Backup Topics Disaster Prevention & Recovery series ©2005 Sam C. Chan.

Slides:



Advertisements
Similar presentations
Backing up Your Computer Jamie Leben IT-Works Computer Services Copyright 2010.
Advertisements

POSSIBLE THREATS TO DATA
James Crowley C3 – Crowley Computer Consulting. Presentation  Available at
By Sam C. Chan Sensible Strategies & Specific Plans For Small Businesses Reducing IT Costs 2/13/05.
GLOBRIN Business Continuity Workshop TECHNOLOGY & INFORMATION 13 th November 2013 Graham Jack.
Operating System Customization
Carbonite Carbonite is a Ronco “Set it and Forget it” type of remote backup program It costs $54.95 per year.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Disaster Protection and Recovery By: Michael Morrell Ross Ashenfelter Teresa Furnish Karla Maddox.
Implementing Disaster Protection
COMPUTER BACKUP A disaster will happen to you one day…an accidentally deleted file, a new program that caused problems or a virus that wreaked havoc, wiping.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
®® Microsoft Windows 7 for Power Users Tutorial 10 Backing Up and Restoring Files.
Back Up and Recovery Sue Kayton February 2013.
Agenda  Overview  Configuring the database for basic Backup and Recovery  Backing up your database  Restore and Recovery Operations  Managing your.
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Procedures for Backup and Recovery Section 14. Key points and questions What data should be backed up and how often? What do we mean by full backup, incremental.
Lesson 10 Operating System Customization
Chapter 5: System Software: Operating Systems and Utility Programs.
November 2009 Network Disaster Recovery October 2014.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Chapter 7 Working with Files.
© Pearson Education Limited, Chapter 5 Database Administration and Security Transparencies.
Chapter Fourteen Windows XP Professional Fault Tolerance.
Chapter 18: Windows Server 2008 R2 and Active Directory Backup and Maintenance BAI617.
2015 Risky Business Week Welcome to the 2015 Risky Business Week presentation regarding disaster recovery Risky Business Week.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
NOAA WEBShop A low-cost standby system for an OAR-wide budgeting application Eugene F. Burger (NOAA/PMEL/JISAO) NOAA WebShop July Philadelphia.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Introduction Journal Analysis and Optimization Journaling Uses and Benefits Understanding Costs and Implications Ongoing Management and Administration.
Unit R005: Understanding Computer Systems Introduction System Software Software (i.e., programs) used to control the hardware directly Used to run the.
Computer Maintenance and Troubleshooting
State Data Center Oregon Consumer Identity Theft Protection Act Information Forum October 31, 2007.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Configuring Data Protection Chapter 12 powered by dj.
Chapter 2 Securing Network Server and User Workstations.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Chapter 6 Protecting Your Files. Protecting Your Files FAQs: – What should I know about losing data? – How can I protect my files from viruses? – How.
Backup Exec System Recovery. 2 Outline Introduction Challenges Solution Implementation Results Recommendations Q & A.
Our mission to provide specialized Backup Data Recovery of your data. We guarantee your systems and data can be restored in minutes,Not in days.
Unit 10 ITT TECHNICAL INSTITUTE NT1330 Client-Server Networking II Date: 2/24/2016 Instructor: Williams Obinkyereh.
1 Lesson 10 Operating System Customization Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Database Security Threats. Database An essential corporate resource Data is a valuable resource Must be strictly controlled, managed and secured May have.
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Protecting Data at Rest Through Encryption CIO Summit November 30, 2007.
PDF Recovery Tool Fix Portable Document File Format.
Disaster Recovery and Preventative Maintenance
Chapter 6 Protecting Your Files
Basic Guide to Computer Backups
MINIMUM REQUIREMENTS, UPDATING WINDOWS SYSTEM, MSE, & PRINTER DRIVERS
Protecting Your Data in 2017
AS ICT Module 2 Objectives: Security of Data
Working at a Small-to-Medium Business or ISP – Chapter 8
Online Backup Service 30 Day FREE Trial
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Unit 10 NT1330 Client-Server Networking II Date: 8/16/2016
Lesson 10 Operating System Customization
Back Up and Recovery Sue Kayton October 2015.
The Ultimate Backup Solution.
Database Security &Threats
Guarding against loss of data
Bethesda Cybersecurity Club
Have you seen this screen?
Implementation of security elements in database
G061 - Network Security.
Designing Database Solutions for SQL Server
Presentation transcript:

Backup Topics Disaster Prevention & Recovery series ©2005 Sam C. Chan

Reasons for Backups software bugs malware driver install security user errors file corruption power glitches hardware failure malware security breaches theft fire/flood ESD issues

Backup Methods HD replication Removable Media USB Drive Online Backup Ghost/LiveState Recovery

Backup Factors Protection Costs Efforts Manageability

Specific Factors Protection Against? Coverage Span Restore Point Granularity Procedural Complexity Control & Security

Backup Costs Hardware/Software Consumable Recurring Fees Maintenance Admin/Consulting

Typical 4-Prong Scenario 3-gen HD replication: Nightly/Weekly/Monthly DVD+RW Nightly~Weekly USB Drive (ad hoc) Online Nightly (optional)

DVD Backups Full/Incremental Backup vs Sync. Over-write/Append Manual/Auto Media Mgmt Rotation Scheme (1/2 gen) Off-site Rotation

Best Practices Serial No.: don’t reuse Mark directly on Media Log: 3-column ledger Safe/Fire Box All Users Logoff Encrypted Media

Tools Dantz Retrospect Backup Exec NTI Backup NT Backup Syncback Karen's Replicator Ghost/LiveState Winzip Tools

Copyright ©2005 Bravo Technology Center Authorized Use Only For permission and information: http://bravotech.us/contact