ICDL Secure Use of IT:
Key Concepts of data security; protect computer from malware and unauthorised access; types of networks; browse www and email securely; security issues of e-mail and instant messaging; back-up and restore data safely; securely dispose of data and devices.
F. Questier, Computer security, workshop for Lib@web international training program 'Management of Electronic Information and Digital Libraries', university of Antwerp, October 2015
F. Questier, Computer security, workshop for Lib@web international training program 'Management of Electronic Information and Digital Libraries', university of Antwerp, October 2015
Presented by Paul Wilson, Director General of APNIC and Chair of APrIGF Multistakeholder Steering Group at the Asia Pacific Internet Leadership Program as part of 2016 APrIGF Taipei
This is a slide show to help you troubleshoot some computer problems that you may run into. Follow the slides and steps and you could resolve any of these problems without having to sit on hold for hours.
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
It includes communication security, network security and information security.
The main problem increasing day by day is cyber crime. Crime committed using a computer and the internet to steal data or information is known as cyber crime. It is one of the disadvantages of internet. It is totally an illegal activity.
A brief introduction to Computer Security and its threats, Security Mechanism(Cryptography, Digital Signature, Firewall, IDS etc) and Security Services.
Basic definition of computer Network which will brief about types of networks, topology and difference between OSI and TCP/IP.It also elaborate to guided and Unguided media.
Presented by Paul Wilson, Director General of APNIC and Chair of APrIGF Multistakeholder Steering Group at the Asia Pacific Internet Leadership Program as part of 2016 APrIGF Taipei
This is a slide show to help you troubleshoot some computer problems that you may run into. Follow the slides and steps and you could resolve any of these problems without having to sit on hold for hours.
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
It includes communication security, network security and information security.
The main problem increasing day by day is cyber crime. Crime committed using a computer and the internet to steal data or information is known as cyber crime. It is one of the disadvantages of internet. It is totally an illegal activity.
A brief introduction to Computer Security and its threats, Security Mechanism(Cryptography, Digital Signature, Firewall, IDS etc) and Security Services.
Basic definition of computer Network which will brief about types of networks, topology and difference between OSI and TCP/IP.It also elaborate to guided and Unguided media.
Can you tell if your computer has been compromised?
Cyber Security is a practice which intends to protect computers, networks, programs and data from unintended or unauthorized access, change or destruction
More than 50% of the world's population is actively connected to the internet.
Cyber Security is becoming a fundamental requirement for every business organization worldwide. We are all susceptible to this new frontier of crime and it is our responsibility to be prepared.
EverSec + Cyphort: Big Trends in CybersecurityCyphort
Advanced threats are changing so often it is getting harder and harder to keep up! In addition to new attacks, hackers are reinventing older ones, making it even more difficult to detect. In this webinar, we will discuss at a high-level some of biggest cybersecurity threats happening right now, including:
--The Resurgence of Ransomware - Locky and other new cryptolockers
--Malvertising, oh My! - No website is safe from unknowingly spreading malware to visitors
--I have RATs - How to defend against Remote Access Trojans stealing your data
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension Inc.
Duwayne Watson, a Cisco specialist from Ingram Micro, showcases various Data Security and Protection solutions such as: AMP, Umbrella, and CloudLock. These solutions can help your business remain compliant with PIPEDA legislation.
Crimes that use computer networks or devices to advance other ends include: Fraud and identity theft (although this increasingly uses malware, hacking or phishing, making it an example of both "computer as target" and "computer as tool" crime) Information warfare. Phishing scams.
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
IT security, hackers,IT security and risks and safe guards, password, how to create password, bio-metric authentication , virus , antivirus software ,how to safe a devices from virus.types of viruses
Impacts of spoofing- why it’s a serious cybersecurity concerndeorwine infotech
In this article, I will examine several spoofing attack types, their possible effects, and effective measures to safeguard systems against spoofing operations.
ICDL ONLINE ESSENTIALS DIAGNOSTIC TEST QUESTIONS (86Q).
Understand essential concepts and skills relating to web browsing, effective information search, online communication and e-mail.
* Understand web browsing and online security concepts.
* Use the web browser and manage browser settings, bookmarks, and web outputs.
* Search effectively for online information and critically evaluate web content.
* Understand key copyright and data protection issues.
* Understand concepts of online communities, communications and email.
* Send, receive e-mails and manage email settings.
* Organise and search emails and use calendars.
ECDL/ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation Slides. This module requires candidates to demonstrate knowledge and competence in using the common functions of a personal computer and its operating system. Among other tasks, candidates will learn to operate effectively within the desktop environment and how to manage and organise files and directories/folders.
On completion of this module each candidate will be able to:
Use the main features of the operating system including adjusting the main computer settings and using built-in help features
Operate effectively around the computer desktop and work effectively in a graphical user environment
Know about the main concepts of file management and be able to efficiently organise files and folders so that they are easy to identify and find
Use utility software to compress and extract large files and use anti-virus software to protect against computer viruses
Demonstrate the ability to use simple text editing and print tools available within the operating system
ECDL / ICDL Advanced Excel 2010 Tutorial - AM4 is a high level certification programme which presents candidates with the opportunity to bring their spreadsheet skills to an expert level. Individuals with ECDL / ICDL Advanced Spreadsheets certified skills can:
Produce higher quality information
Pinpoint key information quicker and more easily
Provide more sharply-defined analysis
Produce more sophisticated reports
Use advanced editing, data handling, functions and analysis features
Use macros within the spreadsheets application
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...Michael Lew
ECDL/ICDL Module 1 - Concepts of ICT - Presentation Slides.
This module enables candidates to gain an understanding of the different parts of a computer, as well as some of the key concepts of Information and Communication Technology (ICT), such as those relating to networks and security.
On completion of this module each candidate will:
Understand what hardware is, know about factors that affect computer performance and know about peripheral devices
Understand what software is and give examples of common applications software and operating system software
Understand how information networks are used within computing, and be aware of the different options to connect to the Internet
Understand what Information and Communication Technology (ICT) is and give examples of its practical applications in everyday life
Understand health and safety and environmental issues in relation to using computers
Recognise important security issues associated with using computers
Recognise important legal issues in relation to copyright and data protection associated with using computers
ICDL / ECDL Modules - Concepts of ICT enables candidates to gain an understanding of the different parts of a computer, as well as some of the key concepts of Information and Communication Technology (ICT), such as those relating to networks and security.
Module 7 - Web Browsing and Communication
The first section on Web Browsing requires candidates to understand some of the concepts and terms associated with using the Internet, and to appreciate some of the security considerations. In the second section, Communication, candidates will learn to understand some of the concepts of electronic mail (e-mail), and gain the ability to use email software to send and receive messages, and to attach files to mail messages.
The first section, Web Browsing, enables candidates to learn about the Internet and to use a web browsing application. On completion of the Web Browsing section each candidate will be able to:
• Understand what the Internet is and common terms associated with it. Be aware of some security considerations when using the Internet
• Accomplish everyday web browsing tasks including changing browser settings
• Search for information and complete and submit web-based forms
• Save web pages and download files from the web. Copy web content into a document
The second section, Communication, enables candidates to understand some of the concepts of electronic mail (e-mail) and know about other communication options. On completion of the Communication section each candidate will be able to:
• Understand what e-mail is and know some advantages and disadvantages of its use. Be aware of other communication options
• Be aware of network etiquette and security considerations when using e-mail
• Create, spell check and send e-mail. Reply to and forward e-mail, handle file attachments and print an e-mail
• Be aware of ways to enhance productivity when working with e-mail software. Organise and manage e-mail
Module 6 - Presentation
This module enables candidates to demonstrate competence in using presentation tools on a computer. Candidates will be able to accomplish tasks such as creating, formatting, modifying and preparing presentations using different slide layouts for display and printed distribution.
On completion of this module each candidate will be able to:
• Work with presentations and save them in different file formats
• Choose built-in options such as the Help function within the application to enhance productivity
• Understand different presentation views and when to use them, choose different slide layouts and designs
• Enter, edit and format text in presentations. Recognise good practice in applying unique titles to slides
• Choose, create and format charts to communicate information meaningfully
• Insert and edit pictures, images and drawn objects
• Apply animation and transition effects to presentations and check and correct presentation content before finally printing and giving presentations
Module 5 - Using Databases
This module enables candidates to understand some of the main concepts of databases and demonstrate the ability to use a database application. This includes creating and modifying tables, queries, forms and reports, and preparing outputs ready for distribution, as well as learning to relate tables and to retrieve and manipulate information from a database by using query and sort tools.
On completion of this module each candidate will be able to:
• Understand what a database is and how it is organised and operated
• Create a simple database and view the database content in various modes
• Create a table, define and modify fields and their properties; enter and edit data in a table
• Sort and filter a table or form; create, modify and run queries to retrieve specific information from a database
• Understand what a form is and create a form to enter, modify and delete records and data in records
• Create routine reports and prepare outputs ready for distribution
Module 4 - Spreadsheets
This module enables candidates to understand the concept of spreadsheets and to demonstrate the ability to use a spreadsheet application. Candidates will understand and be able to accomplish tasks associated with developing, formatting, modifying and using a spreadsheet, in addition to using standard formulas and functions, and demonstrate competence in creating and formatting graphs or charts.
On completion of this module each candidate will be able to:
• Work with spreadsheets and save them in different file formats
• Choose built-in options such as the Help function within the application to enhance productivity
• Enter data into cells and use good practice in creating lists. Select, sort and copy, move and delete data
• Edit rows and columns in a worksheet. Copy, move, delete and appropriately rename worksheets
• Create mathematical and logical formulas using standard spreadsheet functions. Use good practice in formula creation and recognise error values in formulas
• Format numbers and text content in a spreadsheet
• Choose, create and format charts to communicate information meaningfully
• Adjust spreadsheet page settings and check and correct spreadsheet content before finally printing spreadsheets
Module 3 - Word Processing
This module enables candidates to demonstrate the ability to use a word processing application to accomplish everyday tasks associated with creating, formatting and finishing small-sized word processing documents such as letters and other everyday documents.
Candidates will be able to duplicate and move text within and between documents. They gain competence in using some of the features associated with word processing applications such as creating standard tables, using pictures and images within a document, and using mail merge tools.
On completion of this module each candidate will be able to:
• Work with documents and save them in different file formats
• Choose built-in options such as the Help function to enhance productivity
• Create and edit small-sized word processing documents that will be ready to share and distribute
• Apply different formats to documents to enhance them before distribution and recognise good practice in choosing the appropriate formatting options
• Insert tables, images and drawn objects into documents
• Prepare documents for mail merge operations
• Adjust document page settings and check and correct spelling before finally printing documents
Understanding User Behavior with Google Analytics.pdfSEO Article Boost
Unlocking the full potential of Google Analytics is crucial for understanding and optimizing your website’s performance. This guide dives deep into the essential aspects of Google Analytics, from analyzing traffic sources to understanding user demographics and tracking user engagement.
Traffic Sources Analysis:
Discover where your website traffic originates. By examining the Acquisition section, you can identify whether visitors come from organic search, paid campaigns, direct visits, social media, or referral links. This knowledge helps in refining marketing strategies and optimizing resource allocation.
User Demographics Insights:
Gain a comprehensive view of your audience by exploring demographic data in the Audience section. Understand age, gender, and interests to tailor your marketing strategies effectively. Leverage this information to create personalized content and improve user engagement and conversion rates.
Tracking User Engagement:
Learn how to measure user interaction with your site through key metrics like bounce rate, average session duration, and pages per session. Enhance user experience by analyzing engagement metrics and implementing strategies to keep visitors engaged.
Conversion Rate Optimization:
Understand the importance of conversion rates and how to track them using Google Analytics. Set up Goals, analyze conversion funnels, segment your audience, and employ A/B testing to optimize your website for higher conversions. Utilize ecommerce tracking and multi-channel funnels for a detailed view of your sales performance and marketing channel contributions.
Custom Reports and Dashboards:
Create custom reports and dashboards to visualize and interpret data relevant to your business goals. Use advanced filters, segments, and visualization options to gain deeper insights. Incorporate custom dimensions and metrics for tailored data analysis. Integrate external data sources to enrich your analytics and make well-informed decisions.
This guide is designed to help you harness the power of Google Analytics for making data-driven decisions that enhance website performance and achieve your digital marketing objectives. Whether you are looking to improve SEO, refine your social media strategy, or boost conversion rates, understanding and utilizing Google Analytics is essential for your success.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfFlorence Consulting
Quattordicesimo Meetup di Milano, tenutosi a Milano il 23 Maggio 2024 dalle ore 17:00 alle ore 18:30 in presenza e da remoto.
Abbiamo parlato di come Axpo Italia S.p.A. ha ridotto il technical debt migrando le proprie APIs da Mule 3.9 a Mule 4.4 passando anche da on-premises a CloudHub 1.0.
Italy Agriculture Equipment Market Outlook to 2027harveenkaur52
Agriculture and Animal Care
Ken Research has an expertise in Agriculture and Animal Care sector and offer vast collection of information related to all major aspects such as Agriculture equipment, Crop Protection, Seed, Agriculture Chemical, Fertilizers, Protected Cultivators, Palm Oil, Hybrid Seed, Animal Feed additives and many more.
Our continuous study and findings in agriculture sector provide better insights to companies dealing with related product and services, government and agriculture associations, researchers and students to well understand the present and expected scenario.
Our Animal care category provides solutions on Animal Healthcare and related products and services, including, animal feed additives, vaccination
1. Secure Use of IT
1
European Computer Driving Licence
9/26/2017
2. 2
Please check the spelling of your name (in accordance with
NRIC or Passport)
Please set mobiles to silent
No food and drinks (except bottle drinks with CAP)
Training materials
Washroom and emergency exits location
AM Tea break: 10 – 10:15 am (15 minutes)
Lunch break: 12-1pm (1 hour)
PM Tea break: 3 – 3.15pm (15 minutes)
Please scan your thumb drives for viruses
Points to Note
9/26/2017
3. 3
WSQ is a national credentials system developed and
managed by Singapore Workforce Development Agency (WDA)
Aim to train, develop, assess and recognise adult workers for
competencies that companies need of their employees
What is ES WSQ
9/26/2017
4. 4
At end of lesson, you are required to take a summative
assessment using the online tools of International Computer
Driving Test (ICDL)
To be assessed as competent you must attain:
Minimum 75% attendance
Minimum 75% pass for ICDL Test
Assessment
9/26/2017
5. 5
Secure Use of IT
Security Concepts
Malware
Network Security
Access Controls
Secure Web Use
Communications
Secure Data Management
Course Outline
9/26/2017
6. Security Concepts
1.1 Data Threats
Common Terms
o What is Data?
o What is Information?
o Cybercrime
o Hacking
Cloud Computing
o What is Cloud Computing?
o Vulnerabilities
• Session Hijacking
• Service Reliability
• Reliance on the Internet
o Threats
• Data Control
• Denial of Service
• Potential Loss of Privacy
• Malicious Insiders
• Loss of Data
69/26/2017
7. Security Concepts
1.2 Value of Information
Basic Characteristics
o Confidentiality
o Integrity
o Availability
Protecting Personal Information
o Personal Privacy, Data theft
Protecting Commercial Information
o Financial Statements, Customers Records
o Trade Secrets, New Products & Patents
Data Privacy or Protection
o Data Protection Legislation
Data Subjects and Data Controllers
ICT Policies
79/26/2017
8. Security Concepts
1.3 Personal Security
Social Engineering
o Information Gathering (Illegally obtain sensitive data)
o Fraud (Faking identity to obtain confidential information)
o Computer System Access (Infiltrate 3rd Party Computer Systems)
Methods of Social Engineering
o Phone Calls (Impersonating Person)
o Phishing (Fraud Email to Fraud Website)
o Shoulder Surfing (Looking Over Shoulder)
Identity Thefts and Its Implications
Methods of Identity Theft
o Information Driving (Look in Trash Bins for
Credit Card Statements)
o Skimming (Device attached to ATM to capture Victim's Cards)
o Pretexting (Inventing Scenario to engage Victim)
89/26/2017
9. Security Concepts
1.4 File Security
Enabling/Disabling Macro Security Settings
Setting File Passwords
Encrypt a Folder or Drive
Advantages of Encryption
o Ensure Confidentiality of Data
o Prevents Unauthorised Person From Opening
and Reading Data
o Ensure Data Integrity and Prevent Unauthorised
Alteration of Data
o Verify Author of Document
99/26/2017
10. Security Concepts
1.4 File Security
Limitation of Encryption
o Cannot recover data if you forget your password
o Easy to crack password for older version of Words Document and Zip
archive
o Attract attention for encrypted files
o Cannot prevent deletion of data
109/26/2017
11. Security Concepts
1.5 Review Exercise
1. The process of intentionally accessing a computer without
authorisation or exceeding authorised access is known as:
c. Hacking
2. Which of the following is not a basic characteristic of
information security?
b. Locality
3. Which of the following is an advantage of encryption?
b. Ensures data integrity
4. Which one of the following terms describe the
process of someone monitoring you keying in
your ATM pin with malicious intent?
a. Shoulder surfing
119/26/2017
12. MALWARE
2.1 Types of Malware
Definition of Malware
o Malware is malicious software designed to install and harm your computer
Types of Infectious Malware
o Viruses
o Worms (WannaCry Ransomware)
o Trojan horses (pretends as harmless program that
collect you login info and password
o Rootkits
o Backdoor
Types of Data Thefts
o Adware
o Spyware
o Botnet
o Keylogger
o Dialler
129/26/2017
13. MALWARE
2.2 Protection
Understanding Anti-Virus Software
o Identify and eliminate malware by scanning files in your computer
Limitations
o Anti-virus software features
o Zero-day exploits
o Vulnerabilities
Using an Anti-Virus Software
o Scanning
o Scanning Specific Drives
o Scheduling Scans
Quarantine Files
Updating Anti-Virus Software
139/26/2017
14. MALWARE
2.3 Review Exercise
1. __________ is created and distributed for malicious purposes:
a. Malware
2. Which of the following is not a characteristic of spyware?
d. Call numbers without consent
3. A network of infected computers used to distribute malware is
known as:
b. Botnet
4. Which one of the following options is not a common option
when anti-virus software detects an infected file?
c. Open
5. Match the malware type on the left with the
description on the right?
149/26/2017
15. Network Security
3.1 Networks And Connections
Common Network Types
o LAN (Local Area Network)
o WAN (Wide Area Network)
o WLAN (Wireless Local Area Network)
o VPN (Virtual Private Network)
Security Implications of Connecting to a Network
o Malware
o Unauthorised Data Access, Privacy
Roles of the Network Administrator
Functions of Firewall
Limitation of Firewall
o Viruses
o Attacks
o Monitoring
159/26/2017
16. Network Security
3.2 Wireless Security
Potential Risks of Using Unprotected Wireless Network
o Eavesdroppers
o Network Hijacking
o Man in the Middle
Types of Wireless Security
o Wired Equivalent Privacy (WEP)
o Wi-Fi Protected Access (WPA)
o Media Access Control (MAC) Address Filtering)
o Service Set Identifier (SSID) Hiding
Using Personal Hotspots
Enabling/Disabling a Personal Hotspot (Smartphone)
169/26/2017
17. Network Security
3.3 Review Exercise
1. Which of the following is not a type of network?
b. WAP
2. Which of the following is not a feature of a firewall?
a. Encrypts information
3. List 2 security implications of connecting to a network.
Malware
Unauthorised data access
Privacy
4. In wireless security, WPA is:
d. Wi-Fi Protected Access
179/26/2017
18. Access Controls
4.1 Methods
Preventing Unauthorised Data Access
Passwords
PIN (Personal Identification Number)
Encryption
Multi-factor authentication
One-Time Password
Network Accounts
Biometric Security Techniques
o Fingerprint Scanning
o Hand Geometry
o Facial Recognition
o Voice
189/26/2017
19. Access Controls
4.2 Password Management
Good Password Policies:
o Complex Password at least 8-12 Characters, include Upper & Lowercase,
Numbers and Special Characters
o Avoids Words Found in Dictionary
o Change Passwords Regularly
o Avoid Passwords that include your Name, Birthdate and Spouse Name
o Never Use Password such as “admin”, “root” or “password”
o Avoid Writing Your Password on Sticky Notes
o Do Not Use Same Password for Different Services
o Do Not Share Your Password with Anyone
Password Management Software:
o Dashlane
o LastPass
o KeePass
199/26/2017
20. Access Controls
4.3 Review Exercise
1. Which of the following is not a type of authentication?
d. Something I believe
2. When data has been encrypted, what does the recipient need
to read the data?
b. A key.
3. Which of the following is not a biometric security method?
c. One time password
4. Go to the following web page to test how secure your
password is:
http://howsecureismypassword.net/
209/26/2017
21. Secure Web Use
5.1 Browser Settings
Setting AutoComplete Options
Clearing Private Data from Browser:
o Temporary Internet Files
o Cookies
o A History of the Websites You’ve Visited
o Information that You have Entered into
Websites or The Address Bar
o Saved Web Passwords
219/26/2017
22. Secure Web Use
5.2 Secure Browsing
Measures to Review a Website’s Safety:
o Content Quality and Currency
o Valid URL
o Company or Owner Information
o Check for Security Certificate and Validate Domain Owner
Pharming
o Attacker targets DNS Service and changes IP Address of a Website.
o User Types the Website Address in Web Browser.
o User’s Computer Queries DNS Server for IP Address of Website.
o Because DNS Server has been ‘poisoned’ by the Attacker,
it returns the IP Address of the Fake Website to User’s
Computer.
o User has now been tricked into Visiting the Fake Website.
Content-Control Software
o Client-side filters, Browser-based filters, Content-limited
(or filtered) ISPs
o Search-engines filters
229/26/2017
23. Secure Web Use
5.3 Review Exercise
1. How do you identify a secure web site?
https:// and Secured Lock Icon
Check for Valid URL
Check for Company or Owner Information
Check Security Certificate and Validate Domain Owner
2. Open your browser and delete all temporary internet files.
b. In Internet Explorer, Click “Tools” -> “Delete Browsing History”
3. Go to the Web of Trust website at http://www.mywot.com/ and check
the reputation of the following websites:
c. www.amazon.com
d. Goldenpalace.com
e. Whitehouse.com
239/26/2017
24. Communications
6.1 E-Mails
Encrypting and Decrypting E-Mail
Digital Signature
Receiving Fraudulent and Unsolicited E-mail
Phishing Attack:
o Planning
o Setup
o Attack
o Collection
o Identify Theft and Fraud
E-mail and Malware
249/26/2017
29. Communications
6.2 Social Networking
Potential Dangers:
o Cyber Bullying
o Cyber Grooming
o Misleading or Dangerous Information
o False Identities
o Fraudulent Links or Messages
Sharing on Social Networks
Privacy Setting
299/26/2017
30. Communications
6.3 VoIP and Instant Messaging
Security Considerations:
o Malware
o Backdoor Access
o Access to Files
o Eavesdropping
Strategies to Ensure Confidentiality when
using IM and VoIP:
o Encryption
o Non-disclosure of important details
o Restrict files sharing
309/26/2017
31. Communications
6.4 Mobile
Risks of Using Mobile Apps from Unofficial Source:
o Mobile Malware
o Apps not fully tested and quality not approved.
Slow down you Mobile Device and other apps.
Result in Device Instability.
o Apps may also gain permission to access your
personal data such as Contacts, Images and Location.
Emergency/Precautionary Measures if
You Mobile Devices is Lost/Stolen:
o Remote Disable
o Remote Wipe
o Locate Device
Emergency Features (Android)
319/26/2017
32. Communications
6.5 Review Exercise
1. An e-mail is sent out to mass recipients asking them to verify
their bank account details. This is an example of:
b. Phishing
2. Which one of the following details is considered unsafe to
share on a social networking site?
d. Home address
3. The process of re-directing users to a different website without
their knowledge is knowing as:
c. Pharming
4. A secure website can be identified by the
web address if it begins with:
b. https
329/26/2017
33. Communications
6.5 Review Exercise
5. Consider the following questions:
a. What was your favourite holiday destination?
b. What is the name of your primary school?
c. What is my favourite pet’s name?
What would the potential security threats be by answering the
questions above?
339/26/2017
34. Secure Data Management
7.1 Secure and Back Up Data
Measures to Enhance Physical Security of Devices:
o Do Not Leave Unsecured Computers or Devices Unattended
o Record Details and Location of Items and Equipment
o Use Cable Locks to Secure Computers and Devices
o Works Areas Can Be Secured Using Access Control
Measures such as Swipe Cards or Biometric Scanning
Backup Procedure:
o Schedule
o Compression
o Location
o Regularity
Backing Up Data
Cloud Back Up
349/26/2017
35. Secure Data Management
7.2 Secure Deletion and Destruction
Common Methods of Permanently Destroying Data:
o Shredding
o Degaussing
o Drive/Media Destruction
Specific Destruction Techniques:
o Physically Breaking Media Apart, by Grinding, Shredding, etc
o Incineration
o Phase Transition (Liquefaction or Vaporisation of a Solid Disk)
o Application of Corrosive Chemicals, such as Acids, to Recording Surfaces.
Using Data Destruction Utilities
FREE Programs That Perform Secure Over-Writes:
o DBAN http://www.dban.org
o Eraser http://eraser.heidi.ie
359/26/2017
36. Secure Data Management
7.2 Secure Deletion and Destruction
Shredding Hard Drives
369/26/2017
37. Secure Data Management
7.2 Secure Deletion and Destruction
Shredding Optical Disks
379/26/2017
38. Secure Data Management
7.2 Secure Deletion and Destruction
Degaussing Hard Drives
389/26/2017
39. Secure Data Management
7.3 Review Exercise
1. Which of the following is not a feature of a backup procedure?
c. Volume
2. Which one of the following is not used as a backup method?
b. Random access memory
3. Residual traces of deleted data that still remains is known as:
b. Data remanence
399/26/2017