrong

Operator errorsOperator errors– Direct source input device (scanners)Direct source input device (scanners)

Software errorsSoftware errors

Power FailuresPower Failures– Power spikePower spike– Power surgePower surge– UPS (Uninterruptible Power Supply)UPS (Uninterruptible Power Supply)– Surge strip vs. power stripSurge strip vs. power strip– Unplug during stormUnplug during storm

Page 5: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

Data Security IssuesData Security Issues

Hardware failure: data Hardware failure: data loss possibleloss possibleMTBF: mean time MTBF: mean time between failures is a between failures is a reliability measurementreliability measurementPhysical damage from Physical damage from smoke, fire, water, smoke, fire, water, breakage, theft breakage, theft Data vandalism like Data vandalism like viruses and hackersviruses and hackers

Page 6: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

How You Can Protect YourselfHow You Can Protect Yourself

Data securityData security are the techniques are the techniques that provide protection for your that provide protection for your datadataRisk managementRisk management is the process is the process of weighing threats to computer of weighing threats to computer data vs. the amount of expendable data vs. the amount of expendable data and the cost of protecting data and the cost of protecting crucial datacrucial dataDisaster Recover CentersDisaster Recover Centers provide provide emergency computing facilitiesemergency computing facilities

Page 7: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

Computer VirusComputer Virus

A set of program instructions A set of program instructions that attaches itself to a file, that attaches itself to a file,

reproduces itself and reproduces itself and spreads to other files.spreads to other files.

Page 8: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

Computer Virus – It’s a CRIME!!Computer Virus – It’s a CRIME!!

Trigger event (payload) often Trigger event (payload) often keyed to specific datekeyed to specific date

Can be classified by types of files Can be classified by types of files they infect:they infect:– File virus (games)File virus (games)– Boot sector virus (system files)Boot sector virus (system files)– Macro virus (applications)Macro virus (applications)

Page 9: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

Trojan HorseTrojan Horse

A computer program that seems A computer program that seems to perform one function while to perform one function while actually doing something else.actually doing something else.

Good at stealing passwordsGood at stealing passwords

Page 10: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

WormsWorms

Designed to spread from Designed to spread from computer to computercomputer to computerTravels within e-mail and Travels within e-mail and TCP/IP packetsTCP/IP packetsLove BugLove BugSome flood network with Some flood network with useless traffic causing useless traffic causing Denial of Service attacksDenial of Service attacks

Page 11: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

How Viruses SpreadHow Viruses Spread

Shared filesShared filesE-mail attachmentsE-mail attachments– Usually have .exe extensionsUsually have .exe extensions– Cannot infect you if you don’t open themCannot infect you if you don’t open them– Two extension filenames highly suspectTwo extension filenames highly suspect

E-mail messages E-mail messages – HTML format can spread themHTML format can spread them

Web site downloadsWeb site downloadsMacro viruses in attachments or files Macro viruses in attachments or files on diskon disk

Page 12: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

Virus SymptomsVirus Symptoms

Vulgar/annoying messages displayed Vulgar/annoying messages displayed on computeron computer

Unusual visual or sound effectsUnusual visual or sound effects

Difficulty saving files or files disappearDifficulty saving files or files disappear

Computer very slowComputer very slow

Computer reboots unexpectedlyComputer reboots unexpectedly

Executable files increase in size Executable files increase in size unaccountablyunaccountably

Computer sends out emails on its ownComputer sends out emails on its own

Page 13: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

Restricting User AccessRestricting User Access

PhysicallyPhysically– Restrict access to computer areaRestrict access to computer area– Keep backup disks in locked vaultKeep backup disks in locked vault– Keep offices lockedKeep offices locked– Keep computer case lockedKeep computer case locked

Restrict data access to Restrict data access to authorized usersauthorized users– PasswordsPasswords– User rightsUser rights

Page 14: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

Restricting User AccessRestricting User Access

Personal identificationPersonal identification– Something a person carries (badge)Something a person carries (badge)– Something a person knows (IDs and Something a person knows (IDs and

passwords)passwords)– Some unique physical trait (biometrics)Some unique physical trait (biometrics)

FingerprintScanner

RetinalScanner

Page 15: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

Antivirus SoftwareAntivirus Software

A set of utility programs that A set of utility programs that looks for and eradicates a looks for and eradicates a

wide spectrum of problems, wide spectrum of problems, such as viruses, Trojan such as viruses, Trojan

horses and worms.horses and worms.

Page 16: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

Antivirus Protection MethodsAntivirus Protection Methods

File lengthFile length

ChecksumChecksum

Virus signatureVirus signature

Page 17: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

Viruses Escape By:Viruses Escape By:

Multi-partite viruses infect Multi-partite viruses infect multiple target typesmultiple target typesPolymorphic viruses Polymorphic viruses mutate by changing mutate by changing signaturesignatureStealth viruses remove Stealth viruses remove their signaturestheir signaturesRetro viruses attack Retro viruses attack antivirus softwareantivirus software

Page 18: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

Other Virus IssuesOther Virus Issues

Keep antivirus software Keep antivirus software running full-time in running full-time in backgroundbackground

Easier to keep virus out than Easier to keep virus out than to eradicate itto eradicate it

Keep your software updated Keep your software updated with new versionswith new versions

Not 100% reliableNot 100% reliable

Page 19: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

Virus HoaxesVirus Hoaxes

E-mail containing dire E-mail containing dire warningswarnings

Strategy to avoid the virusStrategy to avoid the virus

Recommends e-mailing Recommends e-mailing friendsfriends

Usually have long list of Usually have long list of people in To: and CC: boxespeople in To: and CC: boxes

Recommends dangerous Recommends dangerous procedure for eradicating virusprocedure for eradicating virus

Page 20: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

Data BackupData Backup

Backup: copy one or more Backup: copy one or more files in case the original files files in case the original files become damagedbecome damagedRestore: copy the backup Restore: copy the backup files back onto a hard diskfiles back onto a hard diskFull vs. partial backupsFull vs. partial backupsSoftware files vs. data filesSoftware files vs. data filesKeep all data files in My Keep all data files in My DocumentsDocuments

Page 21: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

Important Files to BackupImportant Files to Backup

Internet connection dataInternet connection data

E-mail foldersE-mail folders

E-mail address bookE-mail address book

Favorite URLsFavorite URLs

DownloadsDownloads

Windows RegistryWindows Registry

Page 22: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

Backup ProceduresBackup Procedures

Full backup:Full backup: all filesall filesFull backup:Full backup: all filesall files

Differential backup:Differential backup: only files only files added/changed since last full backupadded/changed since last full backupDifferential backup:Differential backup: only files only files added/changed since last full backupadded/changed since last full backup

Incremental backup:Incremental backup: only files only files added/changed since any backupadded/changed since any backupIncremental backup:Incremental backup: only files only files added/changed since any backupadded/changed since any backup

Page 23: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

Backup Hardware and MediaBackup Hardware and Media

Tape Drives: best for PCsTape Drives: best for PCs– InexpensiveInexpensive– Can hold entire hard driveCan hold entire hard drive– 1 GB in 15-20 minutes1 GB in 15-20 minutes

Floppy disks, Zip disks Floppy disks, Zip disks Writable CDs and DVDs: slower than Writable CDs and DVDs: slower than tapetapeSecond hard disk drive: least reliableSecond hard disk drive: least reliableRemote storage on network for a feeRemote storage on network for a fee

Page 24: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

Backup StrategiesBackup Strategies

Run up-to-date antivirus Run up-to-date antivirus software before backing upsoftware before backing up

Create a boot diskCreate a boot disk– Recovery CD from computer Recovery CD from computer

manufacturermanufacturer– Windows Startup DiskWindows Startup Disk– Rescue disk created from antivirus Rescue disk created from antivirus

softwaresoftware

Page 25: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

Backup StrategiesBackup Strategies

Decide on storage mediumDecide on storage medium

Make rotating sets of backupsMake rotating sets of backups

Test backupsTest backups

Store backups in safe placeStore backups in safe place

1 2 3

Page 26: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

Backup SoftwareBackup Software

Copy Disk utility via operating Copy Disk utility via operating systemsystem

Backup software fromBackup software from– Windows, Accessories, System ToolsWindows, Accessories, System Tools– Supplied with backup devicesSupplied with backup devices

Keep original backup software Keep original backup software CDCD

Page 27: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

TechTalk: Securing a LANTechTalk: Securing a LAN

Password protectionPassword protection

Personal firewall software Personal firewall software that analyzes and controls that analyzes and controls incoming/outgoing packetsincoming/outgoing packets

Network address translation Network address translation (NAT): using private IP (NAT): using private IP addresses within LANaddresses within LAN

Page 28: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

TechTalk: Securing a LANTechTalk: Securing a LAN

DOCSIS (Data Over Cable DOCSIS (Data Over Cable Service Interface Service Interface Specification) filters packets Specification) filters packets to certain portsto certain ports

Disable file and print sharing Disable file and print sharing

Shut down the computer Shut down the computer when not in usewhen not in use

Page 29: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

Issue: Is It a Crime?Issue: Is It a Crime?

Page 30: Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict

Data SecurityData Security

EndEnd