Protect Your Work! Intro to Data Security for Graduate Students
Please go to:
https://slides.com/cypurr/cuny-data-security#/
Series
http://bit.ly/ITP-images
Find/make images that depict your mental images of "Data security"
Threat Modeling
Threat #1: You
Defend yourself from yourself: maintain good backup practices
Common Examples:
Backup Strategies: Crunch v. Maintenance
Designing a backup strategy
$ bash
Levels of backup
Threats 2+: Data security
Data at rest v Data in motion
Important File Actor Map
You
Your PC
Your Phone
Your server space
Peer's server space
Peer
Peer's PC
Peer's Phone
CUNY PC
ISPs
Encryption (without the math)
You
Server
In motion
VPNs
You
Server
In motion
"client-side"
"Server-side"
Online storage
Public or Private?
Maintain authorship?
Maintain authorship?
Data at Rest
Data at Rest - Know your Rights
Scenario:
Reflections