Backup and restoration of data, redundancy

Slides:



Advertisements
Similar presentations
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Advertisements

Backing up and Archiving Data Chapter 1. Introduction This presentation covers the following: – What is backing up – What is archiving – Why are both.
GRAD 521, Research Data Management Winter 2014 – Lecture 7 Amanda L. Whitmire, Asst. Professor.
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Backup Strategy. An Exam question will ask you to describe a backup strategy. Be able to explain: Safe, secure place in different location. Why? – For.
Data Storage and Security Best Practices for storing and securing your data The goal of data storage is to ensure that your research data are in a safe.
Everything your business needs to know but probably doesn’t.
Understand Database Backups and Restore Database Administration Fundamentals LESSON 5.2.
The Ultimate Backup Solution.
Disaster Protection and Recovery By: Michael Morrell Ross Ashenfelter Teresa Furnish Karla Maddox.
Disaster Prevention and Recovery Kristen Emch Christine Jennings-Garant.
®® Microsoft Windows 7 for Power Users Tutorial 10 Backing Up and Restoring Files.
Security and Backup Avoid disasters – have a good backup policy Avoid disasters – have a tight security scheme in place UK law dictates the board of directors.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Backup & Restore The purpose of backup is to protect data from loss. The purpose of restore is to recover data that is temporarily unavailable due to some.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
1 Chapter 12 File Management Systems. 2 Systems Architecture Chapter 12.
BACKUP & RESTORE The purpose of backup is to protect data from loss. The purpose of restore is to recover data that is temporarily unavailable due to some.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
David N. Wozei Systems Administrator, IT Auditor.
1 Availability Policy (slides from Clement Chen and Craig Lewis)
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Managing Your Data: Backing Up Your Data Robert Cook Oak Ridge National Laboratory Version 1.0 Review Date.
Data and its manifestations. Storage and Retrieval techniques.
© 2001 by Prentice Hall11-1 Local Area Networks, 3rd Edition David A. Stamper Part 4: Installation and Management Chapter 11 LAN Administration: Backup.
Information Systems Security Operational Control for Information Security.
Chapter 8 Physical Database Design
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
Information: Policy, Strategy and Systems Module Overview
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
11 DISASTER RECOVERY Chapter 13. Chapter 13: DISASTER RECOVERY2 OVERVIEW  Back up server data using the Backup utility and the Ntbackup command  Restore.
Disaster Recovery and Business Continuity Planning.
Component 8/Unit 9bHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 9b Creating Fault Tolerant.
CIT 470: Advanced Network and System AdministrationSlide #1 CIT 470: Advanced Network and System Administration Disaster Recovery.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Why is it important to back up your work/information? If you do not back up your work or information then your data might be lost when your computer clashes.
20/12/20151 Data Structures Backing up and Archiving Data.
Chapter 6 Protecting Your Files. Protecting Your Files FAQs: – What should I know about losing data? – How can I protect my files from viruses? – How.
The aim of producing a backup strategy is to make sure that a computer system can be returned to its original state if data has been lost or corrupted.
1 AQA ICT AS Level © Nelson Thornes How annoying is it when you lose files on your home computer?? For an organisation it’s a REAL DISASTER!!
Methods of output & Backup\archiving g. describe possible forms of output such as graphs, reports, interactive presentations, sound, video, images, animations,
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
BACKUP AND RESTORE. The main area to be consider when designing a backup strategy Which information should be backed up Which technology should be backed.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Basic Guide to Computer Backups Eric Moore Computer Users Group of Greeley September 13, 2008.
Networking Objectives Understand what the following policies will contain – Disaster recovery – Backup – Archiving – Acceptable use – failover.
Chapter 6 Protecting Your Files
File-System Management
Local Area Networks, 3rd Edition David A. Stamper
Slide Template for Module 4 Data Storage, Backup, and Security
Planning for Application Recovery
Basic Guide to Computer Backups
AS ICT Module 2 Objectives: Security of Data
Advantages and Disadvantages of CAG
Handling Personal Data
A PC is like a large cabinet… containing your
Processing Integrity and Availability Controls
LO2: Understand Computer Software
Backing Up 01/12/2018.
Guarding against loss of data
Bethesda Cybersecurity Club
DBMS Module III DBMS
ACE – Auditing Control Environment
Presentation transcript:

Backup and restoration of data, redundancy Dale Baker

What Insurance against data loss. Extra copies of valuable data are stored in a safe location. Full backup – everything is copied, all data, system setting etc. Differential backup - Incremental Backup that copies the files that have been modified or created since a previous Full Backup Incremental backup - Backup that copies the files that have been modified or created since a previous backup of any kind

Where Should be used by all businesses. Every company has data that is valuable to them, customer information financial records. This information needs to be protected

Why Accidental deletion, Data corruption, Hardware failure, Malicious attacks, Natural disasters, To protect against loss of important information by ensuring that there is always at least one up to date stored off site.

Benefits Even if the original copy of some data is lost or damaged that data can be retrieved or repaired relatively easily. It also greatly reduces the chance that data will be permanently lost.

Disadvantages A security risk as it represents another method of entry into valuable data. Back-ups must be frequently updated to maintain value. Extra expenses from cost of purchasing and running a separate storage device and location