Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri 120050144 5 Steps To Secure Your Data.

Slides:



Advertisements
Similar presentations
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Advertisements

Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Strengthening Password Policy via Outlook Features Password Policy and How-To Guide Richard Steiner December 16, 2003
1 Chapter Overview Understanding NTFS Permissions Assigning NTFS Permissions Assigning Special Permissions.
POP QUIZ!!! What kind of software is Medisoft? Name ONE of the 4 things that you can do to data in Medisoft. What is the Medisoft Program Date? What key.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
1 File systems security: Shared folders & NTFS permissions, EFS (Week 6, Monday 2/12/2007) © Abdou Illia, Spring 2007.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
1 Distributed File System, and Disk Quotas (Week 7, Thursday 2/21/2007) © Abdou Illia, Spring 2007.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
MIS Chapter 51 Chapter 5 – Managing File Access MIS 431 Created Spring 2006.
A+ Guide to Software, 4e Chapter 4 Supporting Windows 2000/XP Users and Their Data.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Chapter 7: Configuring Disks. 2/24 Objectives Learn about disk and file system configuration in Vista Learn how to manage storage Learn about the additional.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Lab 03 Windows Operating Systems (Cont.). PYP002 Preparatory Computer ScienceWindows Operating System2 Objectives Develop a good understanding of 1. The.
Chapter 7: Configuring Disks. Configuring File Systems Fat32 –First used with Windows 95 OSR2 –Smaller cluster sizes, more efficient storage up to 32.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
MIS 431 Chapter 71 Ch. 7: Advanced File Management System MIS 431 Created Spring 2006.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
Lesson 4: Configuring File and Share Access
5.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 5: Working with File Systems.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
1 Chapter Overview Managing Compression Managing Disk Quotas Increasing Security with EFS Using Disk Defragmenter, Check Disk, and Disk Cleanup.
®® Microsoft Windows 7 for Power Users Tutorial 10 Backing Up and Restoring Files.
1 Using Compressed Files and Folders Applications and operating systems read and write to compressed files. NTFS uncompresses the file before making it.
COMPREHENSIVE Windows Tutorial 2 Organizing Your Files.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Chapter 4: Operating Systems and File Management 1 Operating Systems and File Management Chapter 4.
Chapter 7 Installing and Using Windows XP Professional.
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
© 2008 The McGraw-Hill Companies, Inc. All rights reserved. M I C R O S O F T ® Preparing for Electronic Distribution Lesson 14.
NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account.
®® Microsoft Windows 7 for Power Users Tutorial 5 Comparing Windows 7 File Systems.
Session 4 Windows Platform Dina Alkhoudari. Learning Objectives Configure disk quotas Repairing and Defragmenting Set permissions to files and folders.
Microsoft Office 2013 ®® Managing Your Files. XP Objectives Explore the differences between Windows 7 and Windows 8 Plan the organization of files and.
Why Copy , Attachments and other files to CD or DVD? Backup mail & files in case of computer failure or disaster. Archive old messages & files before.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 14 Windows XP Professional 1.
COMPREHENSIVE Windows Tutorial 9 Maintaining Hardware and Software.
A+ Guide to Software Managing, Maintaining and Troubleshooting THIRD EDITION Chapter 8 Managing and Supporting Windows XP.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 5: Managing File Access.
Information Security 493. Lab 11.3: Encrypt a Windows File Windows operating systems since Windows 2000 have included the ability to encrypt files. Follow.
1 Chapter Overview Publishing Resources in Active Directory Service Redirecting Folders Using Group Policies Deploying Applications Using Group Policies.
1 Computer Disk management Using Disk Management To open Disk Management: Click Start, right-click My Computer, and then click Manage. Under the Storage.
Configuring Data Protection Chapter 12 powered by dj.
11 BACKING UP AND RESTORING SYSTEMS AND DATA Chapter 15.
FIRST COURSE Integration Tutorial 1 Integrating Word and Excel.
® Microsoft Access 2010 Tutorial 12 Managing and Securing a Database.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 11: Managing Access to File System Resources.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
 Click Start, point to All Programs, point to Accessories, point to System Tools,and then click Backup. The Backup or Restore Wizard starts.
Working with Disks Lesson 4. Skills Matrix Technology SkillObjective DomainObjective # Configuring Data Protection Configure data protection6.4 Using.
XP New Perspectives on Microsoft Office FrontPage 2003 Tutorial 7 1 Microsoft Office FrontPage 2003 Tutorial 8 – Integrating a Database with a FrontPage.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
Lecture 6 File, Folder and Share Security. Objectives Managing file and folder security.
Module 5: Configuring and Managing File Systems. Overview Working with File Systems Managing Data Compression Securing Data by Using EFS.
Managing Applications, Services, Folders, and Libraries Lesson 4.
Microsoft Windows XP Professional MCSE Exam
®® Microsoft Windows 7 Windows Tutorial 2 Organizing Your Files.
1 Chapter Overview Understanding Shared Folders Planning, Sharing, and Connecting to Shared Folders Combining Shared Folder Permissions and NTFS Permissions.
Thanapoom Boondee M.2/2 No.22. Pattawan Tangpattananon M.2/2No.5 Tuchatham Tosakul M.2/2No.13 Thanapoom Boondee M.2/2No.22 Suvit Pathomthanasarn M.2/2No.30.
1 Introduction to Shared Folders Shared folders provide network users access to files. Users connect to the shared folder over the network. Users must.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the importance of security and encryption. Objective Course Weight 2%
What is YOUR Data Worth???. “Just because you're paranoid doesn't mean they aren't after you.” Joseph Heller, Catch-22.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
11 SUPPORTING WINDOWS XP FILE AND FOLDER ACCESS Chapter 5.
Presentation transcript:

Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri Steps To Secure Your Data

Overview  Identify your data  Organize your data  Secure your data  Backup  Recover

Identify your data The first step toward data security is to identify what your data is and where it is.  What? Word Excel , etc…  Where? Local Storage: Hard Drive Network Storage: Network Drive Removable Storage: Flash Drive, CD, Floppy

Organize your data Determine what data needs to be protected. Considerations  FERPA – Family Educational Rights and Privacy Act  Customer Confidentiality Agreements  State Computing Policies

Group your data.  Classify C1-Sensitive (FERPA) C2-Departmental (No personal data but sensitive to department or university) C3-Non-sensitive (Memo’s, Office hour, Public Information)  All data should be considered sensitive until it has been verified to be non-sensitive.  Everyone in the group should use the same system of classification to limit confusion. Make it the office standard.

Create a standard on where sensitive data should be stored. Make it a habit to automatically save/move sensitive data to the appropriate location. Audit your stored data to ensure the proper handling.

Secure your data Now that your sensitive data has been organized you need to protect it. Encrypt and Decrypt (EFS)

Encryption Does not need to be used on all data.  Are you planning on sharing the data?  Does it contain any sensitive information? What does encryption do to my data?

Windows Encryption (EFS) EFS: Encrypting File System  Short for Encrypting File System, part of the Microsoft New Technology File System (NTFS) file system. EFS is a transparent public key encryption technology that works in conjunction with NTFS permissions to grant and deny users access to files and folders in Windows NT (excluding NT4), 2000 and XP (excluding XP Home Edition) operating systems. NOTE: You can encrypt files and folders only on volumes that use the NTFS file system.

EFS: Encrypting File System (cont’d)  EFS uses a public key and a private key for encryption. If the user does not have one, the EFS generates the key pair automatically. Files can be encrypted individually, or a folder can be designated as encrypted, so that any file written to that folder is automatically encrypted. Because EFS encryption technology integrates into the file system, users can't access the hard disk without going through the file system.

Encrypting a folder in Windows XP Click Start, point to All Programs, point to Accessories, and then click Windows Explorer. Locate and right-click the folder that you want, and then click Properties. On the General tab, click Advanced. Under Compress or Encrypt attributes, select the Encrypt contents to secure data check box, and then click OK. Click OK. In the Confirm Attribute Changes dialog box that appears, use one of the following steps:  If you want to encrypt only the folder, click Apply changes to this folder only, and then click OK.  If you want to encrypt the existing folder contents along with the folder, click Apply changes to this folder, subfolders and files, and then click OK.

Backup No matter what you do to protect your data, without a backup all your hard work could be for naught. It isn't data if you can’t access it. Back up your security certificate  Make sure you can access your data.

Backup – Windows XP Creating a folder backup using the Windows Backup utility. Easy to follow instructions: tt_03july14.mspx tt_03july14.mspx

Backup – Outlook 2003 Outlook 2003 data can easily backed up using an MS utility. Easy to follow instructions: 081f3a-b7d0-4b16-b8af-5a6322f4fd01&DisplayLang=en 081f3a-b7d0-4b16-b8af-5a6322f4fd01&DisplayLang=en

Disaster Recovery Disaster recovery is the ability to continue work after any number of catastrophic problems, ranging from a computer virus or hacker attack to a natural disaster such as flood, fire, or earthquake. Having a disaster recovery plan in place takes a little time and effort, but the peace of mind it brings and the ability to continue work after the unthinkable are well worth it.computerhackernatural disaster Computer Disaster Recovery Planning Checklist for Small Systems: First part of database disaster recovery is easy - backup database systems on a regular basis. You should maintain a minimum of 3 consecutive copies before overwriting. Consider doing a backup each day of the week and put Friday's backup off site. How: 1) Take a copy home 2) Send to a website located in another city/state 3) Regular courier to another corporate office 4) Establish an off site backup service with courier pickup (for more critical databases).

Recovery Practice Practice  Make sure that you have gone though recovering data.  Set up a practice schedule.  New employees should get to practice as part of their welcome.

The End