SlideShare a Scribd company logo
{elysiumsecurity}
PROTECTING YOUR DATA
Version: 1.2a
Date: 27/06/2018
Author: Sylvain Martinez
Reference: ESC7-MUSCL
Classification: Public
cyber protection & response
{elysiumsecurity}
cyber protection & response
2
BEST PRACTICEDATA SECURITYCONTEXT
• Data security scope;
• Data security concept;
• Data security
solutions;
CONTENTS
Public
• Data definition;
• Data form ;
• Data type;
• Data security goals,
threats and im pacts;
• Data security
awareness;
• Safe behaviours;
• Take away.
{elysiumsecurity}
cyber protection & response
3
BEST PRACTISEDATA SECURITYCONTEXT
DATA DEFINITION
Public
0 1 0 0 0 1 1 1 0 1 0 0 0 1 0 1 0 1
ANYTHING CREATED DIGITALLY
"transmittable and storable
computer information" - 1946
Picture from PIXABAY
{elysiumsecurity}
cyber protection & response
4
BEST PRACTISEDATA SECURITYCONTEXT
DATA FORM
Public Icons from the Noun Project unless stated otherwise
{elysiumsecurity}
cyber protection & response
5
BEST PRACTISEDATA SECURITYCONTEXT
DATA TYPE
Public
{elysiumsecurity}
cyber protection & response
6
BEST PRACTISEDATA SECURITYCONTEXT
DATA SECURITY GOALS, THREATS & IMPACTS
Public
CONFIDENTIALITY
C
INTEGRITY
A
AVAILIBILITY
I
SECURITY
GOALS
CIA vs. MPH
SECURITY
IMPACTS
DATA
LEAKAGE
UNAUTHORISED
MODIFICATION
DESTRUCTION
& LOCK
MALWARE
M
HACKING
H
PHISHING
P
SECURITY
THREATS
{elysiumsecurity}
cyber protection & response
7
BEST PRACTISEDATA SECURITYCONTEXT
DATA SECURITY SCOPE
Public
USAGE
Creation
Consumption
Destruction
Transit
Transmission
Remote Access
COMMUNICATION
Saved
Sleep State
Backup
AT REST
SYSTEM ENCRYPTION
FILE/DATA ENCRYPTION
COMMUNICATION ENCRYPTION
{elysiumsecurity}
cyber protection & response
8
BEST PRACTISEDATA SECURITYCONTEXT
DATA SECURITY CONCEPT
Public
1. PROTECT DATA
DATA POLICY
DATA CLASSIFICATION AND ROLES
ACCESS CONTROLS
2. RESTRICT DATA ACCESS
LABELLING
LOGS
FILE VISIBILITY
3. MONITOR DATA ACTIVITY
BITLOCKER, FIREVAULT, ENCFS, ZIP
DRM, PASSWORD SAFE
TLS/SSL
{elysiumsecurity}
cyber protection & response
9
BEST PRACTISEDATA SECURITYCONTEXT
DATA SECURITY SOLUTIONS
Public
1. PROTECT DATA
DRM
PASSWORDS
ACCESS RIGHTS
2. RESTRICT DATA ACCESS
DLP, DRM
IDS
DATA INVENTORY
3. MONITOR DATA ACTIVITY
{elysiumsecurity}
cyber protection & response
10
BEST PRACTISEDATA SECURITYCONTEXT
DATA SECURITY AWARENESS
Public
FROM TOENVIRONMENT
{elysiumsecurity}
cyber protection & response
11
BEST PRACTISEDATA SECURITYCONTEXT
DATA SECURITY AWARENESS
Public
NATURE
{elysiumsecurity}
cyber protection & response
12
BEST PRACTISEDATA SECURITYCONTEXT
DATA SECURITY AWARENESS
Public
PAY ATTENTION
{elysiumsecurity}
cyber protection & response
13
BEST PRACTISEDATA SECURITYCONTEXT
SAFE BEHAVIOURS
Public
HALF TRUTH
BACKUP DATA
YOU CAN SAY NO
DO NOT RE-USE CREDENTIALS
CHANGE DEFAULT PASSWORD
THINK BEFORE YOU CLICK!
{elysiumsecurity}
cyber protection & response
14
BEST PRACTISEDATA SECURITYCONTEXT
TAKE AWAY
Public
1. USE STRONG PASSWORDS AND A
PASSWORD SAFE
3. ENCRYPT YOUR DATA
5. ENABLE DUAL FACTOR
AUTHENTICATION
2. USE UNIQUE PASSWORDS
4. BACKUP YOUR DATA
6. SCREENLOCK AUTOMATIC AND WHEN
AWAY
7. BE AWARE OF YOUR ENVIRONMENT
9. NO DEFAULT PASSWORD/CONFIG
11. PAY ATTENTION TO WARNINGS
8. CUSTOM IS GOOD, STANDARD IS
BETTER
10. UP TO DATE ANTI VIRUS / ENDPOINT
PROTECTION
12. THINK BEFORE YOU CLICK!
{elysiumsecurity}
cyber protection & response
© 2018 Elysium Security Ltd.
All Rights Reserved
www.elysium security.com
ElysiumSecurity provides practical expertise to identify
vulnerabilities, assess their risks and impact, remediate
those risks, prepare and respond to incidents as well as raise
security awareness through an organization.
ElysiumSecurity provides high level expertise gathered
through years of best practices experience in large
international companies allowing us to provide advice best
suited to your business operational model and priorities.
ABOUT ELYSIUMSECURITY LTD.
ElysiumSecurity provides a portfolio of Strategic and Tactical
Services to help companies protect and respond against Cyber
Security Threats. We differentiate ourselves by offering discreet,
tailored and specialized engagements.
Operating in Mauritius and in the United Kingdom,
our boutique style approach means we can easily adapt to your
business operational model and requirements to provide a
personalized service that fits your working environment.

More Related Content

PDF
OFFENSIVE IDS
PDF
The Art of CTF
PDF
Mobile Security Assessment
PDF
INCIDENT RESPONSE CONCEPTS
PDF
INCIDENT RESPONSE OVERVIEW
PDF
SOCIAL MEDIA AS A CYBER WEAPON
PDF
PROGRAMMING AND CYBER SECURITY
PDF
Talk1 esc3 muscl-standards and regulation_v1_1
OFFENSIVE IDS
The Art of CTF
Mobile Security Assessment
INCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE OVERVIEW
SOCIAL MEDIA AS A CYBER WEAPON
PROGRAMMING AND CYBER SECURITY
Talk1 esc3 muscl-standards and regulation_v1_1

What's hot (20)

PDF
2019 CYBER SECURITY TRENDS REPORT REVIEW
PDF
VIRTUAL CISO AND OTHER KEY CYBER ROLES
PDF
DATA LOSS PREVENTION OVERVIEW
PDF
OFFICE 365 SECURITY
PDF
INCIDENT RESPONSE NIST IMPLEMENTATION
PDF
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
PPTX
Ict conf td-evs_pcidss-final
PDF
Critical Infrastructure Protection from Terrorist Attacks
PPTX
Ivan dragas get ahead of cybercrime
PPTX
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
PPTX
2015 ISA Calgary Show: IACS Cyber Incident Preparation
PPTX
Mobile Security: 2016 Wrap-Up and 2017 Predictions
PDF
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
PDF
Talk2 esc4 muscl-ids_v1_2
PDF
Tomorrow Starts Here - Security Everywhere
PDF
8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team
PPTX
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
PDF
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
PPTX
Debunking the Hacker Hype: The Reality of Widespread Blackouts
PPTX
How Aetna Mitigated 701 Malware Infections on Mobile Devices
2019 CYBER SECURITY TRENDS REPORT REVIEW
VIRTUAL CISO AND OTHER KEY CYBER ROLES
DATA LOSS PREVENTION OVERVIEW
OFFICE 365 SECURITY
INCIDENT RESPONSE NIST IMPLEMENTATION
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
Ict conf td-evs_pcidss-final
Critical Infrastructure Protection from Terrorist Attacks
Ivan dragas get ahead of cybercrime
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
2015 ISA Calgary Show: IACS Cyber Incident Preparation
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Talk2 esc4 muscl-ids_v1_2
Tomorrow Starts Here - Security Everywhere
8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting
Debunking the Hacker Hype: The Reality of Widespread Blackouts
How Aetna Mitigated 701 Malware Infections on Mobile Devices
Ad

Similar to Talk1 esc7 muscl-dataprotection_v1_2 (20)

PDF
Data Protection - Safeguarding Your Business in the Digital Age.pdf
PDF
INTRODUCTION TO CYBER FORENSICS
PPTX
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
PDF
Measure To Avoid Cyber Attacks
PDF
Measures to Avoid Cyber-attacks
PPTX
Cyber Security Presentation(Neon)xu.pptx
PDF
Introduction-to-Cyber-Security presentation.pdf
PDF
9 Best Enterprise Data Security and Privacy Practices in 2025_compressed (1).pdf
PPTX
cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx
PPTX
Basic_computerHygiene
PDF
7 Practices To Safeguard Your Business From Security Breaches!
PPTX
Understanding Cyber Security and benifit
PDF
The CISO’s Guide to Being Human
PDF
Cyber Security Protecting Your Business | Digitdefence
PPTX
The Business Owner's Guide to Data Protection & Security
PPTX
CyberCare Pro - Cybersecurity for SME's updated.pptx
PPTX
Defensible cybersecurity-jan-25th-
PPTX
Data Security: Are you Protected?
PDF
CIA-Triad-Presentation.pdf
PDF
1. introduction to cyber security
Data Protection - Safeguarding Your Business in the Digital Age.pdf
INTRODUCTION TO CYBER FORENSICS
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Measure To Avoid Cyber Attacks
Measures to Avoid Cyber-attacks
Cyber Security Presentation(Neon)xu.pptx
Introduction-to-Cyber-Security presentation.pdf
9 Best Enterprise Data Security and Privacy Practices in 2025_compressed (1).pdf
cybersecurity.pptx cybersecurity.pptx cybersecurity.pptx
Basic_computerHygiene
7 Practices To Safeguard Your Business From Security Breaches!
Understanding Cyber Security and benifit
The CISO’s Guide to Being Human
Cyber Security Protecting Your Business | Digitdefence
The Business Owner's Guide to Data Protection & Security
CyberCare Pro - Cybersecurity for SME's updated.pptx
Defensible cybersecurity-jan-25th-
Data Security: Are you Protected?
CIA-Triad-Presentation.pdf
1. introduction to cyber security
Ad

More from Sylvain Martinez (11)

PDF
INTRODUCTION TO CRYPTOGRAPHY
PDF
PHISHING PROTECTION
PDF
IOT Security
PDF
ARE YOU RED TEAM READY?
PPTX
GDPR SECURITY ISSUES
PDF
Risk on Crypto Currencies
PDF
Talk1 esc7 muscl-gdpr_debate_v1_2
PPTX
Ethical Hacking
PDF
INCIDENT HANDLING IN ORGANISATIONS
PDF
Talk2 esc2 muscl-wifi_v1_2b
PDF
Talk1 muscl club_v1_2
INTRODUCTION TO CRYPTOGRAPHY
PHISHING PROTECTION
IOT Security
ARE YOU RED TEAM READY?
GDPR SECURITY ISSUES
Risk on Crypto Currencies
Talk1 esc7 muscl-gdpr_debate_v1_2
Ethical Hacking
INCIDENT HANDLING IN ORGANISATIONS
Talk2 esc2 muscl-wifi_v1_2b
Talk1 muscl club_v1_2

Recently uploaded (20)

PPTX
Machine Learning_overview_presentation.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
1. Introduction to Computer Programming.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Encapsulation theory and applications.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPT
Teaching material agriculture food technology
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
TLE Review Electricity (Electricity).pptx
Machine Learning_overview_presentation.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Programs and apps: productivity, graphics, security and other tools
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
1. Introduction to Computer Programming.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Heart disease approach using modified random forest and particle swarm optimi...
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Unlocking AI with Model Context Protocol (MCP)
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
Group 1 Presentation -Planning and Decision Making .pptx
Encapsulation theory and applications.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Teaching material agriculture food technology
OMC Textile Division Presentation 2021.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
TLE Review Electricity (Electricity).pptx

Talk1 esc7 muscl-dataprotection_v1_2

  • 1. {elysiumsecurity} PROTECTING YOUR DATA Version: 1.2a Date: 27/06/2018 Author: Sylvain Martinez Reference: ESC7-MUSCL Classification: Public cyber protection & response
  • 2. {elysiumsecurity} cyber protection & response 2 BEST PRACTICEDATA SECURITYCONTEXT • Data security scope; • Data security concept; • Data security solutions; CONTENTS Public • Data definition; • Data form ; • Data type; • Data security goals, threats and im pacts; • Data security awareness; • Safe behaviours; • Take away.
  • 3. {elysiumsecurity} cyber protection & response 3 BEST PRACTISEDATA SECURITYCONTEXT DATA DEFINITION Public 0 1 0 0 0 1 1 1 0 1 0 0 0 1 0 1 0 1 ANYTHING CREATED DIGITALLY "transmittable and storable computer information" - 1946 Picture from PIXABAY
  • 4. {elysiumsecurity} cyber protection & response 4 BEST PRACTISEDATA SECURITYCONTEXT DATA FORM Public Icons from the Noun Project unless stated otherwise
  • 5. {elysiumsecurity} cyber protection & response 5 BEST PRACTISEDATA SECURITYCONTEXT DATA TYPE Public
  • 6. {elysiumsecurity} cyber protection & response 6 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY GOALS, THREATS & IMPACTS Public CONFIDENTIALITY C INTEGRITY A AVAILIBILITY I SECURITY GOALS CIA vs. MPH SECURITY IMPACTS DATA LEAKAGE UNAUTHORISED MODIFICATION DESTRUCTION & LOCK MALWARE M HACKING H PHISHING P SECURITY THREATS
  • 7. {elysiumsecurity} cyber protection & response 7 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY SCOPE Public USAGE Creation Consumption Destruction Transit Transmission Remote Access COMMUNICATION Saved Sleep State Backup AT REST
  • 8. SYSTEM ENCRYPTION FILE/DATA ENCRYPTION COMMUNICATION ENCRYPTION {elysiumsecurity} cyber protection & response 8 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY CONCEPT Public 1. PROTECT DATA DATA POLICY DATA CLASSIFICATION AND ROLES ACCESS CONTROLS 2. RESTRICT DATA ACCESS LABELLING LOGS FILE VISIBILITY 3. MONITOR DATA ACTIVITY
  • 9. BITLOCKER, FIREVAULT, ENCFS, ZIP DRM, PASSWORD SAFE TLS/SSL {elysiumsecurity} cyber protection & response 9 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY SOLUTIONS Public 1. PROTECT DATA DRM PASSWORDS ACCESS RIGHTS 2. RESTRICT DATA ACCESS DLP, DRM IDS DATA INVENTORY 3. MONITOR DATA ACTIVITY
  • 10. {elysiumsecurity} cyber protection & response 10 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY AWARENESS Public FROM TOENVIRONMENT
  • 11. {elysiumsecurity} cyber protection & response 11 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY AWARENESS Public NATURE
  • 12. {elysiumsecurity} cyber protection & response 12 BEST PRACTISEDATA SECURITYCONTEXT DATA SECURITY AWARENESS Public PAY ATTENTION
  • 13. {elysiumsecurity} cyber protection & response 13 BEST PRACTISEDATA SECURITYCONTEXT SAFE BEHAVIOURS Public HALF TRUTH BACKUP DATA YOU CAN SAY NO DO NOT RE-USE CREDENTIALS CHANGE DEFAULT PASSWORD THINK BEFORE YOU CLICK!
  • 14. {elysiumsecurity} cyber protection & response 14 BEST PRACTISEDATA SECURITYCONTEXT TAKE AWAY Public 1. USE STRONG PASSWORDS AND A PASSWORD SAFE 3. ENCRYPT YOUR DATA 5. ENABLE DUAL FACTOR AUTHENTICATION 2. USE UNIQUE PASSWORDS 4. BACKUP YOUR DATA 6. SCREENLOCK AUTOMATIC AND WHEN AWAY 7. BE AWARE OF YOUR ENVIRONMENT 9. NO DEFAULT PASSWORD/CONFIG 11. PAY ATTENTION TO WARNINGS 8. CUSTOM IS GOOD, STANDARD IS BETTER 10. UP TO DATE ANTI VIRUS / ENDPOINT PROTECTION 12. THINK BEFORE YOU CLICK!
  • 15. {elysiumsecurity} cyber protection & response © 2018 Elysium Security Ltd. All Rights Reserved www.elysium security.com ElysiumSecurity provides practical expertise to identify vulnerabilities, assess their risks and impact, remediate those risks, prepare and respond to incidents as well as raise security awareness through an organization. ElysiumSecurity provides high level expertise gathered through years of best practices experience in large international companies allowing us to provide advice best suited to your business operational model and priorities. ABOUT ELYSIUMSECURITY LTD. ElysiumSecurity provides a portfolio of Strategic and Tactical Services to help companies protect and respond against Cyber Security Threats. We differentiate ourselves by offering discreet, tailored and specialized engagements. Operating in Mauritius and in the United Kingdom, our boutique style approach means we can easily adapt to your business operational model and requirements to provide a personalized service that fits your working environment.