{"id":25,"date":"2024-04-04T04:36:11","date_gmt":"2024-04-04T01:36:11","guid":{"rendered":"https:\/\/sisu.ut.ee\/andmehaldus\/data-storage-and-information-security\/"},"modified":"2024-04-16T17:04:19","modified_gmt":"2024-04-16T14:04:19","slug":"data-storage-and-information-security","status":"publish","type":"page","link":"https:\/\/sisu.ut.ee\/andmehaldus\/data-storage-and-information-security\/?lang=en","title":{"rendered":"Data Storage and Information Security"},"content":{"rendered":"<p>\n\tThis topic is about data storage, the making of backups and information security in the course of a research project.\u00a0\u00a0\n<\/p>\n<p>\n\tData can be stored by using different ways and methods, such as cloud solutions, hard drive, external hard drive, or mobile devices.\n<\/p>\n<blockquote>\n<p>\n\t\tAll participants of a research group have to be clear about which data storage methods are acceptable.\n\t<\/p>\n<\/blockquote>\n<p>\n\tThe objective of these activities is to ensure:\n<\/p>\n<ul>\n<li>\n\t\t<strong>Availability<\/strong> \u2013 data must be available and accessible\n\t<\/li>\n<li>\n\t\t<strong>Integrity<\/strong> \u2013 data must be accurate, complete and up-to-date\n\t<\/li>\n<li>\n\t\t<strong>Confidentiality<\/strong> \u2013 data must be available only for authorised persons or systems\n\t<\/li>\n<\/ul>\n<p>\n\tThe most secure option is, certainly, to use the central servers of the university, which are provided with IT services, including the making of backups.\n<\/p>\n<p>\n\tUsing of cloud services is also secure, but it can have shortcomings, especially in the cases where personal data are processed. Providers of cloud services (e.g. Dropbox, OneDrive) may not be located in the European Union and it cannot be guaranteed that the data would always be processed according to the General Data Protection Regulation. That means, these services are not acceptable in storing research data.\u00a0\n<\/p>\n<blockquote>\n<p>\n\t\tUnencrypted personal data must not\u00a0 be stored in remote servers (\u2018in the cloud\u2019).\n\t<\/p>\n<\/blockquote>\n<p>\n\tCloud solutions are well suitable for the cooperation of researches in different locations.\n<\/p>\n<p>\n\tData are often stored in the computers which are used by the research group or in personal computers of the work group members. In such cases, the making of backups may become a problem.\n<\/p>\n<p>\n\tMaking of a <strong>backup <\/strong>is the creation of a copy of the state of the data or the programmes at a given moment, which would allow to restore them up to that given moment after a security incident.\n<\/p>\n<p>\n\tThe <strong>incident<\/strong> is some unfortunate event, due to which data are lost, such as the physical destruction due a fire, unintentional deleting, a crash of the hard drive or the operating system, etc.\n<\/p>\n<blockquote>\n<p>\n\t\tMaking of backups should follow the 3-2-1 rule, meaning that three copies of the backup should be stored on two different storage media, one of which is located far away at a different location.\n\t<\/p>\n<\/blockquote>\n<p>\n\tEach researcher is responsible for using the most secure data storage environment or device. It is quite difficult to follow this rule when using external hard drives or mobile devices. Therefore, when the gathering of data requires the using of some mobile device (tablet, camcorder, audio recorder), it is advisable to save the data at the earliest possible moment on some secure media. Mobile devices are also prone to malfunctioning, destruction, loss or theft, making them less secure.\n<\/p>\n<p>\n\tThis example gives an idea about how and where master\u2019s students store their data. We can conclude that even with data-intensive research, if 81% of the data are on personal computers or external hard drives, it is not stored in the most practical and safest way\u00a0\n<\/p>\n<p style=\"text-align: center\">\n\t<img decoding=\"async\" alt=\"datastorage\" src=\"https:\/\/sisu.ut.ee\/wp-content\/uploads\/sites\/301\/datastorage.png\" style=\"width: 600px;height: 324px\">\n<\/p>\n<p>\n\tMeera B.M.,\u00a0 Hiremath V. Data-intensive research in physics: challenges and perspectives.\u00a0<em>Ann Lib Inf Stud<\/em>\u00a065 (2018) 43-49.\n<\/p>\n<p>\n\tCompared to postgraduate practices in 2018, the data storage locations used by researchers were somewhat more secure in 2022, but there was still too much use of local and personal devices:\n<\/p>\n<p style=\"text-align: center\">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"745\" height=\"372\" class=\"alignnone wp-image-142\" src=\"https:\/\/sisu.ut.ee\/wp-content\/uploads\/sites\/301\/locations.png\" title=\"locations.png\" alt=\"Locations\" srcset=\"https:\/\/sisu.ut.ee\/wp-content\/uploads\/sites\/301\/locations.png 745w, https:\/\/sisu.ut.ee\/wp-content\/uploads\/sites\/301\/locations-300x150.png 300w\" sizes=\"auto, (max-width: 745px) 100vw, 745px\">\n<\/p>\n<p>\n\tResource:\u00a0European Commission, Directorate-General for Research and Innovation,\u00a0European Research Data Landscape \u2013 Final report, Publications Office of the European Union, 2022,\u00a0<a href=\"https:\/\/data.europa.eu\/doi\/10.2777\/3648\" target=\"_blank\" rel=\"noopener\">https:\/\/data.europa.eu\/doi\/10.2777\/3648<\/a>\n<\/p>\n<blockquote>\n<p>\n\t\tData management plans should specify where the data are stored, who should make backups and how often the backups should be made, and for how long a period these backup copies should be stored.\n\t<\/p>\n<\/blockquote>\n<p>\n\tAnother important factor includes organisational and physical security, such as the training of new staff members, possible problems with staff members who leave the group, internal rules of the workplace, fire safety, locking of doors, etc.\n<\/p>\n<p>\n\t\u00a0\n<\/p>\n<p>\n\t<span lang=\"EN-GB\"><span style=\"line-height:107%\">In case of data-intensive research, it would be advisable to carry out a risk analysis in the work group and to answer the questions, what should be done if \u2026<\/span><\/span>\n<\/p>\n<ul>\n<li>\n\t\t<span lang=\"EN-GB\"><span style=\"line-height:107%\">the IT systems malfunction<\/span><\/span>\n\t<\/li>\n<li>\n\t\t<span lang=\"EN-GB\"><span style=\"line-height:107%\">there are blackouts, deluges, fires<\/span><\/span>\n\t<\/li>\n<li>\n\t\t<span lang=\"EN-GB\"><span style=\"line-height:107%\">someone\u2019s computer or mobile device is lost or stolen<\/span><\/span>\n\t<\/li>\n<li>\n\t\t<span lang=\"EN-GB\"><span style=\"line-height:107%\">malware is discovered in some devices<\/span><\/span>\n\t<\/li>\n<li>\n\t\t<span lang=\"EN-GB\"><span style=\"line-height:107%\">a member of the work group leaves or dies<\/span><\/span>\n\t<\/li>\n<li>\n\t\t<span lang=\"EN-GB\"><span style=\"line-height:107%\">etc.<\/span><\/span>\n\t<\/li>\n<\/ul>\n<p>\n\t<span lang=\"EN-GB\"><span style=\"line-height:107%\">Risks should be assessed (the probability of their occurrence and possible damage) and it should be decided which risks can be prevented, and when it is necessary to manage the consequences.<\/span><\/span>\n<\/p>\n<p>\n\t<a data-url=\"https:\/\/wiki.ut.ee\/pages\/viewpage.action?pageId=39553421\" href=\"https:\/\/wiki.ut.ee\/pages\/viewpage.action?pageId=39553421\" target=\"_blank\" title=\"\" rel=\"noopener\">Data storage and backup options in University of Tartu.<\/a>\n<\/p>\n<p>\n\t\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This topic is about data storage, the making of backups and information security in the course of a research project.\u00a0\u00a0 Data can be stored by using different ways and methods, such as cloud solutions, hard drive, external hard drive, or &#8230;<\/p>\n","protected":false},"author":78,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-25","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/sisu.ut.ee\/andmehaldus\/wp-json\/wp\/v2\/pages\/25","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sisu.ut.ee\/andmehaldus\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sisu.ut.ee\/andmehaldus\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sisu.ut.ee\/andmehaldus\/wp-json\/wp\/v2\/users\/78"}],"replies":[{"embeddable":true,"href":"https:\/\/sisu.ut.ee\/andmehaldus\/wp-json\/wp\/v2\/comments?post=25"}],"version-history":[{"count":1,"href":"https:\/\/sisu.ut.ee\/andmehaldus\/wp-json\/wp\/v2\/pages\/25\/revisions"}],"predecessor-version":[{"id":339,"href":"https:\/\/sisu.ut.ee\/andmehaldus\/wp-json\/wp\/v2\/pages\/25\/revisions\/339"}],"wp:attachment":[{"href":"https:\/\/sisu.ut.ee\/andmehaldus\/wp-json\/wp\/v2\/media?parent=25"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}