2. {elysiumsecurity}
cyber protection & response
2
BEST PRACTICEDATA SECURITYCONTEXT
• Data security scope;
• Data security concept;
• Data security
solutions;
CONTENTS
Public
• Data definition;
• Data form ;
• Data type;
• Data security goals,
threats and im pacts;
• Data security
awareness;
• Safe behaviours;
• Take away.
3. {elysiumsecurity}
cyber protection & response
3
BEST PRACTISEDATA SECURITYCONTEXT
DATA DEFINITION
Public
0 1 0 0 0 1 1 1 0 1 0 0 0 1 0 1 0 1
ANYTHING CREATED DIGITALLY
"transmittable and storable
computer information" - 1946
Picture from PIXABAY
4. {elysiumsecurity}
cyber protection & response
4
BEST PRACTISEDATA SECURITYCONTEXT
DATA FORM
Public Icons from the Noun Project unless stated otherwise
6. {elysiumsecurity}
cyber protection & response
6
BEST PRACTISEDATA SECURITYCONTEXT
DATA SECURITY GOALS, THREATS & IMPACTS
Public
CONFIDENTIALITY
C
INTEGRITY
A
AVAILIBILITY
I
SECURITY
GOALS
CIA vs. MPH
SECURITY
IMPACTS
DATA
LEAKAGE
UNAUTHORISED
MODIFICATION
DESTRUCTION
& LOCK
MALWARE
M
HACKING
H
PHISHING
P
SECURITY
THREATS
7. {elysiumsecurity}
cyber protection & response
7
BEST PRACTISEDATA SECURITYCONTEXT
DATA SECURITY SCOPE
Public
USAGE
Creation
Consumption
Destruction
Transit
Transmission
Remote Access
COMMUNICATION
Saved
Sleep State
Backup
AT REST
8. SYSTEM ENCRYPTION
FILE/DATA ENCRYPTION
COMMUNICATION ENCRYPTION
{elysiumsecurity}
cyber protection & response
8
BEST PRACTISEDATA SECURITYCONTEXT
DATA SECURITY CONCEPT
Public
1. PROTECT DATA
DATA POLICY
DATA CLASSIFICATION AND ROLES
ACCESS CONTROLS
2. RESTRICT DATA ACCESS
LABELLING
LOGS
FILE VISIBILITY
3. MONITOR DATA ACTIVITY
9. BITLOCKER, FIREVAULT, ENCFS, ZIP
DRM, PASSWORD SAFE
TLS/SSL
{elysiumsecurity}
cyber protection & response
9
BEST PRACTISEDATA SECURITYCONTEXT
DATA SECURITY SOLUTIONS
Public
1. PROTECT DATA
DRM
PASSWORDS
ACCESS RIGHTS
2. RESTRICT DATA ACCESS
DLP, DRM
IDS
DATA INVENTORY
3. MONITOR DATA ACTIVITY
13. {elysiumsecurity}
cyber protection & response
13
BEST PRACTISEDATA SECURITYCONTEXT
SAFE BEHAVIOURS
Public
HALF TRUTH
BACKUP DATA
YOU CAN SAY NO
DO NOT RE-USE CREDENTIALS
CHANGE DEFAULT PASSWORD
THINK BEFORE YOU CLICK!
14. {elysiumsecurity}
cyber protection & response
14
BEST PRACTISEDATA SECURITYCONTEXT
TAKE AWAY
Public
1. USE STRONG PASSWORDS AND A
PASSWORD SAFE
3. ENCRYPT YOUR DATA
5. ENABLE DUAL FACTOR
AUTHENTICATION
2. USE UNIQUE PASSWORDS
4. BACKUP YOUR DATA
6. SCREENLOCK AUTOMATIC AND WHEN
AWAY
7. BE AWARE OF YOUR ENVIRONMENT
9. NO DEFAULT PASSWORD/CONFIG
11. PAY ATTENTION TO WARNINGS
8. CUSTOM IS GOOD, STANDARD IS
BETTER
10. UP TO DATE ANTI VIRUS / ENDPOINT
PROTECTION
12. THINK BEFORE YOU CLICK!