0% found this document useful (0 votes)
23 views3 pages

Subtitle

Uploaded by

moriyama
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views3 pages

Subtitle

Uploaded by

moriyama
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd

Hello, my name is Lewis

Fuca and I am here to talk to you about data


security and protection. During this module, we will discuss what data security
and protection is, what we are protecting data from, and why we are protecting
data. So what is data
protection and security? What is its goal? Data security is the process of
protecting your most
critical business assets, that is your data, against
unauthorized or unwanted use. This not only involves deploying the right data
security products, but also combining people
and processes with the technology you choose to protect data throughout
its life-cycle. Enterprise data protection
is a team sport. Let's talk about
data security and protection in context
of the confidentiality, integrity, availability
or CIA triad. You must protect the
confidentiality, integrity, and availability of data
at rest and in transit from intentional and
unintentional attacks. What does all this mean? Let's start with the
difference between data at rest and data in transit. Data in transit is data that
is being transmitted from
one point to another. The transmission may take
place over a network, between people, from here to the next building or
halfway around the globe. Data at rest is data that
resides on endpoints. Such endpoints include database
servers, file servers, laptops or mobile
devices like tablets, where data is being stored
for intended later use. It also includes back-up
devices like tape storage. How about data confidentiality? Confidentiality means
maintaining data secrecy. This means that data access is restricted to those actors
who have a right
to know the data. Confidentiality includes
the concept of privacy, but it also means providing
the right level of access to the right set of users at the right times using
the right methods. As an example, consider
a university dealing with the data related to a
college age adult student. That student may have
authorized the parents to view financial records in order
to pay tuition bills, but that does not mean
the parents are legally authorized to view grades
and academic progress. The student may themselves
be authorized to view their grades and
academic progress, but certainly not
delete or edit them. The students instructor who may be authorized to view, edit,
and delete information
corresponding to grades and academic progress, but only when that
student is enrolled in an instructor's
class, and even then, the instructor will
probably not be legally allowed to view the students
financial information. Additionally, the instructor
may be restricted to viewing the students academic progress
from authorized endpoints, such as a registered laptop connected through a
virtual private network. Not a smartphone connecting over on untrusted cellular
network. Now let's turn to
integrity of data. Ensuring the integrity
of the data means making sure that the data is
trustworthy and accurate, and that it has not
been tampered with. Integrity overlaps
with confidentiality, and that only those allowed to change data are
permitted to do so. In the case of our
college student, a small number of actors should be allowed
to change a grade. Much smaller than even
the limited audience that is allowed to view
academic progress. Perhaps only a single instructor or perhaps a teaching
assistant or two. Indeed, defining who
is allowed to change, insert or delete data is a significant challenge
in ensuring integrity. Another challenge is working with parties outside of
your organization. When our students, parents pay tuition using electronic banking,
they want to be assured that the process is secure
from tampering. A breach of security
will be seen as at least partially the
fault of the university, even if it takes
place on a network or an endpoint that the
university cannot control, then there is availability. Data must be accessible by
the appropriate users
during the correct times. This does not always
mean right away, nor does it mean that the data has to be available continuously.
However, the data must be available within a
reasonable amount of time. This will vary according
to application. Take one example. The student must have academic progress
information available when registering for a course. The information need not be
available 24 hours a day, seven days a week, but it must be available
when the student is registered with a
response time that provides the student ample time to complete registration
actions. The same information
must be available to the student when looking for a job or applying to
a graduate school. However, the time frame
may be different. In this case, being
able to respond in days rather than seconds
will be acceptable. However, it is expected
that the data be accessed years or even
decades after it is created. Availability to a greater
degree than confidentiality and integrity is affected by unintentional actors
and third parties. Remember, data may need to be available for years
or even decades. As an example, a natural
disaster may jeopardize data availability
either temporarily by cutting network connections, longer-term by damaging
application in database servers, or long-term by
destroying archive data. A plan network outage may inadvertently cut
ties to access data. Carelessness can cause loss of backup tapes or drop a
table from a database. There's also a
different time frame in which breaches are discovered. Without careful data
protection measures, violations of confidentiality or integrity may escape
detection for weeks, months or years. Availability violations tend
to be discovered quicker, but not always as in the case
of losing a backup tape. So what are we
protecting data against? Data must be protected against deliberate and inadvertent
or accidental attacks. When we think of data
security and protection our first inclination may be to think of only
deliberate attacks, attacks by bad actors
who wish to purposely compromise our system and
damage or steal our data. Deliberate attacks are
certainly worth our concern. Deliberate attacks can come
in a variety of forms, such as a denial of service, socially engineered
attacks, attacks from internal sources such as privileged
administrators or users, as well as attacks
from external sources. Attackers can have a widely
varying level of skill, from inexperienced
script kiddies who use tools or methods that they
don't really understand, to motivated
discipline criminals, to agencies of nation states with a higher level of skill
and many resources. Returning to our example, the university
system may be preyed upon by disgruntled employees, bored students trying
to crack the system, more motivated students trying to facilitate cheating
or change grades, outside criminals
attempting to gain and exploit personal credit
card information, or even foreign national
agencies making a coordinated effort to
steal valuable research. However, inadvertent
breaches can be just as bad. These includes such
events such as failure of hardware of whether or
other natural disaster or even innocent mistakes by
well-intentioned personnel or poorly implemented or
insufficient procedures. Threat profiles are used
to predict what threats, intentional and unintentional
might pose a threat to data and what measures should be reasonably considered
to protect the data. This ties into the next point. Why do all of this?
Understanding the costs of
the attacks is important. This is challenging
because some of these costs are
difficult to quantify. You want to protect
revenue and profits. Compromise of data can cut
into revenue and cleaning up after an attack adds
cost, cutting profits. Also important is the reputation
of your organization. Additionally, data
protection and security solutions may be part of a
digital transformation effort. Your organization may
be moving services online or even creating
new service offerings. Data protection is part of
the foundation on which these transformative
efforts can build. You must also consider
regulatory mandates. Laws may impose stiff
penalties on data breaches above and beyond
the intrinsic costs of repairing the damage. Industry standards may be
less directly punitive, but maybe a de facto
requirement for your customers to do
business with you. Data protection and
security are expected. Security breaches can be devastating to a
company's reputation. One tenant of security is not to spend more on security
than an asset is worth, but in the case of
brand or reputation, this worth can be very
difficult to assess. We see data security and
protection are necessary, but they are also challenging. In the next segment,
we'll talk about the top challenges and common
pitfalls of data security.

You might also like