Escolar Documentos
Profissional Documentos
Cultura Documentos
Discretionary
Enforces data owner-defined sharing of information resources
Best defense:
Ongoing security awareness
5.3.8 Storing, Retrieving, Transporting and Disposing of Confidential Information (continued) Preserving information during shipment or storage
Recommendations applicable to all types of media
Keep out of direct sunlight Keep free of liquids Keep free of dust Keep media away from exposure to magnetic fields, radio equipment or any sources of vibration Do not transport in areas and at times of exposure to strong magnetic storm
Precautions
Store hard drives in antistatic bags, and be sure that the person removing them from the bag is static-free. If the original box and padding for the hard drive is available, use it for shipping. Avoid styrofoam packaging products or other materials that can cause static electricity. Quick drops or spikes in temperature are a danger, since such changes can lead to hard drive rashes. If the hard drive has been in a cold environment, bring it to room temperature prior to installing and using it. Avoid sudden mechanical shocks or vibrations. Store tapes vertically. Store tapes in acid-free containers. Write-protect tapes immediately. When handling the floppy, pick it up by the label. The mylar surface must never be touched. Write labels using a felt tip pen only. Handle by the edges or by the hole in the middle. Be careful not to bend the CD. Avoid long-term exposure to bright light. Store in a hard jewel case, not in soft sleeves.
Magnetic media
Floppy disks
Masquerading
Packet replay Phishing Message modification Unauthorized access through the Internet or web-based services Denial of service Dial-in penetration attacks
Masquerading
Packet replay Phishing Message modification Unauthorized access through the Internet or web-based services Denial of service Dial-in penetration attacks
Masquerading
Packet replay Phishing Message modification Unauthorized access through the Internet or web-based services Denial of service Dial-in penetration attacks
5.4.5 Encryption
Key elements of encryption systems
Encryption algorithm
Encryption key Key length
5.4.6 Viruses
Viruses attack four parts of the computer
Executable program files The file directory system, which tracks the location of all the computers files Boot and system areas, which are needed to start the computer Data files