Protection Mechanisms for Data at Rest
Course: IFIS/CS/1004
Mode: IND| ORG | GEN. Availability: PUB
Data at rest has proved to a more lucrative venture for cybercriminals owing to the fact that more volumes of valuable information are easily accessible at rest than when in transit. And in the midst of the COVID-19 pandemic prompting employees to work from geographically dispersed areas, data at rest has increasing become a usual spot for malicious actors since motivated attackers even need not have credentials to access unencrypted hard drives. Whereas conventional antivirus software and application firewalls are common security measures employed to foster data protection, social engineering remains a potentially open door to the enemy, resulting in compromised credentials, ransomware deployment and privileged access. With case studies to reflect on data theft scenarios, the course shades more light on how to apply robust protection techniques and best practices at network end-points.
Key learning outcomes:
- Recognize risks associated with unencrypted data in a state of rest.
- Reflect and draw actionable insights from case studies on data theft.
- Know how to deploy adequate security measures and protection tools for data on storage media.
- Effectively back up and retrieve data to foster cyber-resilient business processes.
Responses