Protect Your Work! Intro to Data Security for Graduate Students

 

 

Please go to:

https://slides.com/cypurr/cuny-data-security#/

Series

Your Perspective

http://bit.ly/ITP-images

Find/make images that depict your mental images of "Data security"

Holistic Approach

Holistic Approach

  • Balance, not purity
  • Improving, not finishing

Threat Modeling

  1. What do I want to protect?
  2. Who am I protecting it from?
  3. How likely is this threat?
  4. What are the consequences if I fail?
  5. How much trouble am I willing to go through to prevent the consequences?
  6. Implement change && return to (1)

Threat #1: You

Defend yourself from yourself: maintain good backup practices

Common Examples:

  • Saving a file while you are working on it
  • Saving copies for different versions
    • realFINAL-FINALcopy(2).docx
  • Saving to external HDD or Flash
  • Printing a copy
  • Emailing to self
  • Uploading Dropbox/Gdrive/OneDrive for Business

Backup Strategies: Crunch v. Maintenance

Designing a backup strategy

  1. Standardize: Find a naming/saving style that works
    • eg. Title_2018-11-12.doc
    • eg. Embrace the desktop clutter
  2. Minimum of "3 - 2 -1 Backup"
    • 3 copies of a file
    • 2 forms of storage
    • 1 off-site location
  3. Automate as much as possible

$ bash

Levels of backup

  • Full disk clone
    • 'dd' in commandline
    • Clonezilla
  • File/Folder auto-backup
    • On a PC:
      • Duplicati
      • borg
    • On a Network:
      • Syncthing
    • Across the web:
      • Duplicati
      • rClone/Cryptomator
      • IFTTT
      • NextCloud

Threats 2+: Data security

Data at rest v Data in motion

  • At rest:
    • Physical access
    • Web access
    • Hardware/Software failures hazards
  • In Motion
    • "On the wire" security
    • Infrastructure
    • Shared security (herd immunity)

Important File Actor Map

You

Your PC

Your Phone

Your server space

Peer's server space

Peer

Peer's PC

Peer's Phone

CUNY PC

ISPs

Encryption (without the math)

You

Server

In motion

VPNs

You

Server

In motion

"client-side"

"Server-side"

Online storage

Public or Private?

Maintain authorship?

Maintain authorship?

Data at Rest

  • Access
    • Who controls the hardware?
    • Who has access to your files?
      • Air gap
    • Check the settings
    • Strong passwords
  • Encryption
    • Veracrypt
  • Collaboration
    • Establish an access protocal
    • Establish a moving protocol

Data at Rest - Know your Rights

  • Access
    • Passwords are protected by 5th amendment
    • biometrics (i.e. fingerprint) are NOT.
    • Forced access: 0days, GrayKey, etc
    • 4th amendment, but not on the border
      • Border includes 100 mi from international airport
  • Collaboration
    • Tools like TOR now = probable cause
  • Subpoena-proof Standard
    • Includes Signal Messenger, Private Internet Access VPN

Scenario:

  • You are doing controversial research in an authoritarian country. You are also worried that this research may stir interest from US intelligence agencies
    • What do you do before your trip?
    • What do you bring?
    • How do you store/more data during your trip?
  • Harm-reduction model

Reflections

Cryptoparty for CUNY Grad Students

By cypurr

Cryptoparty for CUNY Grad Students

  • 160