From the course: Securing Your Home Office
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Data security
- [Instructor] While the physical security of a home office is important, there's another security aspect to consider as well, and that's data security. And we can think about the security of data in two categories, data that's currently being used, and data that's not currently being used. While these both require security, the methods we use to secure them are a little bit different. Data that's being used, active data, could be open files or files that aren't open, but are on a disk that's mounted and ready to be used. And this kind of data is protected by our actions and by software security features. Inactive data, files that are stored on an unmounted disk should be protected from unauthorized access through encryption, and we'll take a look at that in a moment. Files on a mounted disk are generally accessible by the operating system and by software running on the operating system. Here malware or malicious software…
Contents
-
-
-
Working at home3m 20s
-
(Locked)
Work versus personal4m 23s
-
(Locked)
Physical security for the home office3m 44s
-
(Locked)
Data security3m 30s
-
(Locked)
Encryption2m 50s
-
(Locked)
Backups3m 13s
-
(Locked)
Wi-Fi and network security3m 3s
-
(Locked)
Understanding VPN3m 43s
-
(Locked)
Browsing the web securely5m 7s
-
(Locked)
Audio and video privacy5m 40s
-
(Locked)
Maintaining your system4m 37s
-
(Locked)
Mobile device security2m 44s
-
(Locked)
Scams targeting home workers2m 17s
-
-