1 / 12

Data Storage, Backup, and Security

Data Storage, Backup, and Security. Prepared by: Christopher Eaker, University of Tennessee, Knoxville. Learning Objectives. Understand why data storage, backup, and security of research data are important Understand data storage, backup, and security methods for research data

aquila
Télécharger la présentation

Data Storage, Backup, and Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Data Storage, Backup,and Security Prepared by: Christopher Eaker, University of Tennessee, Knoxville CC BY-NC

  2. Learning Objectives Understand why data storage, backup, and security of research data are important Understand data storage, backup, and security methods for research data Understand best practices for research data storage, access control, migration to newer storage media, and security for research data Identify an approach to creating a data storage, backup, and security plan Module 4: Data Storage, Backup, and Security

  3. Storage • Personal computers • Networked storage • External storage • Remote/cloud storage • Physical storage Module 4: Data Storage, Backup, and Security

  4. Backup • Store 2 copies • Set up a backup routine • Digital surrogates • Test your system Module 4: Data Storage, Backup, and Security

  5. A Word of Caution ≠ Back up Preservation Module 4: Data Storage, Backup, and Security

  6. Other Considerations • File formatting • Data migration • Responsibility Module 4: Data Storage, Backup, and Security

  7. Security • Access • Systems • Integrity Module 4: Data Storage, Backup, and Security

  8. Protecting Access • Login credentials • Centralized systems • Role-based rights • Limitations of wireless devices Module 4: Data Storage, Backup, and Security

  9. Protecting Computer Systems • Anti-virus software • Up-to-date software • Firewalls • Intrusion detection software • Physical access Module 4: Data Storage, Backup, and Security

  10. Ensuring Data Integrity • Encryption • Electronic signatures • Watermarks Module 4: Data Storage, Backup, and Security

  11. Resources @ UT UT's Office of Information Technology provides you with services to help ensure the safety and security of you research data. The following services can be utilized by all UTK researchers: Vault: share large amount of data and send messages to project collaborators securely. (vault.utk.edu) TrueCrypt: Free on-the-fly software and file encryption. Identify Finder: Prevent identity fraud by ensuring sensitive information is not easily accessible. 2-Factor Authentication Crashplan: cloud-based backup service Contact Bob Hillhouse for more information on the preceding services at bob@utk.edu or 865-974-8445 . Module 4: Data Storage, Backup, and Security

  12. Activity Read through the Data Storage, Backup, and Security checklist and think of how you would accommodate some of the items in your projects. Discuss among yourselves. Module 4: Data Storage, Backup, and Security

More Related