Data Protection Features

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
57 minutes
Difficulty
Intermediate
CEU/CPE
1
Video Transcription
00:01
Hello there. Welcome to protecting data. My name is Alberto Garcia, and I will be guiding you through this process. Their protection is the process off faith gardening Porter. Information from corruption compromise or lost
00:17
the importance of data protection increases as the amount off data created on stored continues to grow our exceptional rates.
00:25
There is also a little tolerance for downtime that can make it impossible to access important information,
00:33
data protection and compasses. Ah, host off technology business processes on best practices. As some experts agree, a breach off sensitive or proprietary data can have costly legal financial on public relation consequences. For a company
00:52
unfortunately,
00:53
due to constantly changing security threats, protecting a company's valuable data from their bridge can be extremely challenging.
01:02
Protecting systems on data can be a difficult task, but Lisa is more important.
01:08
Data protection is highly relevant among businesses, especially in the ground. In digital marketplace. Their protection is viewed to include their privacy and security. It involves the collection on youth off data on its accessory lady for various users. Within the organizational network,
01:30
we have a started that their encryption is an important fisher for protecting data at rest on in transit.
01:38
Different techniques must be used for different expects off data protection. For example, security storage infrastructure is necessary to assure that data is not altered or maliciously destroyed
01:53
to protect against in a Burton data loss or permanent corruption. A solid backup, a strategy with supplementary technology if needed.
02:01
Backup has traditionally been the key to an effective data protection strategy. With these data was pretty quick opiate toe, a tape drive or a tape library where you will see it until something with wrong with the primary data storage. That's when the backup data will be accessed
02:22
and used to restore lost or damaged data.
02:24
Backups are no longer a standalone function. Instead, they're being combined with other data protection functions to say the storage on Lao were costs. Let's analyze some off these more mortar fissures.
02:42
Beats Loker Drive. Encryption is a data protection feature our little for the Willows Beast operating systems on higher versions there integrates with operating system on addresses, the treads off data theft or exposure for lost, stolen or inappropriately the commission Computers
03:01
bit Loker and create the ex Trife under contents will in Crete. It unauthorized users cannot see the files even if the computer had been stolen or the hard disk was taken with Locker. Also works on removal stories drive in order to access on in Crete. The drive
03:21
you think most authenticate or looking
03:24
Windows also used the trusted platform model to determine if any of the computer start a process have been altered.
03:34
The TPM is a microchip added to the machine to provide security functions mainly focused on encryption off data by leveraging bulls. Beat Loker on T P N Data's looked until the right credentials are passed to the machine.
03:52
In addition to logging or password
03:54
appeal or startup, key can be used to prevent unauthorized access to the data on the drive.
04:03
The principal off least privilege is a security strategy applicable to different areas, which is based on the idea off on Lee granting those permissions that are necessary for the performance off a certain activity.
04:20
Organizations should minimize a minister these privileges on on. Lee used a minister if accounts when they are needed.
04:29
Automated tools should be used to lease all administrative accounts on validate that its user that has a minister the privileges is authorized by a senior executive. All administrative passwords should be complex, including numbers letters on a special characters
04:48
without dictionary wars in the passwords. All default passwords should be changed before deploying any new devices in the network system. And, of course, passwords in storage should be encrypted or hashed.
05:05
Speaking off privileges on permissions Active directory is accomplished. Directory service that started I said, I'm a Manager or Windows. But since 2008 Active Directory has performed a number of critical directories. Authentication on identity of a service is,
05:25
you know, the worst
05:26
active directory determines what each user can do on the network. Microsoft has built products that integrate with the active territory Service is to improve network security. Each object in active directory has unassociated security. The scripture.
05:45
This this Scripture defines the information's on that object.
05:48
All these attributes comprise the permission said, or access control least permissions in active directory, our privileges granted to use hers or groups to perform certain operations on objects users on groups are assigned permissions to read
06:09
right, create Chuy's on others over objects such as five or folders.
06:15
When the matter off data deletion is considered, it is important to know how the data is deleted.
06:24
We can do this by clearing
06:26
in here. The data on the media is eradicated before reusing the media on at the same time, providing an acceptable level of protection for the data that was in the media before it was cleared
06:41
for sanitization on a SEC. Double level off rotation to the pre use data is not provided. Social type of information is usually released for use at a lower classifications level.
06:56
The data masculinity leak in both. Removing all the identifiable, indistinguishable characteristics from the data in order to make it on animals on still be operable.
07:09
No, here's a question for you.
07:12
Which one is a security strategy applicable to different areas, which is based on the idea off only Grand Tindall's permissions that are necessary for the performers off a certain activity
07:25
if it a day and correction,
07:28
or be bit Loker drive encryption or maybe see principal off lease privilege
07:33
or the data deletion
07:36
if you fitzy do it right,
07:40
I said many studies privileges should be minimized. I'm only used a Mr Difficulty when they are needed
Up Next