Talk1 esc7 muscl-dataprotection_v1_2

{elysiumsecurity}
PROTECTING YOUR DATA
Version: 1.2a
Date: 27/06/2018
Author: Sylvain Martinez
Reference: ESC7-MUSCL
Classification: Public
cyber protection & response
{elysiumsecurity}
cyber protection & response
2
BEST PRACTICEDATA SECURITYCONTEXT
• Data security scope;
• Data security concept;
• Data security
solutions;
CONTENTS
Public
• Data definition;
• Data form ;
• Data type;
• Data security goals,
threats and im pacts;
• Data security
awareness;
• Safe behaviours;
• Take away.
{elysiumsecurity}
cyber protection & response
3
BEST PRACTISEDATA SECURITYCONTEXT
DATA DEFINITION
Public
0 1 0 0 0 1 1 1 0 1 0 0 0 1 0 1 0 1
ANYTHING CREATED DIGITALLY
"transmittable and storable
computer information" - 1946
Picture from PIXABAY
{elysiumsecurity}
cyber protection & response
4
BEST PRACTISEDATA SECURITYCONTEXT
DATA FORM
Public Icons from the Noun Project unless stated otherwise
{elysiumsecurity}
cyber protection & response
5
BEST PRACTISEDATA SECURITYCONTEXT
DATA TYPE
Public
{elysiumsecurity}
cyber protection & response
6
BEST PRACTISEDATA SECURITYCONTEXT
DATA SECURITY GOALS, THREATS & IMPACTS
Public
CONFIDENTIALITY
C
INTEGRITY
A
AVAILIBILITY
I
SECURITY
GOALS
CIA vs. MPH
SECURITY
IMPACTS
DATA
LEAKAGE
UNAUTHORISED
MODIFICATION
DESTRUCTION
& LOCK
MALWARE
M
HACKING
H
PHISHING
P
SECURITY
THREATS
{elysiumsecurity}
cyber protection & response
7
BEST PRACTISEDATA SECURITYCONTEXT
DATA SECURITY SCOPE
Public
USAGE
Creation
Consumption
Destruction
Transit
Transmission
Remote Access
COMMUNICATION
Saved
Sleep State
Backup
AT REST
SYSTEM ENCRYPTION
FILE/DATA ENCRYPTION
COMMUNICATION ENCRYPTION
{elysiumsecurity}
cyber protection & response
8
BEST PRACTISEDATA SECURITYCONTEXT
DATA SECURITY CONCEPT
Public
1. PROTECT DATA
DATA POLICY
DATA CLASSIFICATION AND ROLES
ACCESS CONTROLS
2. RESTRICT DATA ACCESS
LABELLING
LOGS
FILE VISIBILITY
3. MONITOR DATA ACTIVITY
BITLOCKER, FIREVAULT, ENCFS, ZIP
DRM, PASSWORD SAFE
TLS/SSL
{elysiumsecurity}
cyber protection & response
9
BEST PRACTISEDATA SECURITYCONTEXT
DATA SECURITY SOLUTIONS
Public
1. PROTECT DATA
DRM
PASSWORDS
ACCESS RIGHTS
2. RESTRICT DATA ACCESS
DLP, DRM
IDS
DATA INVENTORY
3. MONITOR DATA ACTIVITY
{elysiumsecurity}
cyber protection & response
10
BEST PRACTISEDATA SECURITYCONTEXT
DATA SECURITY AWARENESS
Public
FROM TOENVIRONMENT
{elysiumsecurity}
cyber protection & response
11
BEST PRACTISEDATA SECURITYCONTEXT
DATA SECURITY AWARENESS
Public
NATURE
{elysiumsecurity}
cyber protection & response
12
BEST PRACTISEDATA SECURITYCONTEXT
DATA SECURITY AWARENESS
Public
PAY ATTENTION
{elysiumsecurity}
cyber protection & response
13
BEST PRACTISEDATA SECURITYCONTEXT
SAFE BEHAVIOURS
Public
HALF TRUTH
BACKUP DATA
YOU CAN SAY NO
DO NOT RE-USE CREDENTIALS
CHANGE DEFAULT PASSWORD
THINK BEFORE YOU CLICK!
{elysiumsecurity}
cyber protection & response
14
BEST PRACTISEDATA SECURITYCONTEXT
TAKE AWAY
Public
1. USE STRONG PASSWORDS AND A
PASSWORD SAFE
3. ENCRYPT YOUR DATA
5. ENABLE DUAL FACTOR
AUTHENTICATION
2. USE UNIQUE PASSWORDS
4. BACKUP YOUR DATA
6. SCREENLOCK AUTOMATIC AND WHEN
AWAY
7. BE AWARE OF YOUR ENVIRONMENT
9. NO DEFAULT PASSWORD/CONFIG
11. PAY ATTENTION TO WARNINGS
8. CUSTOM IS GOOD, STANDARD IS
BETTER
10. UP TO DATE ANTI VIRUS / ENDPOINT
PROTECTION
12. THINK BEFORE YOU CLICK!
{elysiumsecurity}
cyber protection & response
© 2018 Elysium Security Ltd.
All Rights Reserved
www.elysium security.com
ElysiumSecurity provides practical expertise to identify
vulnerabilities, assess their risks and impact, remediate
those risks, prepare and respond to incidents as well as raise
security awareness through an organization.
ElysiumSecurity provides high level expertise gathered
through years of best practices experience in large
international companies allowing us to provide advice best
suited to your business operational model and priorities.
ABOUT ELYSIUMSECURITY LTD.
ElysiumSecurity provides a portfolio of Strategic and Tactical
Services to help companies protect and respond against Cyber
Security Threats. We differentiate ourselves by offering discreet,
tailored and specialized engagements.
Operating in Mauritius and in the United Kingdom,
our boutique style approach means we can easily adapt to your
business operational model and requirements to provide a
personalized service that fits your working environment.
1 of 15

Recommended

OFFENSIVE IDS by
OFFENSIVE IDSOFFENSIVE IDS
OFFENSIVE IDSSylvain Martinez
286 views17 slides
The Art of CTF by
The Art of CTFThe Art of CTF
The Art of CTFSylvain Martinez
223 views22 slides
Mobile Security Assessment by
Mobile Security AssessmentMobile Security Assessment
Mobile Security AssessmentSylvain Martinez
206 views16 slides
INCIDENT RESPONSE CONCEPTS by
INCIDENT RESPONSE CONCEPTSINCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTSSylvain Martinez
1.3K views39 slides
INCIDENT RESPONSE OVERVIEW by
INCIDENT RESPONSE OVERVIEWINCIDENT RESPONSE OVERVIEW
INCIDENT RESPONSE OVERVIEWSylvain Martinez
622 views15 slides
SOCIAL MEDIA AS A CYBER WEAPON by
SOCIAL MEDIA AS A CYBER WEAPONSOCIAL MEDIA AS A CYBER WEAPON
SOCIAL MEDIA AS A CYBER WEAPONSylvain Martinez
278 views17 slides

More Related Content

What's hot

2019 CYBER SECURITY TRENDS REPORT REVIEW by
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEWSylvain Martinez
1.8K views18 slides
VIRTUAL CISO AND OTHER KEY CYBER ROLES by
VIRTUAL CISO AND OTHER KEY CYBER ROLESVIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLESSylvain Martinez
418 views10 slides
DATA LOSS PREVENTION OVERVIEW by
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWSylvain Martinez
599 views21 slides
OFFICE 365 SECURITY by
OFFICE 365 SECURITYOFFICE 365 SECURITY
OFFICE 365 SECURITYSylvain Martinez
457 views26 slides
INCIDENT RESPONSE NIST IMPLEMENTATION by
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATIONSylvain Martinez
5.5K views27 slides
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool by
Open Source IDS - How to use them as a powerful fee Defensive and Offensive toolOpen Source IDS - How to use them as a powerful fee Defensive and Offensive tool
Open Source IDS - How to use them as a powerful fee Defensive and Offensive toolSylvain Martinez
474 views25 slides

What's hot(20)

2019 CYBER SECURITY TRENDS REPORT REVIEW by Sylvain Martinez
2019 CYBER SECURITY TRENDS REPORT REVIEW2019 CYBER SECURITY TRENDS REPORT REVIEW
2019 CYBER SECURITY TRENDS REPORT REVIEW
Sylvain Martinez1.8K views
VIRTUAL CISO AND OTHER KEY CYBER ROLES by Sylvain Martinez
VIRTUAL CISO AND OTHER KEY CYBER ROLESVIRTUAL CISO AND OTHER KEY CYBER ROLES
VIRTUAL CISO AND OTHER KEY CYBER ROLES
Sylvain Martinez418 views
INCIDENT RESPONSE NIST IMPLEMENTATION by Sylvain Martinez
INCIDENT RESPONSE NIST IMPLEMENTATIONINCIDENT RESPONSE NIST IMPLEMENTATION
INCIDENT RESPONSE NIST IMPLEMENTATION
Sylvain Martinez5.5K views
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool by Sylvain Martinez
Open Source IDS - How to use them as a powerful fee Defensive and Offensive toolOpen Source IDS - How to use them as a powerful fee Defensive and Offensive tool
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
Sylvain Martinez474 views
Ict conf td-evs_pcidss-final by Dejan Jeremic
Ict conf td-evs_pcidss-finalIct conf td-evs_pcidss-final
Ict conf td-evs_pcidss-final
Dejan Jeremic659 views
Critical Infrastructure Protection from Terrorist Attacks by BGA Cyber Security
Critical Infrastructure Protection from Terrorist AttacksCritical Infrastructure Protection from Terrorist Attacks
Critical Infrastructure Protection from Terrorist Attacks
BGA Cyber Security3.3K views
Ivan dragas get ahead of cybercrime by Dejan Jeremic
Ivan dragas   get ahead of cybercrimeIvan dragas   get ahead of cybercrime
Ivan dragas get ahead of cybercrime
Dejan Jeremic943 views
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga by Dejan Jeremic
Ict 2015   saga - cisco cybersecurity rešenja- Viktor VargaIct 2015   saga - cisco cybersecurity rešenja- Viktor Varga
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
Dejan Jeremic852 views
2015 ISA Calgary Show: IACS Cyber Incident Preparation by Cimation
2015 ISA Calgary Show: IACS Cyber Incident Preparation2015 ISA Calgary Show: IACS Cyber Incident Preparation
2015 ISA Calgary Show: IACS Cyber Incident Preparation
Cimation841 views
Mobile Security: 2016 Wrap-Up and 2017 Predictions by Skycure
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Skycure614 views
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2... by Kaspersky
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Kaspersky3.4K views
Tomorrow Starts Here - Security Everywhere by Cisco Canada
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
Cisco Canada2.3K views
8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team by BGA Cyber Security
8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team
8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av... by Cristian Garcia G.
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Cristian Garcia G.222 views
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting by CrowdStrike
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond AlertingProactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
CrowdStrike2.5K views
Debunking the Hacker Hype: The Reality of Widespread Blackouts by Dragos, Inc.
Debunking the Hacker Hype: The Reality of Widespread BlackoutsDebunking the Hacker Hype: The Reality of Widespread Blackouts
Debunking the Hacker Hype: The Reality of Widespread Blackouts
Dragos, Inc.985 views
How Aetna Mitigated 701 Malware Infections on Mobile Devices by Skycure
How Aetna Mitigated 701 Malware Infections on Mobile DevicesHow Aetna Mitigated 701 Malware Infections on Mobile Devices
How Aetna Mitigated 701 Malware Infections on Mobile Devices
Skycure1.9K views

Similar to Talk1 esc7 muscl-dataprotection_v1_2

INTRODUCTION TO CYBER FORENSICS by
INTRODUCTION TO CYBER FORENSICSINTRODUCTION TO CYBER FORENSICS
INTRODUCTION TO CYBER FORENSICSSylvain Martinez
1.1K views18 slides
Zymr Cybersecurity by
Zymr Cybersecurity Zymr Cybersecurity
Zymr Cybersecurity Zymr Cloud
256 views15 slides
Cyber Security Services & Solutions - Zymr by
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrZYMR, INC.
218 views15 slides
Kaspersky 2017 Thailand Launch by
Kaspersky 2017 Thailand LaunchKaspersky 2017 Thailand Launch
Kaspersky 2017 Thailand LaunchWorapol Limsiriwong (Nex)
480 views17 slides
How to Build a Winning Cybersecurity Team by
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamGlobal Knowledge Training
341 views19 slides
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System by
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET Journal
5 views7 slides

Similar to Talk1 esc7 muscl-dataprotection_v1_2(20)

Zymr Cybersecurity by Zymr Cloud
Zymr Cybersecurity Zymr Cybersecurity
Zymr Cybersecurity
Zymr Cloud256 views
Cyber Security Services & Solutions - Zymr by ZYMR, INC.
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - Zymr
ZYMR, INC.218 views
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System by IRJET Journal
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET Journal5 views
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End... by Symantec
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec305 views
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docx by woodruffeloisa
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docxPROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docx
PROJECT DRAFTINTRODUCTIONINTRODUCE COMPANY – WHAT IS THE COM.docx
woodruffeloisa3 views
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los... by EC-Council
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
EC-Council308 views
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren... by Symantec
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec221 views
Law Firm & Legal Department Security & Practice In The Real World by Richard Harbridge
Law Firm & Legal Department Security & Practice In The Real WorldLaw Firm & Legal Department Security & Practice In The Real World
Law Firm & Legal Department Security & Practice In The Real World
Richard Harbridge529 views
A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu... by Symbiosis Group
A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...
A New Technical and Practical Approach on Securing Cyberspace and Cloud Compu...
Symbiosis Group469 views
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle... by JSFestUA
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JS Fest 2019. Анастасия Войтова. "Defense in depth": trench warfare principle...
JSFestUA312 views
Behind the Curtain: Exposing Advanced Threats by Cisco Canada
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
Cisco Canada1.1K views
Application Of A Penetration Testing Against `` My House... by Brittney Simmons
Application Of A Penetration Testing Against `` My House...Application Of A Penetration Testing Against `` My House...
Application Of A Penetration Testing Against `` My House...
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr... by AIIM International
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
AIIM International242 views
Cloud Security - Idealware by Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - Idealware
Idealware353 views

More from Sylvain Martinez

INTRODUCTION TO CRYPTOGRAPHY by
INTRODUCTION TO CRYPTOGRAPHYINTRODUCTION TO CRYPTOGRAPHY
INTRODUCTION TO CRYPTOGRAPHYSylvain Martinez
1.2K views21 slides
PHISHING PROTECTION by
PHISHING PROTECTIONPHISHING PROTECTION
PHISHING PROTECTIONSylvain Martinez
2.3K views30 slides
IOT Security by
IOT SecurityIOT Security
IOT SecuritySylvain Martinez
893 views27 slides
ARE YOU RED TEAM READY? by
ARE YOU RED TEAM READY?ARE YOU RED TEAM READY?
ARE YOU RED TEAM READY?Sylvain Martinez
255 views24 slides
GDPR SECURITY ISSUES by
GDPR SECURITY ISSUESGDPR SECURITY ISSUES
GDPR SECURITY ISSUESSylvain Martinez
180 views9 slides
Risk on Crypto Currencies by
Risk on Crypto CurrenciesRisk on Crypto Currencies
Risk on Crypto CurrenciesSylvain Martinez
660 views15 slides

Recently uploaded

Special_edition_innovator_2023.pdf by
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdfWillDavies22
18 views6 slides
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... by
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc
72 views29 slides
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Safe Software
317 views86 slides
Zero to Automated in Under a Year by
Zero to Automated in Under a YearZero to Automated in Under a Year
Zero to Automated in Under a YearNetwork Automation Forum
22 views23 slides
PRODUCT LISTING.pptx by
PRODUCT LISTING.pptxPRODUCT LISTING.pptx
PRODUCT LISTING.pptxangelicacueva6
18 views1 slide
The Research Portal of Catalonia: Growing more (information) & more (services) by
The Research Portal of Catalonia: Growing more (information) & more (services)The Research Portal of Catalonia: Growing more (information) & more (services)
The Research Portal of Catalonia: Growing more (information) & more (services)CSUC - Consorci de Serveis Universitaris de Catalunya
115 views25 slides

Recently uploaded(20)

Special_edition_innovator_2023.pdf by WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2218 views
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... by TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc72 views
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software317 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson126 views
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... by Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
SAP Automation Using Bar Code and FIORI.pdf by Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
"Running students' code in isolation. The hard way", Yurii Holiuk by Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays24 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker48 views
2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe by Simone Puorto
2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe
2024: A Travel Odyssey The Role of Generative AI in the Tourism Universe
Simone Puorto13 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab23 views
The Forbidden VPN Secrets.pdf by Mariam Shaba
The Forbidden VPN Secrets.pdfThe Forbidden VPN Secrets.pdf
The Forbidden VPN Secrets.pdf
Mariam Shaba20 views

Talk1 esc7 muscl-dataprotection_v1_2

  • 1. {elysiumsecurity} PROTECTING YOUR DATA Version: 1.2a Date: 27/06/2018 Author: Sylvain Martinez Reference: ESC7-MUSCL Classification: Public cyber protection & response
  • 2. {elysiumsecurity} cyber protection & response 2 BEST PRACTICEDATA SECURITYCONTEXT • Data security scope; • Data security concept; • Data security solutions; CONTENTS Public • Data definition; • Data form ; • Data type; • Data security goals, threats and im pacts; • Data security awareness; • Safe behaviours; • Take away.
  • 3. {elysiumsecurity} cyber protection & response 3 BEST PRACTISEDATA SECURITYCONTEXT DATA DEFINITION Public 0 1 0 0 0 1 1 1 0 1 0 0 0 1 0 1 0 1 ANYTHING CREATED DIGITALLY "transmittable and storable computer information" - 1946 Picture from PIXABAY
  • 4. {elysiumsecurity} cyber protection & response 4 BEST PRACTISEDATA SECURITYCONTEXT DATA FORM Public Icons from the Noun Project unless stated otherwise
  • 5. {elysiumsecurity} cyber protection & response 5 BEST PRACTISEDATA SECURITYCONTEXT DATA TYPE Public
  • 6. {elysiumsecurity} cyber protection & response 6 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY GOALS, THREATS & IMPACTS Public CONFIDENTIALITY C INTEGRITY A AVAILIBILITY I SECURITY GOALS CIA vs. MPH SECURITY IMPACTS DATA LEAKAGE UNAUTHORISED MODIFICATION DESTRUCTION & LOCK MALWARE M HACKING H PHISHING P SECURITY THREATS
  • 7. {elysiumsecurity} cyber protection & response 7 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY SCOPE Public USAGE Creation Consumption Destruction Transit Transmission Remote Access COMMUNICATION Saved Sleep State Backup AT REST
  • 8. SYSTEM ENCRYPTION FILE/DATA ENCRYPTION COMMUNICATION ENCRYPTION {elysiumsecurity} cyber protection & response 8 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY CONCEPT Public 1. PROTECT DATA DATA POLICY DATA CLASSIFICATION AND ROLES ACCESS CONTROLS 2. RESTRICT DATA ACCESS LABELLING LOGS FILE VISIBILITY 3. MONITOR DATA ACTIVITY
  • 9. BITLOCKER, FIREVAULT, ENCFS, ZIP DRM, PASSWORD SAFE TLS/SSL {elysiumsecurity} cyber protection & response 9 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY SOLUTIONS Public 1. PROTECT DATA DRM PASSWORDS ACCESS RIGHTS 2. RESTRICT DATA ACCESS DLP, DRM IDS DATA INVENTORY 3. MONITOR DATA ACTIVITY
  • 10. {elysiumsecurity} cyber protection & response 10 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY AWARENESS Public FROM TOENVIRONMENT
  • 11. {elysiumsecurity} cyber protection & response 11 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY AWARENESS Public NATURE
  • 12. {elysiumsecurity} cyber protection & response 12 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY AWARENESS Public PAY ATTENTION
  • 13. {elysiumsecurity} cyber protection & response 13 BEST PRACTISEDATA SECURITYCONTEXT SAFE BEHAVIOURS Public HALF TRUTH BACKUP DATA YOU CAN SAY NO DO NOT RE-USE CREDENTIALS CHANGE DEFAULT PASSWORD THINK BEFORE YOU CLICK!
  • 14. {elysiumsecurity} cyber protection & response 14 BEST PRACTISEDATA SECURITYCONTEXT TAKE AWAY Public 1. USE STRONG PASSWORDS AND A PASSWORD SAFE 3. ENCRYPT YOUR DATA 5. ENABLE DUAL FACTOR AUTHENTICATION 2. USE UNIQUE PASSWORDS 4. BACKUP YOUR DATA 6. SCREENLOCK AUTOMATIC AND WHEN AWAY 7. BE AWARE OF YOUR ENVIRONMENT 9. NO DEFAULT PASSWORD/CONFIG 11. PAY ATTENTION TO WARNINGS 8. CUSTOM IS GOOD, STANDARD IS BETTER 10. UP TO DATE ANTI VIRUS / ENDPOINT PROTECTION 12. THINK BEFORE YOU CLICK!
  • 15. {elysiumsecurity} cyber protection & response © 2018 Elysium Security Ltd. All Rights Reserved www.elysium security.com ElysiumSecurity provides practical expertise to identify vulnerabilities, assess their risks and impact, remediate those risks, prepare and respond to incidents as well as raise security awareness through an organization. ElysiumSecurity provides high level expertise gathered through years of best practices experience in large international companies allowing us to provide advice best suited to your business operational model and priorities. ABOUT ELYSIUMSECURITY LTD. ElysiumSecurity provides a portfolio of Strategic and Tactical Services to help companies protect and respond against Cyber Security Threats. We differentiate ourselves by offering discreet, tailored and specialized engagements. Operating in Mauritius and in the United Kingdom, our boutique style approach means we can easily adapt to your business operational model and requirements to provide a personalized service that fits your working environment.