data classification and data security...

Post on 17-Oct-2020

14 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Data ClassificationData ClassificationAnd Data Security HandlingAnd Data Security Handling

19th

May 2011

Nick Tate

Source: http://www.officeworks.com.au/retail/products/furniture/filing‐solutions/excalibre‐steel‐filing‐cabinet/owexca4dsr

Top Secret

Data Classification is the  method of establishing the 

level of sensitivity that  should apply to data held 

by an organisation

Source: http://news.cnet.com/2300‐10805_3‐10001679.html?tag=mncol

World’s Servers  process 9.57  Zettabytes a year

Computerworld May 2011

Top Secret

Source: http://www.jamesbondwiki.com/photo/9707577/Goldeneye102

Top Secret

Source: http://www.pcpd.org.hk/

Confidentiality

Privacy

Confidential

Not Confidential

Not Private Private

Confidentiality

Privacy

CONFIDENTIAL PRIVATE & CONFIDENTIAL

PUBLIC PRIVATE

Confidential

Not Confidential

Not Private Private

Confidentiality

Privacy

CONFIDENTIAL PRIVATE & CONFIDENTIAL

PUBLIC PRIVATE

Confidential

Not Confidential

Not Private Private

Confidentiality

Privacy

PRIVATE

Source: http://en.wikipedia.org/wiki/File:Wikileaks_logo.svg

Source: http://www.photoeverywhere.co.uk/britain/bornemouth/slides/10‐30cloister2.htm

“435 Reported Breaches affecting 8.5  million records at US Institutions of 

Higher Education since 2005”Computerworld, May 2011

Source: http://en.wikipedia.org/wiki/File:Yellow_Light_of_Death‐_PlayStation_3.png

STANDARDS

Photo: Emily Barney 

Perfect is the  enemy of good

Source: http://en.wikipedia.org/wiki/File:New_York_utility_lines_in_1890.jpg

Complexity  breeds 

contempt

Source: http://en.wikipedia.org/wiki/File:KingsCollegeChapelWest.jpg

Photo: Andrew Dunn

Source: http://beargrylls.com/

Establish an  implementation plan

“No Plan  Survives Contact 

with the Enemy”

Field Marshal Helmuth Karl 

Bernhard Graf

von Moltke 

Source: http://www.free‐pictures‐photos.com/clouds/cloud‐e4y0.jpg

What about Clouds?

LOCATION,

LOCATION,

LOCATION

Cloud Security  Considerations

Source:  http://www.science.uq.edu.au/facilities/hirs‐about‐us

ContactContact

Dr Nick Tate

Email: N.Tate@rdsi.uq.edu.au

top related