Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Talk1 esc7 muscl-dataprotection_v1_2

25 views

Published on

A look at why and how to protect your data

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Talk1 esc7 muscl-dataprotection_v1_2

  1. 1. {elysiumsecurity} PROTECTING YOUR DATA Version: 1.2a Date: 27/06/2018 Author: Sylvain Martinez Reference: ESC7-MUSCL Classification: Public cyber protection & response
  2. 2. {elysiumsecurity} cyber protection & response 2 BEST PRACTICEDATA SECURITYCONTEXT • Data security scope; • Data security concept; • Data security solutions; CONTENTS Public • Data definition; • Data form ; • Data type; • Data security goals, threats and im pacts; • Data security awareness; • Safe behaviours; • Take away.
  3. 3. {elysiumsecurity} cyber protection & response 3 BEST PRACTISEDATA SECURITYCONTEXT DATA DEFINITION Public 0 1 0 0 0 1 1 1 0 1 0 0 0 1 0 1 0 1 ANYTHING CREATED DIGITALLY "transmittable and storable computer information" - 1946 Picture from PIXABAY
  4. 4. {elysiumsecurity} cyber protection & response 4 BEST PRACTISEDATA SECURITYCONTEXT DATA FORM Public Icons from the Noun Project unless stated otherwise
  5. 5. {elysiumsecurity} cyber protection & response 5 BEST PRACTISEDATA SECURITYCONTEXT DATA TYPE Public
  6. 6. {elysiumsecurity} cyber protection & response 6 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY GOALS, THREATS & IMPACTS Public CONFIDENTIALITY C INTEGRITY A AVAILIBILITY I SECURITY GOALS CIA vs. MPH SECURITY IMPACTS DATA LEAKAGE UNAUTHORISED MODIFICATION DESTRUCTION & LOCK MALWARE M HACKING H PHISHING P SECURITY THREATS
  7. 7. {elysiumsecurity} cyber protection & response 7 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY SCOPE Public USAGE Creation Consumption Destruction Transit Transmission Remote Access COMMUNICATION Saved Sleep State Backup AT REST
  8. 8. SYSTEM ENCRYPTION FILE/DATA ENCRYPTION COMMUNICATION ENCRYPTION {elysiumsecurity} cyber protection & response 8 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY CONCEPT Public 1. PROTECT DATA DATA POLICY DATA CLASSIFICATION AND ROLES ACCESS CONTROLS 2. RESTRICT DATA ACCESS LABELLING LOGS FILE VISIBILITY 3. MONITOR DATA ACTIVITY
  9. 9. BITLOCKER, FIREVAULT, ENCFS, ZIP DRM, PASSWORD SAFE TLS/SSL {elysiumsecurity} cyber protection & response 9 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY SOLUTIONS Public 1. PROTECT DATA DRM PASSWORDS ACCESS RIGHTS 2. RESTRICT DATA ACCESS DLP, DRM IDS DATA INVENTORY 3. MONITOR DATA ACTIVITY
  10. 10. {elysiumsecurity} cyber protection & response 10 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY AWARENESS Public FROM TOENVIRONMENT
  11. 11. {elysiumsecurity} cyber protection & response 11 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY AWARENESS Public NATURE
  12. 12. {elysiumsecurity} cyber protection & response 12 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY AWARENESS Public PAY ATTENTION
  13. 13. {elysiumsecurity} cyber protection & response 13 BEST PRACTISEDATA SECURITYCONTEXT SAFE BEHAVIOURS Public HALF TRUTH BACKUP DATA YOU CAN SAY NO DO NOT RE-USE CREDENTIALS CHANGE DEFAULT PASSWORD THINK BEFORE YOU CLICK!
  14. 14. {elysiumsecurity} cyber protection & response 14 BEST PRACTISEDATA SECURITYCONTEXT TAKE AWAY Public 1. USE STRONG PASSWORDS AND A PASSWORD SAFE 3. ENCRYPT YOUR DATA 5. ENABLE DUAL FACTOR AUTHENTICATION 2. USE UNIQUE PASSWORDS 4. BACKUP YOUR DATA 6. SCREENLOCK AUTOMATIC AND WHEN AWAY 7. BE AWARE OF YOUR ENVIRONMENT 9. NO DEFAULT PASSWORD/CONFIG 11. PAY ATTENTION TO WARNINGS 8. CUSTOM IS GOOD, STANDARD IS BETTER 10. UP TO DATE ANTI VIRUS / ENDPOINT PROTECTION 12. THINK BEFORE YOU CLICK!
  15. 15. {elysiumsecurity} cyber protection & response © 2018 Elysium Security Ltd. All Rights Reserved www.elysium security.com ElysiumSecurity provides practical expertise to identify vulnerabilities, assess their risks and impact, remediate those risks, prepare and respond to incidents as well as raise security awareness through an organization. ElysiumSecurity provides high level expertise gathered through years of best practices experience in large international companies allowing us to provide advice best suited to your business operational model and priorities. ABOUT ELYSIUMSECURITY LTD. ElysiumSecurity provides a portfolio of Strategic and Tactical Services to help companies protect and respond against Cyber Security Threats. We differentiate ourselves by offering discreet, tailored and specialized engagements. Operating in Mauritius and in the United Kingdom, our boutique style approach means we can easily adapt to your business operational model and requirements to provide a personalized service that fits your working environment.

×