Objective:
This section introduces you to personal data and device security concepts and gives you practice configuring firewalls and anti-malware software on Windows. After finishing this section, you should be able to:
- Compare and contrast classification schemes for handling confidential information.
- Define data, network, and power redundancy and explain how they contribute to fault tolerance.
- Explain why it’s important to back up data files.
- Describe backup procedures for different types of data.
- Explain the purpose of business continuity plans.
- Describe the common components of a disaster recovery plan.
- Describe common careers in IT security.
- Configure Windows backup settings
Links:
- TestOut Courseware: https://testout.com
Key Terms:
- Information Sensitivity An attribute used to classify information based on the risk of public disclosure.
- Public/Private Classification A scheme for classifying information based on different levels of public/private distinctions.
- Government/Military Classification A scheme for classifying information based on government and military requirements.
- Data Destruction Policy Directions for disposing and even destroying data when it’s no longer needed or when a storage device needs to be replaced.
- Data Redundancy A method of increasing fault tolerance by storing data in a way that ensures that the data is recoverable in case of hardware failures. RAID arrays and replication are two data redundancy strategies.
- Network Redundancy A method of increasing fault tolerance by providing multiple network paths between hosts.
- Power Redundancy A method of increasing fault tolerance by providing power backups and power failover.
- Network Attached Storage A device that contains one or more hard drives that users can access over the network.
- Ad Hoc Backup Unscheduled backups performed periodically.
- Regular Backup Regularly scheduled backups.
- System Backup A backup of the system software, including operating system files.
- Database Backup A backup of data stored in a database.
- Local Backup Backups that are stored in the same building or even the same room as the computer systems they are taken from.
- Off-site Backup Backups that are stored at a location far enough from a possible natural disaster while being close enough to recover the data and systems within a reasonable amount of time.
- Disaster Recovery An area of security planning with the goal of protecting an organization from the effects of a natural or human-induced disaster.
- Business Continuity The process of creating systems of prevention and recovery to permit ongoing operation, before and during disaster recovery.
- Systems Administrator Concerning security, a person responsible for securing networks and responding to intrusions.
- Computer Forensics Expert A person who works closely with law enforcement officials to investigate security breaches, cyber-attacks, and other crimes.
- Security Analyst A person who is in charge of designing and implementing security methods to protect an organization’s computer systems and networks.
Topics Discussed:
- null
- How do businesses classify information to keep it secure and private?
- What are the most important components in creating fault tolerant information systems?
- How does a good business continuity plan inform disaster recovery efforts
Assignment:
- Access the TestOut Courseware through the provided link.
- Study Section 4.6: Corporate Data Security, and achieve a score of 80% or higher on the 14 question Exam to complete the Section.
Assigned: January 27th, 2020
Teacher Pacing Due Date: January 28th, 2020