SlideShare a Scribd company logo
1 of 13
CIARAN COMERFORD
I.T. Security – Topic 6 – Securing and Backing Up Data
TOPICS TO BE COVERED
 Securing and Backing Up Data
 Secure Destruction
PHYSICAL SECURITY OF DEVICES 1
 Log Equipment Location
 Use Equipment Sheets
 Mark all location as well as specifying value
 Cable Locks
 Lock down all computer bases and laptops to
furniture and the floor
 Lock all monitors, printers, routers
PHYSICAL SECURITY OF DEVICES 2
 Access Control
 Have a security door lock that needs a code and
key fob to open it
 Regularly update the software on the access
code reader
DATA BACKUPS 1
 Data backup procedure
 Essential to prevent loss of the following:
 Data
 Financial Records
 Bookmarks/Web History
 Backups also important to ensure:
 Continuity of business
 No disruption to customers
FEATURES OF A BACKUP SCHEDULE 1
 Regularity/Frequency
 Should be mixture of frequencies i.e.
 Weekly, Fortnightly, Monthly, Quarterly and Yearly
 Schedule:
 1 Backup nightly after close of business
 1 Weekly backup on a Sunday
 1 Fortnightly every second Sunday
 1 Monthly last Sunday of every month
 1 Quarterly last Sunday of every quarter
FEATURES OF A BACKUP SCHEDULE 2
 Backup Methods
 Should be a mixture of 2 methods
 Recommended:
 Online – in case of fault with tape backup as well as a
natural disaster such as a fire
 Tape – backups should be backed up to high storage
capacity tapes using the Symantec Backup Exec
Software
FEATURES OF A BACKUP SCHEDULE 3
 Location: Mixture in case of natural disaster
 Online – stored online by an external
provider
 On-Site – some tapes are stored in a
fireproof safe
 Off-Site – other tapes are stored by an
external company off-site
BACKUP DATA
1. Launch Symantec Backup Exec
2. Click Backup and Restore
3. Select Backup
4. Choose Backup Location
5. Choose what data to Backup
6. Choose the Back-Up Schedule
7. Save Settings and Backup
RESTORE AND VALIDATE BACKED UP DATA
 Launch Backup Exec
 Click Restore My Files
 Browse to the Folder where the Backup File
is stored you want to retrieve
 Click Restore my File
 Click Next
 Choose to Restore in the original location or
in a different location
REASONS FOR PERMANENTLY DELETING DATA
 Prevent Identity Theft by deleting financial
records so can’t be retrieved by crackers
 Secret, private and company information that
should never be retrieved by anyone else
 In case of selling or donating the hard drive or
entire computer and the information shouldn’t
be accessible by anyone
 To comply with data protection by storing
information only for the required time and to re-
assure clients their information will be protected
DELETING DATA V.S. DESTROYING DATA
 Deleting Data – if you delete something and
even empty the recycle bin there is still a
residual record left on the computer
 This can be retrieved using hard-drive
restoring software
 Destroying data by using shredding or
degaussing is a permanent method
 The data is unable to be retrieved
PERMANENTLY DESTROYING DATA
 Few methods: Shredding, Degaussing and Data
Destruction Utilities
 Shredding – shredding disks like CD/DVD
 Hard/USB Drive destruction – physical
destruction of a drive
 Degaussing – using magnetism on a disk in
random patterns rendering previous data
unrecoverable
 Data Utilities – software utility to carry out
destruction of data

More Related Content

What's hot

InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to securityMukesh Chinta
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information securityethanBrownusa
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environmentEvan Francen
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1Tanmay Shinde
 
security and ethical challenges in information systems
security and ethical challenges in information systemssecurity and ethical challenges in information systems
security and ethical challenges in information systemshilal12
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...LeMeniz Infotech
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to securityDhani Ahmad
 
Information Security Overview
Information Security OverviewInformation Security Overview
Information Security OverviewSupriyaGaikwad28
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
 

What's hot (20)

InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Homework0703
Homework0703Homework0703
Homework0703
 
The importance of information security
The importance of information securityThe importance of information security
The importance of information security
 
Cybersecurity and data privacy
Cybersecurity and data privacyCybersecurity and data privacy
Cybersecurity and data privacy
 
IACP 2011
IACP 2011IACP 2011
IACP 2011
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Network security
Network securityNetwork security
Network security
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environment
 
ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1
 
Information security
Information securityInformation security
Information security
 
security and ethical challenges in information systems
security and ethical challenges in information systemssecurity and ethical challenges in information systems
security and ethical challenges in information systems
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...Control cloud data access privilege and anonymity with fully anonymous attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
Information Security Overview
Information Security OverviewInformation Security Overview
Information Security Overview
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
Data security
Data securityData security
Data security
 
IT security
IT securityIT security
IT security
 

Viewers also liked

Nuova ECDL - Modulo 5 - IT Security
Nuova ECDL - Modulo 5 - IT SecurityNuova ECDL - Modulo 5 - IT Security
Nuova ECDL - Modulo 5 - IT SecurityNino Lopez
 
Nuova ECDL - 7-Online collaboration
Nuova ECDL - 7-Online collaborationNuova ECDL - 7-Online collaboration
Nuova ECDL - 7-Online collaborationNino Lopez
 
ICT Security: dal passato al futuro. Abbiamo imparato a difenderci?
ICT Security: dal passato al futuro. Abbiamo imparato a difenderci?ICT Security: dal passato al futuro. Abbiamo imparato a difenderci?
ICT Security: dal passato al futuro. Abbiamo imparato a difenderci?Massimo Chirivì
 
Marca e Comunicazione
Marca e ComunicazioneMarca e Comunicazione
Marca e ComunicazioneNino Lopez
 
Online collaboration (slides quasi complete)
Online collaboration (slides quasi complete)Online collaboration (slides quasi complete)
Online collaboration (slides quasi complete)Tonio Rollo
 
Computer essential
Computer essentialComputer essential
Computer essentialMusa Bukar
 
Web marketing ecommerce
Web marketing ecommerceWeb marketing ecommerce
Web marketing ecommerceNino Lopez
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
It security backing up data
It security backing up dataIt security backing up data
It security backing up dataCiaran Comerford
 

Viewers also liked (20)

Nuova ECDL - Modulo 5 - IT Security
Nuova ECDL - Modulo 5 - IT SecurityNuova ECDL - Modulo 5 - IT Security
Nuova ECDL - Modulo 5 - IT Security
 
Nuova ECDL - 7-Online collaboration
Nuova ECDL - 7-Online collaborationNuova ECDL - 7-Online collaboration
Nuova ECDL - 7-Online collaboration
 
ICT Security: dal passato al futuro. Abbiamo imparato a difenderci?
ICT Security: dal passato al futuro. Abbiamo imparato a difenderci?ICT Security: dal passato al futuro. Abbiamo imparato a difenderci?
ICT Security: dal passato al futuro. Abbiamo imparato a difenderci?
 
Nuova ecdl 2014
Nuova ecdl 2014Nuova ecdl 2014
Nuova ecdl 2014
 
Ecdl completo
Ecdl completoEcdl completo
Ecdl completo
 
Marca e Comunicazione
Marca e ComunicazioneMarca e Comunicazione
Marca e Comunicazione
 
Online collaboration (slides quasi complete)
Online collaboration (slides quasi complete)Online collaboration (slides quasi complete)
Online collaboration (slides quasi complete)
 
Computer essential
Computer essentialComputer essential
Computer essential
 
Web marketing ecommerce
Web marketing ecommerceWeb marketing ecommerce
Web marketing ecommerce
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
It security backing up data
It security backing up dataIt security backing up data
It security backing up data
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
4business9
4business9 4business9
4business9
 
ICDL MODULE 1 Lesson 6
ICDL MODULE 1 Lesson 6ICDL MODULE 1 Lesson 6
ICDL MODULE 1 Lesson 6
 
ICDL MODULE 1 Lesson 4
ICDL MODULE 1 Lesson 4ICDL MODULE 1 Lesson 4
ICDL MODULE 1 Lesson 4
 
ICDL MODULE 1 Lesson 5
ICDL MODULE 1 Lesson 5ICDL MODULE 1 Lesson 5
ICDL MODULE 1 Lesson 5
 
ICDL MODULE 1 Lesson 8
ICDL MODULE 1 Lesson 8ICDL MODULE 1 Lesson 8
ICDL MODULE 1 Lesson 8
 
ICDL MODULE 1 Lesson 1
ICDL MODULE 1 Lesson 1ICDL MODULE 1 Lesson 1
ICDL MODULE 1 Lesson 1
 
ICDL MODULE 1 Lesson 3
ICDL MODULE 1 Lesson 3ICDL MODULE 1 Lesson 3
ICDL MODULE 1 Lesson 3
 

Similar to ECDL IT Security PowerPoint Presentation

3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of DataMISY
 
Information management
Information managementInformation management
Information managementDeepak John
 
2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recoverymrmwood
 
Data Backup and Recovery.pdf
Data Backup and Recovery.pdfData Backup and Recovery.pdf
Data Backup and Recovery.pdfAshraf Hossain
 
Compliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatesCompliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatese-Safe Systems
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoverySejahtera Affif
 
Standard Grade Administration - Storage and Retrieval of Information
Standard Grade Administration - Storage and Retrieval of InformationStandard Grade Administration - Storage and Retrieval of Information
Standard Grade Administration - Storage and Retrieval of InformationMusselburgh Grammar School
 
10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them 10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them Donald E. Hester
 
Data recovery power point
Data recovery power pointData recovery power point
Data recovery power pointtutannandi
 
Data backup and recovery process
Data backup and recovery processData backup and recovery process
Data backup and recovery processJitendraKumarKar2
 
Power Point example for module 3 assignment
Power Point example for module 3 assignmentPower Point example for module 3 assignment
Power Point example for module 3 assignmentnaterator
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesSpiceworks
 
Acroknight the Caribbean Data Backup solution presentation October 2013
Acroknight the Caribbean Data Backup solution presentation October 2013Acroknight the Caribbean Data Backup solution presentation October 2013
Acroknight the Caribbean Data Backup solution presentation October 2013Steven Williams
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryAlireza Ghahrood
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsgppcpa
 
ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4Irsandi Hasan
 
Never Clueless PC and server backups
Never Clueless PC and server backupsNever Clueless PC and server backups
Never Clueless PC and server backupsJohn Rood
 

Similar to ECDL IT Security PowerPoint Presentation (20)

3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of Data
 
Information management
Information managementInformation management
Information management
 
2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recovery
 
Data Backup and Recovery.pdf
Data Backup and Recovery.pdfData Backup and Recovery.pdf
Data Backup and Recovery.pdf
 
Compliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporatesCompliance to privacy act and mandatory data breach reporting for corporates
Compliance to privacy act and mandatory data breach reporting for corporates
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recovery
 
Standard Grade Administration - Storage and Retrieval of Information
Standard Grade Administration - Storage and Retrieval of InformationStandard Grade Administration - Storage and Retrieval of Information
Standard Grade Administration - Storage and Retrieval of Information
 
10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them 10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them
 
Data recovery power point
Data recovery power pointData recovery power point
Data recovery power point
 
Data backup and recovery process
Data backup and recovery processData backup and recovery process
Data backup and recovery process
 
Ch 16 system security
Ch 16 system securityCh 16 system security
Ch 16 system security
 
Power Point example for module 3 assignment
Power Point example for module 3 assignmentPower Point example for module 3 assignment
Power Point example for module 3 assignment
 
Ite v5.0 chapter4
Ite v5.0 chapter4Ite v5.0 chapter4
Ite v5.0 chapter4
 
Maintaining computer and network system
Maintaining computer and network systemMaintaining computer and network system
Maintaining computer and network system
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
 
Acroknight the Caribbean Data Backup solution presentation October 2013
Acroknight the Caribbean Data Backup solution presentation October 2013Acroknight the Caribbean Data Backup solution presentation October 2013
Acroknight the Caribbean Data Backup solution presentation October 2013
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recovery
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4ITE v5.0 - Chapter 4
ITE v5.0 - Chapter 4
 
Never Clueless PC and server backups
Never Clueless PC and server backupsNever Clueless PC and server backups
Never Clueless PC and server backups
 

Recently uploaded

ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 

Recently uploaded (20)

ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 

ECDL IT Security PowerPoint Presentation

  • 1. CIARAN COMERFORD I.T. Security – Topic 6 – Securing and Backing Up Data
  • 2. TOPICS TO BE COVERED  Securing and Backing Up Data  Secure Destruction
  • 3. PHYSICAL SECURITY OF DEVICES 1  Log Equipment Location  Use Equipment Sheets  Mark all location as well as specifying value  Cable Locks  Lock down all computer bases and laptops to furniture and the floor  Lock all monitors, printers, routers
  • 4. PHYSICAL SECURITY OF DEVICES 2  Access Control  Have a security door lock that needs a code and key fob to open it  Regularly update the software on the access code reader
  • 5. DATA BACKUPS 1  Data backup procedure  Essential to prevent loss of the following:  Data  Financial Records  Bookmarks/Web History  Backups also important to ensure:  Continuity of business  No disruption to customers
  • 6. FEATURES OF A BACKUP SCHEDULE 1  Regularity/Frequency  Should be mixture of frequencies i.e.  Weekly, Fortnightly, Monthly, Quarterly and Yearly  Schedule:  1 Backup nightly after close of business  1 Weekly backup on a Sunday  1 Fortnightly every second Sunday  1 Monthly last Sunday of every month  1 Quarterly last Sunday of every quarter
  • 7. FEATURES OF A BACKUP SCHEDULE 2  Backup Methods  Should be a mixture of 2 methods  Recommended:  Online – in case of fault with tape backup as well as a natural disaster such as a fire  Tape – backups should be backed up to high storage capacity tapes using the Symantec Backup Exec Software
  • 8. FEATURES OF A BACKUP SCHEDULE 3  Location: Mixture in case of natural disaster  Online – stored online by an external provider  On-Site – some tapes are stored in a fireproof safe  Off-Site – other tapes are stored by an external company off-site
  • 9. BACKUP DATA 1. Launch Symantec Backup Exec 2. Click Backup and Restore 3. Select Backup 4. Choose Backup Location 5. Choose what data to Backup 6. Choose the Back-Up Schedule 7. Save Settings and Backup
  • 10. RESTORE AND VALIDATE BACKED UP DATA  Launch Backup Exec  Click Restore My Files  Browse to the Folder where the Backup File is stored you want to retrieve  Click Restore my File  Click Next  Choose to Restore in the original location or in a different location
  • 11. REASONS FOR PERMANENTLY DELETING DATA  Prevent Identity Theft by deleting financial records so can’t be retrieved by crackers  Secret, private and company information that should never be retrieved by anyone else  In case of selling or donating the hard drive or entire computer and the information shouldn’t be accessible by anyone  To comply with data protection by storing information only for the required time and to re- assure clients their information will be protected
  • 12. DELETING DATA V.S. DESTROYING DATA  Deleting Data – if you delete something and even empty the recycle bin there is still a residual record left on the computer  This can be retrieved using hard-drive restoring software  Destroying data by using shredding or degaussing is a permanent method  The data is unable to be retrieved
  • 13. PERMANENTLY DESTROYING DATA  Few methods: Shredding, Degaussing and Data Destruction Utilities  Shredding – shredding disks like CD/DVD  Hard/USB Drive destruction – physical destruction of a drive  Degaussing – using magnetism on a disk in random patterns rendering previous data unrecoverable  Data Utilities – software utility to carry out destruction of data