Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

ECDL IT Security PowerPoint Presentation

1,263 views

Published on

A presentation covering all the topics on IT Security. Useful for educators everywhere.

Published in: Education
  • Be the first to comment

  • Be the first to like this

ECDL IT Security PowerPoint Presentation

  1. 1. CIARAN COMERFORD I.T. Security – Topic 6 – Securing and Backing Up Data
  2. 2. TOPICS TO BE COVERED  Securing and Backing Up Data  Secure Destruction
  3. 3. PHYSICAL SECURITY OF DEVICES 1  Log Equipment Location  Use Equipment Sheets  Mark all location as well as specifying value  Cable Locks  Lock down all computer bases and laptops to furniture and the floor  Lock all monitors, printers, routers
  4. 4. PHYSICAL SECURITY OF DEVICES 2  Access Control  Have a security door lock that needs a code and key fob to open it  Regularly update the software on the access code reader
  5. 5. DATA BACKUPS 1  Data backup procedure  Essential to prevent loss of the following:  Data  Financial Records  Bookmarks/Web History  Backups also important to ensure:  Continuity of business  No disruption to customers
  6. 6. FEATURES OF A BACKUP SCHEDULE 1  Regularity/Frequency  Should be mixture of frequencies i.e.  Weekly, Fortnightly, Monthly, Quarterly and Yearly  Schedule:  1 Backup nightly after close of business  1 Weekly backup on a Sunday  1 Fortnightly every second Sunday  1 Monthly last Sunday of every month  1 Quarterly last Sunday of every quarter
  7. 7. FEATURES OF A BACKUP SCHEDULE 2  Backup Methods  Should be a mixture of 2 methods  Recommended:  Online – in case of fault with tape backup as well as a natural disaster such as a fire  Tape – backups should be backed up to high storage capacity tapes using the Symantec Backup Exec Software
  8. 8. FEATURES OF A BACKUP SCHEDULE 3  Location: Mixture in case of natural disaster  Online – stored online by an external provider  On-Site – some tapes are stored in a fireproof safe  Off-Site – other tapes are stored by an external company off-site
  9. 9. BACKUP DATA 1. Launch Symantec Backup Exec 2. Click Backup and Restore 3. Select Backup 4. Choose Backup Location 5. Choose what data to Backup 6. Choose the Back-Up Schedule 7. Save Settings and Backup
  10. 10. RESTORE AND VALIDATE BACKED UP DATA  Launch Backup Exec  Click Restore My Files  Browse to the Folder where the Backup File is stored you want to retrieve  Click Restore my File  Click Next  Choose to Restore in the original location or in a different location
  11. 11. REASONS FOR PERMANENTLY DELETING DATA  Prevent Identity Theft by deleting financial records so can’t be retrieved by crackers  Secret, private and company information that should never be retrieved by anyone else  In case of selling or donating the hard drive or entire computer and the information shouldn’t be accessible by anyone  To comply with data protection by storing information only for the required time and to re- assure clients their information will be protected
  12. 12. DELETING DATA V.S. DESTROYING DATA  Deleting Data – if you delete something and even empty the recycle bin there is still a residual record left on the computer  This can be retrieved using hard-drive restoring software  Destroying data by using shredding or degaussing is a permanent method  The data is unable to be retrieved
  13. 13. PERMANENTLY DESTROYING DATA  Few methods: Shredding, Degaussing and Data Destruction Utilities  Shredding – shredding disks like CD/DVD  Hard/USB Drive destruction – physical destruction of a drive  Degaussing – using magnetism on a disk in random patterns rendering previous data unrecoverable  Data Utilities – software utility to carry out destruction of data

×