官术网_书友最值得收藏!

Data retention

Information in the form of data must be stored in digital media or in hard printed copies. Based on the requirements of the law and based on corporate policies, data needs to be retained even after its useful life. Data is also retained in media as a backup and used in business continuity and disaster recovery scenarios.

Data in media

Data security also concerns the physical protection of equipment as well as addressing security requirements pertaining to the media where the data is stored.

Storage media, such as hard disks, backup tapes, CDs, and diskettes, need additional security measures so as to ensure the security of the data they contain. Controls should ensure the prevention of data disclosure and modification by unauthorized entities.

The following controls need to be considered for media security:

Storage controls are the primary means to protect the data in storage media, such as hard disks, magnetic tapes, CDs, and so on. The primary consideration should be controlling access to the data, which is usually achieved by encrypted keys. Additional security considerations are required when the backup media is stored offsite.

Maintenance is a regular process to ensure that the data in the storage media is not corrupted or damaged. Media handling procedures are used to ensure this.

The users and operators should be provided with the proper usage instructions to handle the media.

Media usage should be in accordance with the established policies and procedures.

Data destruction is done by way of formatting the media. One time formatting may not completely delete all the data. Formatting the media seven times for complete data destruction is recommended by some of the standards.

Data in hardware

Theft is one of the most common threats that need to be addressed for personal computers, laptops, or media protection.

The following controls need to be considered for protection from theft:

  • Cable locks are used to physically secure PCs and laptop computers. These locks prevent the computer or laptop being detached and taken away.
  • Port protection is to ensure that media devices, such as CD-ROM, floppy drive, Universal Serial Bus (USB) devices such as memory sticks, Wireless-Fidelity (Wi-Fi) ports, printers, and scanners are not accessible by unauthorized personnel. The purpose of port protection is to prevent the download or transfer of confidential information and/or intellectual property by unauthorized users to a portable medium.
  • Switches are used to prevent a malicious user to power on/off the systems.
  • BIOS checks use password protection during the boot up process so that access to the operating system is controlled.
  • Encryption is used to make the folders and files secure so that unauthorized disclosure and modification is prevented.

Data with personnel

The information people possess in their memories also needs to be controlled and data protection measures are applicable. Operational procedures, such as not discussing confidential or personally identifiable information in public places or transmitting information through publicly accessible mediums, should be discouraged.

主站蜘蛛池模板: 潢川县| 壶关县| 莆田市| 庆云县| 镇安县| 福贡县| 深泽县| 武陟县| 平昌县| 科尔| 麻阳| 洮南市| 忻州市| 和林格尔县| 台南县| 宜兰县| 敦化市| 武夷山市| 河池市| 荔浦县| 新乡县| 吉水县| 溧阳市| 商都县| 巴楚县| 绥滨县| 滦南县| 南木林县| 绩溪县| 杭锦后旗| 石屏县| 和平区| 惠东县| 金沙县| 惠水县| 丹寨县| 达州市| 英吉沙县| 图们市| 林周县| 泸州市|