Data integrity project: recovering from a destructive Malware attack
dc.contributor.author | Tobin, Donald, author | |
dc.contributor.author | Society of Quality Assurance, publisher | |
dc.date.accessioned | 2016-06-09T16:39:45Z | |
dc.date.available | 2016-06-09T16:39:45Z | |
dc.date.issued | 2016-06-03 | |
dc.description | Presented at the National data integrity conference: data sharing: the how, why, when and when not to share held on June 2-3, 2016 at University of Colorado, Denver, Colorado. The National Data Integrity Conference is a gathering of people sharing new challenges and solutions regarding research data and integrity. This conference aims to provide attendees with both an understanding of data integrity issues and impart practical tools and skills to deal with them. Topics addressed will include data privacy, openness, policy, education and the impacts of sharing data, how to do it, when to do it, and when not to. Speakers and audience members come from diverse fields such as: Academic Research; Information Technology; Quality Assurance; Regulatory Compliance; Private Industry; Grant Funding; Government. | |
dc.description | PowerPoint presentation during Lightning Talks given on June 3, 2016. | |
dc.description | Don is affiliated with the National Cybersecurity Center of Excellence. | |
dc.description.abstract | Data creators and users face a near-constant threat of destructive malware, ransomware and other malicious activities that can alter or destroy critical data. Information such as financial records, transaction records, research data, and even the software to analyze and manipulate the data are typically targets. These types of data integrity attacks, especially when they target an entire organization, can have a catastrophic impact on an organization's credibility and ability to operate. This project explores methods to effectively recover and restore systems to normal operations after a data corruption attack. Here at the NCCoE, we take on projects to provide practical applications of cybersecurity solutions to real-world problems. | |
dc.format.medium | born digital | |
dc.format.medium | Presentation slides | |
dc.identifier.uri | http://hdl.handle.net/10217/172988 | |
dc.identifier.uri | http://dx.doi.org/10.25675/10217/172988 | |
dc.language | English | |
dc.language.iso | eng | |
dc.publisher | Colorado State University. Libraries | |
dc.relation.ispartof | 2nd Annual National Data Integrity Conference (2016) | |
dc.relation.ispartof | National data integrity conference, 2016 | |
dc.rights.license | This presentation is open access and distributed under the terms and conditions of the Creative Commons Attribution 4.0 International (CC BY 4.0). | |
dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | |
dc.subject | cybersecurity | |
dc.subject | technology | |
dc.subject | secure cyber infrastructure | |
dc.title | Data integrity project: recovering from a destructive Malware attack | |
dc.title.alternative | Recovering data integrity after a destructive Malware attack | |
dc.type | Text |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- CONF2016NDIC_TobinDonald.pdf
- Size:
- 1.14 MB
- Format:
- Adobe Portable Document Format