Data Security
Consideration
Data Security
Datasecurity is the protection of programs and
data in computers and communication systems
against unauthorized access, modification,
destruction, disclosure or transfer whether
accidental or intentional by building physical
arrangements and software checks.
Data Security
Itrefers to the right of individuals or
organizations to deny or restrict the collection
and use of information about unauthorized
access.
Data Security
Datasecurity requires system managers to
reduce unauthorized access to the systems by
building physical arrangements and software
checks.
Data Security Consideration
Data security uses various methods to make
sure that the data is correct, original, kept
confidentially and is safe. It includes-
Ensuring the integrity of data.
Ensuring the privacy of the data.
Prevent the loss or destruction of data.
Data Security Consideration
Data security consideration involves the protection of data
against unauthorized access, modification, destruction, loss,
disclosure or transfer whether accidental or intentional.
Backups
Data backup refers to save additional copies of
our data in separate physical or cloud locations
from data files in storage. It is essential for us to
keep secure, store, and backup our data on a
regular basis.
Securing of the data will help us to prevent from-
Accidental or malicious damage/modification to data.
Theft of valuable information.
Breach of confidentiality agreements and privacy
laws.
Premature release of data which can avoid
intellectual properties claims.
Release before data have been checked for
authenticity and accuracy.
Backup 3-2-1 Rule
Three copies of our data
Twodifferent formats, i.e., hard drive+tape
backup or DVD (short term)+flash drive
Oneoff-site backup, i.e., have two physical
backups and one in the cloud
Some important backup options are
Hard drives - personal or work computer
Departmental or institution server
External hard drives
Tape backups
Discipline-specific repositories
University Archives
Cloud storage
Some of the top considerations for
implementing secure backup and recovery
Authentication of the users and backup
clients to the backup server.
Role-basedaccess control lists for all backup
and recovery operations.
Dataencryption options for both
transmission and the storage.
Flexibility
in choosing encryption and
authentication algorithms.
Some of the top considerations for
implementing secure backup and recovery
Backup of a remote client to the centralized
location behind firewalls.
Backup and recovery of a client running
Security-Enhanced Linux (SELinux).
Using
best practices to write secure
software.
Archival Storage
Data
archiving is the process of retaining or
keeping of data at a secure place for long-
term storage.
The data might be stored in safe locations so
that it can be used whenever it is required.
The Data archival serve as a way of reducing
primary storage consumption of data and its
related costs.
Data archives different forms
Online data storage places archive data onto
disk systems where it is readily accessible.
Offlinedata storage places archive data onto
the tape or other removable media using
data archiving software. Because tape can
be removed and consumes less power than
disk systems.
Data archives different forms
Cloud storage is also another possible
archive target. For example, Amazon Glacier
is designed for data archiving. Cloud storage
is inexpensive, but its costs can grow over
time as more data is added to the cloud
archive.
Considerations to help improve the
long-term usefulness of archives
Storage medium
Storage device
Revisiting old archives
Data usability
Selective archiving
Space considerations
Online vs. offline storage
Storage medium
The first thing is to what storage medium we
use for archives. The archived data will be
stored for long periods of time, so we must
need to choose the type of media that will
be lost as long as our retention policy
dictates.
Storage device
Thisconsideration takes into account about
the storage device we are using for our
archives which will be accessible in a few
years. There is no way to predict which
types of storage devices will stand the best.
So, it is essential to try to pick those devices
that have the best chance of being
supported over the long term.
Revisiting old archives
Since we know our archive policies and the
storage mechanisms we use for archiving
data would change over time. So we have to
review our archived data at least once a
year to see that if anything needs to be
migrated into a different storage medium.
Data usability
Inthis consideration, we have seen one
major problem in the real world is archived
data which is in an obsolete format.
Selective archiving
Inthis consideration, we have to sure about
what should be archived. That means we will
archive only a selective part of data because
not all data is equally important.
Space considerations
Ifour archives become huge, we must plan
for the long-term retention of all our data. If
we are archiving our data to removable
media, capacity planning might be simple
which makes sure that there is a free space
in the vault to hold all of those tapes, and it
makes sure that there is a room in our IT
budget to continue purchasing tapes.
Online vs. offline storage
Inthis consideration, we have to decide
whether to store our archives online (on a
dedicated archive server) or offline (on
removable media).
Disposal of Data
Data destruction or disposal of data is the
method of destroying data which is stored
on tapes, hard disks and other electronic
media so that it is completely unreadable,
unusable and inaccessible for unauthorized
purposes.
Essential benefits of data disposal -
Itavoids the unnecessary storage costs
incurred by using office or server space in
maintaining records which is no longer
needed by the organization.
Finding and retrieving information is easier
and quicker because there is less to search.
Why destruction of data is needed
Thequantity of a legacy record requires
attention.
Thefunctions are being transferred to
another authority and disposal of data
records becomes part of the change process.
Considerations in Secured disposal of data-
Eliminate access
Destroy the data
Destroy the device
Keepthe record of which systems have been
decommissioned
Keep careful records
Eliminate potential clues
Keep systems secure until disposal
Eliminate access
Inthis consideration, we have to ensure that
eliminating access account does not have
any rights to re access the disposed of data
again.
Destroy the Data
Inthis consideration, there is not necessary
to remove data from storage media will be
safe. Even these days reformatting or
repartitioning a drive to "erase" the data
that it stores is not good enough. Today's
many tools available which can help us to
delete files more securely. To encrypt the
data on the drive before performing any
deletion can help us to make data more
difficult to recover later.
Destroy the device
In
the most cases, storage media need to be
physically destroyed to ensure that our
sensitive data is not leaked to whoever gets
the drives next. In such cases, we should not
destroy them itself. To do this, there should
be experts who can make probably a lot
better at safely and effectively rendering
any data on our drives unrecoverable.
Keep the record of which systems have
been decommissioned
Inthis, we have to make sure that the
storage media has been fully
decommissioned securely and they do not
consist of something easily misplaced or
overlooked. It is best if storage media that
have not been fully decommissioned are
kept in a specific location, while
decommissioned equipment placed
somewhere else so that it will help us to
avoid making mistakes.
Keep careful records
In
this consideration, it is necessary to keep
the record of whoever is responsible for
decommissioning a storage media. If more
than one person is assigned for such
responsibility, he should sign off after the
completion of the decommissioning process.
So that, if something happened wrong, we
know who to talk to find out what happened
and how bad the mistake is.
Eliminate potential clues
Inthis consideration, we have to clear the
configuration settings from networking
equipment. We do this because it can
provide crucial clues to a security cracker to
break into our network and the systems that
reside on it.
Keep system secure until disposal of
data
Inthis consideration, we should have to
make clear guidelines for who should have
access to the equipment in need of secure
disposal. It will be better to ensure that
nobody should have access authentication to
it before disposal of data won't get his or her
hands on it.