SlideShare a Scribd company logo
1 of 64
Data Storage Access
& Security
Dr. James N. Smith, DBA, CISSP
School of Computer & Cyber Sciences
James N. Smith
• Assistant Professor
School of Computer and Cyber Sciences
Augusta University Cyberinstitute
• ISC2 Certified Information Systems Security
Professional (CISSP)
• CompTIA Advanced Security Practitioner (CASP+)
Disclaimers
• I am not an attorney
• I am not YOUR attorney
• I am not your HIPPA compliance officer
Goals of This Talk
Three “C”s
Concepts – Explain the core concepts of information security
in a brief format
Context – How to think about these concepts as a researcher
working with data
Couple of techniques – Demonstrate some tools to help you
apply these concepts to your work
CIA Triad of Information Security
• Confidentiality – Preserving authorized restrictions on
information access and disclosure, including means for
protecting personal privacy and proprietary information.
• Integrity – Guarding against improper information
modification or destruction and ensuring information
non-repudiation and authenticity.
• Availability – Ensuring timely and reliable access to
and use of information.
NIST Special Publication 800-12, Revision 1 - An Introduction to Information Security
Confidentiality
Preserving authorized restrictions on
information access and disclosure,
including means for protecting personal
privacy and proprietary information.
Research Context
• Data and work products are valuable intellectual
property and we rightly do not wish for it to be stolen.
• If we are studying human subjects, we have certain
due care standards to keep the data confidential.
We generally don’t worry about data at rest…
https://upload.wikimedia.org/wikipedia/commons/7/77/WatergateFromAir.JPG
Data in Motion
• Data that is in motion, either physically or over
networks, can be protected using encryption.
• Full Disk Encryption
• Single File Encryption
• Mountable Volume Encryption
Full Disk Encryption
(You May Already Have It)
Single File Encryption
• Useful to send files back and forth between
collaborators.
• Platform independent.
• AESCrypt is a good example
https://www.aescrypt.com/
AESCrypt
AESCrypt
AESCrypt
AESCrypt
AESCrypt
AESCrypt
AESCrypt
Mountable Volume Encryption
• Uses an encrypted container to mount as a drive on
your computer.
• Good for collections of files, such as a research
project.
• Easier than encrypting files individually.
• Platform independent.
• VeraCrypt is a good example
https://www.veracrypt.fr
VeraCrypt
VeraCrypt
VeraCrypt
VeraCrypt
VeraCrypt
VeraCrypt
VeraCrypt
VeraCrypt
VeraCrypt
VeraCrypt
VeraCrypt
VeraCrypt
VeraCrypt
VeraCrypt
Encryption is Great! What could Possibly
Go Wrong?
Quadriga CX Chief Executive Officer Gerald Cotton (1988-2018)
Sometimes the Old Ways are Better
Confidentiality is not Anonymity
• The technical definition of confidentiality deals with
data, not people.
• Anonymous data has the advantage of, even if it is
disclosed, it cannot be tracked back to a person.
Technical Confidentiality is not Legal
Confidentiality
• Only certain protected classes in our country have the
legal right to guarantee confidentiality to other people.
• Clergy, Medical Doctors, Spouses, and, to an extent,
Journalists
• Professors and academic researchers are not on that
list.
Boston College Burns Library, Home of the Belfast Project
Archives
Chronical of Higher Education
Integrity
Guarding against improper information
modification or destruction and
ensuring information non-repudiation
and authenticity.
Research Context
• Accuracy is necessary to ensure that our research is
effective, and perhaps safe.
• Research replication has become a major concern
across all fields.
• We have to have trust in the integrity of large and
complex data files
International
Prototype Kilogram
https://www.bipm.org/e
n/bipm/mass/ipk/
Tests of
Sameness
Hash Algorithm Integrity Checking
• Uses encryption algorithms to create a digital
fingerprint of a file.
• Any change to a file creates a change to the fingerprint.
• Provides a digital test of sameness.
• Many good standards, MD5, SHA1, SHA-256
• Platform independent.
• HashTab is a good example
http://implbits.com/products/hashtab
Hashtab
Hashtab
Hashtab
Hashtab
Hashtab
Hashtab
Hashtab
Hashtab
Test of Sameness
Image cited in Smith, F.J. (1973). Standard kilogram weights: A story of
precision fabrication, Platinum Metals Rev., 17, (2), 66.
https://www.technology.matthey.com/article/17/2/66-68/
Test of Sameness
Test of Sameness
Availability
Ensuring timely and reliable access to
and use of information.
Research Context
• Data is both a valuable and expensive asset.
• Data loss can stall research projects and can prevent
publication if replication is not possible.
https://montrealgazette.com/news/local-news/u-s-student-offers-5000-reward-for-
phd-data-stolen-in-montreal
Cloud Synchronization
Three – Two – One Rule
• Three copies of critical data.
• Stored in at least two physical
locations.
• One copy should be offline.
Three – Two – One Rule
Final Thoughts
• Organizing your digital life based on the
information security principles of
Confidentiality, Integrity, and Availability does
not require great technical skill. It requires a
mindset.
• Adopting a security mindset will allow you to
protect your assets and prevent costly loss to
your research.
Questions?
James N. Smith, DBA, CISSP
School of Computer and Cyber
Sciences
Augusta University
jasmith8@augusta.edu
http://www.augusta.edu/ccs

More Related Content

Similar to Data Storage Access and Security.pptx

multiple encryption in clouud computing
multiple encryption in clouud computingmultiple encryption in clouud computing
multiple encryption in clouud computing
Rauf Wani
 
2010 AIRI Petabyte Challenge - View From The Trenches
2010 AIRI Petabyte Challenge - View From The Trenches2010 AIRI Petabyte Challenge - View From The Trenches
2010 AIRI Petabyte Challenge - View From The Trenches
George Ang
 

Similar to Data Storage Access and Security.pptx (20)

Spectra Logic
Spectra LogicSpectra Logic
Spectra Logic
 
Best practices data management
Best practices data managementBest practices data management
Best practices data management
 
Webinar: Performance vs. Cost - Solving The HPC Storage Tug-of-War
Webinar: Performance vs. Cost - Solving The HPC Storage Tug-of-WarWebinar: Performance vs. Cost - Solving The HPC Storage Tug-of-War
Webinar: Performance vs. Cost - Solving The HPC Storage Tug-of-War
 
Digital Media Storage.pptx
Digital Media Storage.pptxDigital Media Storage.pptx
Digital Media Storage.pptx
 
Webinar: Ransomware - Five Reasons You’re Not As Protected As You Think
Webinar: Ransomware - Five Reasons You’re Not As Protected As You ThinkWebinar: Ransomware - Five Reasons You’re Not As Protected As You Think
Webinar: Ransomware - Five Reasons You’re Not As Protected As You Think
 
Digital Preservation with Archivematica: An Introduction
Digital Preservation with Archivematica: An IntroductionDigital Preservation with Archivematica: An Introduction
Digital Preservation with Archivematica: An Introduction
 
Linux for Cybersecurity CYB110 - Unit 7.ppsx
Linux for Cybersecurity CYB110 - Unit 7.ppsxLinux for Cybersecurity CYB110 - Unit 7.ppsx
Linux for Cybersecurity CYB110 - Unit 7.ppsx
 
multiple encryption in clouud computing
multiple encryption in clouud computingmultiple encryption in clouud computing
multiple encryption in clouud computing
 
Codefest2015
Codefest2015Codefest2015
Codefest2015
 
Data Management for Undergraduate Researchers
Data Management for Undergraduate ResearchersData Management for Undergraduate Researchers
Data Management for Undergraduate Researchers
 
Research Data (and Software) Management at Imperial: (Everything you need to ...
Research Data (and Software) Management at Imperial: (Everything you need to ...Research Data (and Software) Management at Imperial: (Everything you need to ...
Research Data (and Software) Management at Imperial: (Everything you need to ...
 
2010 AIRI Petabyte Challenge - View From The Trenches
2010 AIRI Petabyte Challenge - View From The Trenches2010 AIRI Petabyte Challenge - View From The Trenches
2010 AIRI Petabyte Challenge - View From The Trenches
 
Securing Your MongoDB Deployment
Securing Your MongoDB DeploymentSecuring Your MongoDB Deployment
Securing Your MongoDB Deployment
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...
 
Private Cloud Storage via Open Source
Private Cloud Storage via Open SourcePrivate Cloud Storage via Open Source
Private Cloud Storage via Open Source
 
Research Data Management
Research Data ManagementResearch Data Management
Research Data Management
 
Webinar: How Snapshots CAN be Backups
Webinar: How Snapshots CAN be BackupsWebinar: How Snapshots CAN be Backups
Webinar: How Snapshots CAN be Backups
 
Sqrrl real time_big_data_20130411
Sqrrl real time_big_data_20130411Sqrrl real time_big_data_20130411
Sqrrl real time_big_data_20130411
 
Cloud - Security - Big Data
Cloud - Security - Big DataCloud - Security - Big Data
Cloud - Security - Big Data
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
 

More from AJAYVISHALRP (10)

finalppt-150606051347-lva1-app6892.pptx
finalppt-150606051347-lva1-app6892.pptxfinalppt-150606051347-lva1-app6892.pptx
finalppt-150606051347-lva1-app6892.pptx
 
WH PAPER PRESENTATION PPT.pptx
WH PAPER PRESENTATION PPT.pptxWH PAPER PRESENTATION PPT.pptx
WH PAPER PRESENTATION PPT.pptx
 
U3-PPT-1 (1).ppt
U3-PPT-1 (1).pptU3-PPT-1 (1).ppt
U3-PPT-1 (1).ppt
 
U2-LP2.ppt
U2-LP2.pptU2-LP2.ppt
U2-LP2.ppt
 
U1-LP1.ppt
U1-LP1.pptU1-LP1.ppt
U1-LP1.ppt
 
disk scheduling algorithms.pptx
disk scheduling algorithms.pptxdisk scheduling algorithms.pptx
disk scheduling algorithms.pptx
 
1G1.pptx
1G1.pptx1G1.pptx
1G1.pptx
 
WH PAPER PRESENTATION PPT.pptx
WH PAPER PRESENTATION PPT.pptxWH PAPER PRESENTATION PPT.pptx
WH PAPER PRESENTATION PPT.pptx
 
sorting1.pptx
sorting1.pptxsorting1.pptx
sorting1.pptx
 
AI Pugal.pptx
AI Pugal.pptxAI Pugal.pptx
AI Pugal.pptx
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Data Storage Access and Security.pptx