Beruflich Dokumente
Kultur Dokumente
9-4
© 2015 Pearson Education Ltd.
9.1 Introduction
9.2 Data Protection: Backup
9.3 Backup Media and RAID
9.4 Data Storage Policies
9.5 Database Security
9.6 Data Loss Prevention
9-5
© 2015 Pearson Education Ltd.
Data are the principal elements of any
information system
Businesses gather enormous amounts of data
◦ Information is then extracted for decision making
◦ Data are valuable assets that are core components
of a larger corporate strategy
◦ Source code, intellectual property, user data, etc.
must all be protected
9-6
© 2015 Pearson Education Ltd.
Series of attacks against Sony Corporation
◦ Lost data for 100+ million user accounts
◦ Shut down the PlayStation Network
9-8
© 2015 Pearson Education Ltd.
9.1 Introduction
9.2 Data Protection: Backup
9.3 Backup Media and RAID
9.4 Data Storage Policies
9.5 Database Security
9.6 Data Loss Prevention
9-9
© 2015 Pearson Education Ltd.
Importance
◦ In an incident, you may lose all data that is not
backed up
9-10
© 2015 Pearson Education Ltd.
Scope of Backup
◦ Fraction of information on the hard drive that is
backed up
9-11
© 2015 Pearson Education Ltd.
9-12
© 2015 Pearson Education Ltd.
Image Backup
◦ Everything, including programs and settings
◦ Image backup is very slow
◦ Data files change the most rapidly, so doing several
file/directory data backups for each image backup
may be appropriate
Shadowing
◦ A backup copy of each file being worked on is
written every few minutes to the hard drive, or to
another location
9-13
© 2015 Pearson Education Ltd.
9-14
© 2015 Pearson Education Ltd.
Full backups
◦ All files and directories
◦ Slow, so it is typically done weekly
Incremental Backups
◦ Only records changes since the last backup
◦ Fast, so usually done daily
◦ Do incremental backups until the next full backup
9-15
© 2015 Pearson Education Ltd.
Restoration Order
◦ Restore the full backup first
◦ Then restore incremental backups in the order
created
◦ Otherwise, newer files will be overwritten
Generations
◦ Save several generations of full backups
◦ Do not usually save incremental backups after the
next full backup
9-16
© 2015 Pearson Education Ltd.
Local backup on individual PCs is difficult to
enforce.
Centralized backup provides backup labor and
enforcement.
9-17
© 2015 Pearson Education Ltd.
Continuous Data Protection (CDP)
◦ Used when a firm has two server locations
◦ Each location backs up the other in real time
◦ Other site can take over very quickly in case of a
disaster, with little data loss
◦ Requires expensive high–speed transmission link
between the sites
9-18
© 2015 Pearson Education Ltd.
PCs back up one another.
Data is stored redundantly.
Security issues must be addressed.
9-19
© 2015 Pearson Education Ltd.
9.1 Introduction
9.2 Data Protection: Backup
9.3 Backup Media and RAID
9.4 Data Storage Policies
9.5 Database Security
9.6 Data Loss Prevention
9-20
© 2015 Pearson Education Ltd.
Servers Normally Use Magnetic Tape
◦ Slow but inexpensive per bit stored
9-21
© 2015 Pearson Education Ltd.
Clients Normally Use Optical Disks (DVDs)
◦ Attraction is that almost all users have optical disk
burners
◦ Dual-layer DVDs offer about 8 GB of capacity
This is often not enough
User may have to insert additional disks to do
backup
◦ Backup to a second client PC hard drive; then
occasionally backup onto optical disks
◦ The life of information on optical disks is unknown
9-22
© 2015 Pearson Education Ltd.
RAID – Redundant Array of Independent Disks
◦ Multiple hard drives within a single system
9-23
© 2015 Pearson Education Ltd.
9-24
© 2015 Pearson Education Ltd.
Shipping boxes Storing Data
9-25
© 2015 Pearson Education Ltd.
9-26
© 2015 Pearson Education Ltd.
Striping – Writing data simultaneously across
multiple disks
◦ Very fast, but no reliability
◦ One disk failure will cause complete data loss
9-27
© 2015 Pearson Education Ltd.
9-28
© 2015 Pearson Education Ltd.
9-29
© 2015 Pearson Education Ltd.
9-30
© 2015 Pearson Education Ltd.
9-31
© 2015 Pearson Education Ltd.
9.1 Introduction
9.2 Data Protection: Backup
9.3 Backup Media and RAID
9.4 Data Storage Policies
9.5 Database Security
9.6 Data Loss Prevention
9-32
© 2015 Pearson Education Ltd.
Backup Creation Policies
◦ Understand current system and future needs
◦ Create policies for different types of data and
computers
◦ What should be backed up, how frequently, how
frequently to test restorations, etc.
Restoration Policies
◦ Do restoration tests frequently
9-33
© 2015 Pearson Education Ltd.
Media Storage Location Policies
◦ Store media at a different site
◦ Store backup media in a fireproof and waterproof
safe until it can be moved offsite
Encryption Policies
◦ Encrypt backup media before moving them, so
confidential information will not be exposed if the
tape is stolen or lost
9-34
© 2015 Pearson Education Ltd.
Strong Access Control Policies for Backup
Media
◦ Checkouts are rare and therefore suspicious
◦ Checking out media can result in their loss and the
damages that come with loss
◦ The manager of the person requesting the checkout
should approve the checkout
9-35
© 2015 Pearson Education Ltd.
Data Retention Policies
◦ There are strong legal requirements for how long
certain types of data must be kept
◦ The legal department must get involved in retention
policies
9-36
© 2015 Pearson Education Ltd.
Benefits of Retention
◦ Major part of corporate memory
◦ Can retrieve old e-mail for current purposes
Dangers of Retention
◦ Legal discovery process
◦ Defendant must supply relevant e-mails
◦ Potentially very damaging information
◦ Always expensive
◦ Even though very expensive to retrieve, firms must
pay whatever is necessary to do so
9-37
© 2015 Pearson Education Ltd.
Accidental Retention
◦ Even if firms delete e-mail from mail servers, may
be stored on backup tapes
◦ Users will often store copies on their own
computers
9-38
© 2015 Pearson Education Ltd.
Legal Archiving Requirements
◦ Many laws require retention
Securities and Exchange Commission
Labor laws
Involuntary terminations
Public information about job openings
Medical problem complaints that may relate to
toxic chemicals
◦ Laws vary in duration of storage requirements
◦ Fines or summary judgments if failure to retain and
produce required e-mails
9-39
© 2015 Pearson Education Ltd.
U.S. Federal Rules of Civil Procedure
◦ Specify rules for all U.S. Federal civil trials
◦ Specifically address electronically stored
information
◦ Initial discovery meeting
Defendant must be able to specify what
information is available
Comes shortly after a civil lawsuit begins
Unless carefully thought through before hand, will
fail
9-40
© 2015 Pearson Education Ltd.
U.S. Federal Rules of Civil Procedure
◦ Holds on destruction
Must be put in place if it is foreseeable that a
lawsuit will soon begin
Must have strong hold procedures to place holds
on all electronically stored information
Archiving Policies and Processes
◦ Must have them
◦ Must reflect a firm’s legal environment
◦ Must be drawn up by the firm’s legal department
9-41
© 2015 Pearson Education Ltd.
Message Authentication
◦ Spoofed messages can frame employees or the firm
itself
◦ Need message authentication to prevent spoofed
sender addresses
User Training
◦ Never put anything in a message that you would not
want seen in court, printed in the newspaper, or
read by your boss
9-42
© 2015 Pearson Education Ltd.
Spreadsheet Security
◦ Spreadsheets are widely used and are the subject of
many compliance regulations
◦ Need for security testing
◦ Spreadsheet vault server to implement controls
9-43
© 2015 Pearson Education Ltd.
2.
Spreadsheets record each
change for auditing purposes
1.
The vault server stores spreadsheets
and strongly controls access to them.
Authentication
Authorizations
Auditing
9-44
© 2015 Pearson Education Ltd.
3.
Cryptographic
protections for
transmissions
4.
Strong client
security
9-45
© 2015 Pearson Education Ltd.
9.1 Introduction
9.2 Data Protection: Backup
9.3 Backup Media and RAID
9.4 Data Storage Policies
9.5 Database Security
9.6 Data Loss Prevention
9-46
© 2015 Pearson Education Ltd.
Databases
◦ Often used in mission-critical applications
◦ Require additional security precautions
◦ Relational databases: Tables (relations) with rows
(records) and columns (attributes)
◦ As discussed earlier, avoid SQL injection attacks
9-47
© 2015 Pearson Education Ltd.
9-48
© 2015 Pearson Education Ltd.
Databases
◦ Restrict Access to Data
Restrict users to certain columns (attributes) in
each row
For instance, deny access to salary column to most users
9-49
© 2015 Pearson Education Ltd.
9-50
© 2015 Pearson Education Ltd.
Databases
◦ Restrict granularity (level of detail)
Prevent access to individual data
Allow trend analysts to deal only with sums and
averages for aggregates, such as departments
◦ Restrict information about the structure of the
database itself (data model)
Knowledge about the data model can make SQL
injection much easier
9-51
© 2015 Pearson Education Ltd.
Database Access Control
◦ Restrict access to databases via database management
systems (e.g., Microsoft SQL Server, MySQL, IBM DB2,
Oracle, etc.)
◦ Rename administrator account, disable guest/public
accounts, lowest possible permissions necessary
9-52
© 2015 Pearson Education Ltd.
1. Windows
authentication
2. SQL Server
authentication
3. Password
policy options
9-53
© 2015 Pearson Education Ltd.
Database Auditing
◦ Collect information about users’ interactions with
databases
◦ Policy driven, reflecting legal and regulatory obligations
9-54
© 2015 Pearson Education Ltd.
Trigger - Code that is automatically run when
changes are made to a database
Data Definition Language (DDL) trigger
◦ Used to produce automatic responses if the structure of the
database has been altered (e.g., create new table, drop a
table, alter properties of an existing table)
9-55
© 2015 Pearson Education Ltd.
CREATE TRIGGER EmployeeSalaryChange
ON Employees
FOR UPDATE
AS
DECLARE @EmailBody varchar(1000)
DECLARE @FirstName varchar(20)
DECLARE @LastName varchar(20)
DECLARE @OldSalary int
DECLARE @NewSalary int
IF UPDATE (Salary)
SET @body = 'I just wanted to let you know that @FirstName ' ' @LastName '
changed their salary from' @OldSalary ' to ' @NewSalary
EXEC master..xp_sendmail
@recipients = 'randy.boyle@utah.edu',
@subject = 'Somebody changed their salary',
@message = @body
GO
9-56
© 2015 Pearson Education Ltd.
9-57
© 2015 Pearson Education Ltd.
Encryption
◦ Makes data unreadable to someone who does not
have the key
◦ Prevents theft of private or trade secret information
◦ May reduce legal liability if lost or stolen data is
encrypted
What to Encrypt
◦ Files and directories
◦ Entire disk
9-58
© 2015 Pearson Education Ltd.
Key Escrow
◦ Loss of the key is disastrous
Not like losing a password that can be reset
◦ Key escrow stores a copy of the key in a safe place
◦ Bad if managed by user
May not do it
May not be able to find it
If fired, may refuse to give it back, locking up all
data on the computer
◦ Central key escrow on a corporate server is better
9-59
© 2015 Pearson Education Ltd.
Strong Login Authentication Is Needed
◦ Encryption is transparent to logged in users
Once a user is logged in, he or she can see all
encrypted data
◦ Protect with strong password or biometrics
Ensure that the password is not lost
File-Sharing Problems
◦ File sharing may be more difficult because files
usually have to be decrypted before sending them
to another computer
9-60
© 2015 Pearson Education Ltd.
9.1 Introduction
9.2 Data Protection: Backup
9.3 Backup Media and RAID
9.4 Data Storage Policies
9.5 Database Security
9.6 Data Loss Prevention
9-61
© 2015 Pearson Education Ltd.
Data Loss Prevention (DLP)
◦ A set of policies, procedures, and systems
designed to prevent sensitive data from being
released to unauthorized persons
Data Collection
◦ Most companies collect more data than they can
adequately protect
9-62
© 2015 Pearson Education Ltd.
Personally Identifiable Information (PII)
◦ Private employee or customer information that
can be used to uniquely identify a person
◦ PII includes: Names (full name), personal
identification numbers (SSN), addresses (street or
e-mail), personal characteristics (photos), and
linking information (date of birth)
Data Masking
◦ Obscuring data such that it cannot identify a
specific person, but remains useful
9-63
© 2015 Pearson Education Ltd.
Spiders (crawlers) - Navigate the web gathering,
organizing, and indexing web content
9-64
© 2015 Pearson Education Ltd.
9-65
© 2015 Pearson Education Ltd.
Latanya Sweeney, k-anonymity: a model for protecting privacy. International Journal on
Uncertainty, Fuzziness and Knowledge-based Systems, 10 (5), 2002; 557‒570.
9-66
© 2015 Pearson Education Ltd.
9-67
© 2015 Pearson Education Ltd.
Document Restrictions
◦ Attempt to restrict what users can do to documents
in order to reduce security threats
◦ Embryonic
9-68
© 2015 Pearson Education Ltd.
Data Extrusion Management
◦ Attempts to prevent restricted data files from
leaving the firm without permission
◦ Watermark with invisible restriction indicators
Can be notified if sent via e-mail attachments or
FTP
If each document is given a different watermark,
can forensically see the source of a document leak
◦ Traffic analysis to look for unusually large numbers
of outgoing files sent by a user
9-69
© 2015 Pearson Education Ltd.
9-70
© 2015 Pearson Education Ltd.
Removable Media Controls
◦ Forbids the attachment of USB RAM drives and
other portable media
◦ Reduces user abilities to make copies
Perspective
◦ Have proven difficult to enforce
◦ Often reduces functionality in uncomfortable ways
◦ Companies have been reluctant to use them
9-71
© 2015 Pearson Education Ltd.
9-72
© 2015 Pearson Education Ltd.
Social Networking
◦ Do not discuss work on personal blogs
Do not talk about new marketing campaigns
Do not post negative comments about products
◦ Be cautious about information posted on
professional networks
Competitors can use employee lists to hire away
key employees
9-73
© 2015 Pearson Education Ltd.
Data Destruction Is Necessary
◦ Backup media are not needed beyond their
retention dates if…
a computer is to be discarded
the computer is to be sold or given to another
user
◦ Drive-wiping software for hard drives
Reformatting the hard drive is not enough
◦ Shred CDs and DVDs
9-74
© 2015 Pearson Education Ltd.
9-75
© 2015 Pearson Education Ltd.
All rights reserved. No part of this publication may be reproduced, stored in a
retrieval system, or transmitted in any form or by any means, electronic,
mechanical, photocopying, recording or otherwise without the prior written
permission of the publisher.