SlideShare a Scribd company logo
1 of 13
CIARAN COMERFORD
I.T. Security – Topic 6 – Securing and Backing Up Data
TOPICS TO BE COVERED
 Securing and Backing Up Data
 Secure Destruction
PHYSICAL SECURITY OF DEVICES 1
 Log Equipment Location
 Use Equipment Sheets
 Mark all location as well as specifying value
 Cable Locks
 Lock down all computer bases and laptops to
furniture and the floor
 Lock all monitors, printers, routers
PHYSICAL SECURITY OF DEVICES 2
 Access Control
 Have a security door lock that needs a code and
key fob to open it
 Regularly update the software on the access
code reader
DATA BACKUPS 1
 Data backup procedure
 Essential to prevent loss of the following:
 Data
 Financial Records
 Bookmarks/Web History
 Backups also important to ensure:
 Continuity of business
 No disruption to customers
FEATURES OF A BACKUP SCHEDULE 1
 Regularity/Frequency
 Should be mixture of frequencies i.e.
 Weekly, Fortnightly, Monthly, Quarterly and Yearly
 Schedule:
 1 Backup nightly after close of business
 1 Weekly backup on a Sunday
 1 Fortnightly every second Sunday
 1 Monthly last Sunday of every month
 1 Quarterly last Sunday of every quarter
FEATURES OF A BACKUP SCHEDULE 2
 Backup Methods
 Should be a mixture of 2 methods
 Recommended:
 Online – in case of fault with tape backup as well as a
natural disaster such as a fire
 Tape – backups should be backed up to high storage
capacity tapes using the Symantec Backup Exec
Software
FEATURES OF A BACKUP SCHEDULE 3
 Location: Mixture in case of natural disaster
 Online – stored online by an external
provider
 On-Site – some tapes are stored in a
fireproof safe
 Off-Site – other tapes are stored by an
external company off-site
BACKUP DATA
1. Launch Symantec Backup Exec
2. Click Backup and Restore
3. Select Backup
4. Choose Backup Location
5. Choose what data to Backup
6. Choose the Back-Up Schedule
7. Save Settings and Backup
RESTORE AND VALIDATE BACKED UP DATA
 Launch Backup Exec
 Click Restore My Files
 Browse to the Folder where the Backup File
is stored you want to retrieve
 Click Restore my File
 Click Next
 Choose to Restore in the original location or
in a different location
REASONS FOR PERMANENTLY DELETING DATA
 Prevent Identity Theft by deleting financial
records so can’t be retrieved by crackers
 Secret, private and company information that
should never be retrieved by anyone else
 In case of selling or donating the hard drive or
entire computer and the information shouldn’t
be accessible by anyone
 To comply with data protection by storing
information only for the required time and to re-
assure clients their information will be protected
DELETING DATA V.S. DESTROYING DATA
 Deleting Data – if you delete something and
even empty the recycle bin there is still a
residual record left on the computer
 This can be retrieved using hard-drive
restoring software
 Destroying data by using shredding or
degaussing is a permanent method
 The data is unable to be retrieved
PERMANENTLY DESTROYING DATA
 Few methods: Shredding, Degaussing and Data
Destruction Utilities
 Shredding – shredding disks like CD/DVD
 Hard/USB Drive destruction – physical
destruction of a drive
 Degaussing – using magnetism on a disk in
random patterns rendering previous data
unrecoverable
 Data Utilities – software utility to carry out
destruction of data

More Related Content

Similar to It security backing up data

Compliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatesCompliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatese-Safe Systems
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoverySejahtera Affif
 
Standard Grade Administration - Storage and Retrieval of Information
Standard Grade Administration - Storage and Retrieval of InformationStandard Grade Administration - Storage and Retrieval of Information
Standard Grade Administration - Storage and Retrieval of InformationMusselburgh Grammar School
 
10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them 10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them Donald E. Hester
 
Data recovery power point
Data recovery power pointData recovery power point
Data recovery power pointtutannandi
 
Data backup and recovery process
Data backup and recovery processData backup and recovery process
Data backup and recovery processJitendraKumarKar2
 
Power Point example for module 3 assignment
Power Point example for module 3 assignmentPower Point example for module 3 assignment
Power Point example for module 3 assignmentnaterator
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesSpiceworks
 
Acroknight the Caribbean Data Backup solution presentation October 2013
Acroknight the Caribbean Data Backup solution presentation October 2013Acroknight the Caribbean Data Backup solution presentation October 2013
Acroknight the Caribbean Data Backup solution presentation October 2013Steven Williams
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryAlireza Ghahrood
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsgppcpa
 
ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4Irsandi Hasan
 
Never Clueless PC and server backups
Never Clueless PC and server backupsNever Clueless PC and server backups
Never Clueless PC and server backupsJohn Rood
 
Securely Erase your Device
Securely Erase your DeviceSecurely Erase your Device
Securely Erase your DeviceErnest Staats
 
Ocssco database policy document
Ocssco database policy documentOcssco database policy document
Ocssco database policy documentEndale Mintesinot
 
Not having a good backup
Not having a good backupNot having a good backup
Not having a good backupRita Crawford
 

Similar to It security backing up data (20)

Compliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatesCompliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporates
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recovery
 
Standard Grade Administration - Storage and Retrieval of Information
Standard Grade Administration - Storage and Retrieval of InformationStandard Grade Administration - Storage and Retrieval of Information
Standard Grade Administration - Storage and Retrieval of Information
 
10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them 10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them
 
Data recovery power point
Data recovery power pointData recovery power point
Data recovery power point
 
Data backup and recovery process
Data backup and recovery processData backup and recovery process
Data backup and recovery process
 
Ch 16 system security
Ch 16 system securityCh 16 system security
Ch 16 system security
 
Power Point example for module 3 assignment
Power Point example for module 3 assignmentPower Point example for module 3 assignment
Power Point example for module 3 assignment
 
Ite v5.0 chapter4
Ite v5.0 chapter4Ite v5.0 chapter4
Ite v5.0 chapter4
 
Maintaining computer and network system
Maintaining computer and network systemMaintaining computer and network system
Maintaining computer and network system
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
 
Acroknight the Caribbean Data Backup solution presentation October 2013
Acroknight the Caribbean Data Backup solution presentation October 2013Acroknight the Caribbean Data Backup solution presentation October 2013
Acroknight the Caribbean Data Backup solution presentation October 2013
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recovery
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4
 
Never Clueless PC and server backups
Never Clueless PC and server backupsNever Clueless PC and server backups
Never Clueless PC and server backups
 
Backup strategy plan
Backup strategy planBackup strategy plan
Backup strategy plan
 
Securely Erase your Device
Securely Erase your DeviceSecurely Erase your Device
Securely Erase your Device
 
Ocssco database policy document
Ocssco database policy documentOcssco database policy document
Ocssco database policy document
 
Not having a good backup
Not having a good backupNot having a good backup
Not having a good backup
 

Recently uploaded

Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 

Recently uploaded (20)

Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 

It security backing up data

  • 1. CIARAN COMERFORD I.T. Security – Topic 6 – Securing and Backing Up Data
  • 2. TOPICS TO BE COVERED  Securing and Backing Up Data  Secure Destruction
  • 3. PHYSICAL SECURITY OF DEVICES 1  Log Equipment Location  Use Equipment Sheets  Mark all location as well as specifying value  Cable Locks  Lock down all computer bases and laptops to furniture and the floor  Lock all monitors, printers, routers
  • 4. PHYSICAL SECURITY OF DEVICES 2  Access Control  Have a security door lock that needs a code and key fob to open it  Regularly update the software on the access code reader
  • 5. DATA BACKUPS 1  Data backup procedure  Essential to prevent loss of the following:  Data  Financial Records  Bookmarks/Web History  Backups also important to ensure:  Continuity of business  No disruption to customers
  • 6. FEATURES OF A BACKUP SCHEDULE 1  Regularity/Frequency  Should be mixture of frequencies i.e.  Weekly, Fortnightly, Monthly, Quarterly and Yearly  Schedule:  1 Backup nightly after close of business  1 Weekly backup on a Sunday  1 Fortnightly every second Sunday  1 Monthly last Sunday of every month  1 Quarterly last Sunday of every quarter
  • 7. FEATURES OF A BACKUP SCHEDULE 2  Backup Methods  Should be a mixture of 2 methods  Recommended:  Online – in case of fault with tape backup as well as a natural disaster such as a fire  Tape – backups should be backed up to high storage capacity tapes using the Symantec Backup Exec Software
  • 8. FEATURES OF A BACKUP SCHEDULE 3  Location: Mixture in case of natural disaster  Online – stored online by an external provider  On-Site – some tapes are stored in a fireproof safe  Off-Site – other tapes are stored by an external company off-site
  • 9. BACKUP DATA 1. Launch Symantec Backup Exec 2. Click Backup and Restore 3. Select Backup 4. Choose Backup Location 5. Choose what data to Backup 6. Choose the Back-Up Schedule 7. Save Settings and Backup
  • 10. RESTORE AND VALIDATE BACKED UP DATA  Launch Backup Exec  Click Restore My Files  Browse to the Folder where the Backup File is stored you want to retrieve  Click Restore my File  Click Next  Choose to Restore in the original location or in a different location
  • 11. REASONS FOR PERMANENTLY DELETING DATA  Prevent Identity Theft by deleting financial records so can’t be retrieved by crackers  Secret, private and company information that should never be retrieved by anyone else  In case of selling or donating the hard drive or entire computer and the information shouldn’t be accessible by anyone  To comply with data protection by storing information only for the required time and to re- assure clients their information will be protected
  • 12. DELETING DATA V.S. DESTROYING DATA  Deleting Data – if you delete something and even empty the recycle bin there is still a residual record left on the computer  This can be retrieved using hard-drive restoring software  Destroying data by using shredding or degaussing is a permanent method  The data is unable to be retrieved
  • 13. PERMANENTLY DESTROYING DATA  Few methods: Shredding, Degaussing and Data Destruction Utilities  Shredding – shredding disks like CD/DVD  Hard/USB Drive destruction – physical destruction of a drive  Degaussing – using magnetism on a disk in random patterns rendering previous data unrecoverable  Data Utilities – software utility to carry out destruction of data