Protecting Your Digital Research Data

Slides:



Advertisements
Similar presentations
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Advertisements

Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
September 2007 General Security Basics Your Responsibilities for Safe Computing.
New Data Regulation Law 201 CMR TJX Video.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
INTERNET: The Good, The Bad and The Ugly
IDigBio is funded by a grant from the National Science Foundation’s Advancing Digitization of Biodiversity Collections Program (Cooperative Agreement EF ).
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
1 Introduction to Auditing Auditing allows you to track User activities. Microsoft Windows 2000 activities. Windows 2000 records events in the security.
Data Integrity # Best Practices & Lessons Learned. Does It Fit Your Organization?
Computer Security By Duncan Hall.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
Managing Your Data: Assign Descriptive File Names Robert Cook Oak Ridge National Laboratory Version 1.0 Review Date.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
Branch of computer security specifically related to the Internet. Security for transactions made over the Internet. Internet security encompasses browser.
Computer Security Sample security policy Dr Alexei Vernitski.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
What is YOUR Data Worth???. “Just because you're paranoid doesn't mean they aren't after you.” Joseph Heller, Catch-22.
Computer Literacy BASICS: A Comprehensive Guide to IC 3, 5 th Edition Lesson 10 Data and Hardware Protection 1 Morrison / Wells / Ruffolo.
INTERNET SAFETY FOR EVERYONE
Chapter 40 Internet Security.
Slide Template for Module 4 Data Storage, Backup, and Security
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Managing Windows Security
Computer Security.
Securing Network Servers
Common Methods Used to Commit Computer Crimes
Handling Personal Data
Ways to protect yourself against hackers
How to build a good reputation online
Home Computer Security
Unit 4 IT Security.
Topic 6: Issues Press F5 to view!
Lecture-16(B) Taking Protective Measures
Lesson 2- Protecting Yourself Online
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Information Technology Services Education and Awareness Team
Risk of the Internet At Home
Computer Ethics.
LO2: Understand Computer Software
Internet Safety for Everyone
GSBS IT Resources and Security
Internet safety By DAGAS YACMAS team.
12 STEPS TO A GDPR AWARE NETWORK
Preparing for GDPR Sharing experiences of the process and using the British Canoeing Toolkit bit.ly/BCGDPRToolkit
Information Security Awareness
Backup and restoration of data, redundancy
HOW DO I KEEP MY COMPUTER SAFE?
REDCap and Data Governance
Faculty of Science IT Department By Raz Dara MA.
Types of Software.
Bethesda Cybersecurity Club
Drew Hunt Network Security Analyst Valley Medical Center
What is Information Security?
CYBERSAFETY & Personal information
Internet Safety for Everyone
Information Technology Services Education and Awareness Team
Lesson 2- Protecting Yourself Online
Internet Safety for Everyone
Internet Safety for Everyone
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
6. Application Software Security
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Protecting Your Digital Research Data 7 “Mostly” Easy Steps to Data Security

 

Step 1: Know the risks Theft or physical damage to computer or media Routine hardware or software failure Data tampering or unauthorized access to data Failure to use good practice

Step 2: Avoid the Single Point of Failure Use the rule of 3 Follow Brunt’s Axiom

Have a working version and at least two backup copies The Rule of 3:   Have a working version and at least two backup copies

Brunt’s Axiom: Have your data in three separate physical places: Here, Near, and There

Here:  

Near:  

There:  

Step 3: Use consistent file naming Keep names short Use names that are descriptive Include a date Include a version number

Example file names c130_a792_20000916.csv (From data set SAFARI 2000 C-130 Aerosol and Meteorological Data, Dry Season 2000) WBW_veg_inventory_all_20050304.csv (From data set Walker Branch Watershed Vegetation Inventory, 1967-1997) bigfoot_agro_2000_gpp.zip (From data set BigFoot GPP Surfaces for North and South American Sites, 2000-2004) From Best Practices for Preparing Environmental Data Sets to Share and Archive. Les A. Hook, Suresh K. Santhana Vannan, Tammy W. Beaty, Robert B. Cook, and Bruce E. Wilson. September 2010

Step 4: Practice safe file handling Avoid Concurrency 2 copies of a file are open for editing at the same time Synchronize Routinely or automatically copy your new file to near and there Version Using version numbers avoids overwriting of previous versions Track Provenance Record changes made to data

Step 5: Practice safe computing Apply OS and application security updates Enable firewall and high security settings Use Anti-virus and Anti-malware software Routinely do full backup and store away Practice extra caution when travelling

On the road: Keep computer in sight Don’t put computer in checked luggage Enable password protected startup Make sure computer is labeled Record serial number Avoid public Wi-Fi and especially, Avoid public computers

Step 6: Practice safe password management Why? Reason #1 - Your password is a foot in the door for bad guys Reason #2 - Your password can be used to gain more of your personal information

Password “guidelines” Categorize applications based on risk Create appropriate strength passwords Use a password manager

Categorize password risk High – expose personal information or resources that can be exploited Medium – expose personal information that is generally already available Low – passwords that expose minimal personal information

Password fatigue Long, complex passwords are more secure than short, simple ones – mostly true Changing passwords frequently reduces risk – partly true Users consistently fail in these password practices – definitely true

Step 7: Be Paranoid or try to walk the line between paranoia and rationality very carefully Encrypt data Use two-factor authentication Never accept the “default” Use pseudonyms for logins and email Think like a network

“Just because you're paranoid doesn’t mean they aren’t after you” --Joseph Heller, Catch 22

Conclusion Data security is broad and complex subject There is a need for communities of practice to fill gaps in knowledge You are all now qualified data security experts – go forth Be cautious, be aware, be prepared, and

Don't Panic