Changes

Online Learning

1,098 bytes added, 9 years ago
/* Lesson 4 - Digital information management */
==Lesson 4 - Digital information management==
This section describes the technology and methods for managing your digital data. We will talk about preventing unauthorised unauthorized access to your data, making sure that you do not lose important documents and we will discuss the correct procedures for destroying unwanted data as well as cleaning a computer of traces left behind from past working sessions. Secure data management should be on the top of your to-do list if you work with information that you do not want to lose or expose to an outside party. Once you have set-up the tools described in this chapter and assimilate the processes into your daily working routine, you will make a huge leap towards keeping your data private and secure.
* [[Information storage]]
Unauthorized access to the information on your computer or portable storage devices can be carried out remotely, if the 'intruder' is able to read or modify your data over the Internet; or physically, if he manages to get hold of your hardware or simply sit behind your computer.
* [[Destroying data]]
You may be concerned that your encrypted volume not only protects your data from unauthorized access but also indicates precisely where you store the information that you most wish to protect. In a tight situation you could be forced to reveal the volume password through intimidation, interrogation and possibly worse.
* [[Destroying temporary files]]
Fact: when you delete a file, even after you empty the Recycle bin, the contents of that file remain on your hard drive and can be recovered by anyone who has the right tools and a little luck.
Aside from destroying unwanted data from your digital memory device, you should also consider destroying temporary files.
* [[Backup]]
It is too late to think about having a backup once you lose or break your computer, USB memory stick. Obviously an up to date backup has to created in advance of the catastrophe.
==Lesson 5 – Digital investigative journalism==
252
edits