Preservasi Informasi Digital.  It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
CLEARSPACE Digital Document Archiving system INTRODUCTION Digital Document Archiving is the process of capturing paper documents through scanning and.
Information Technology Disaster Recovery Awareness Program.
A new standard in Enterprise File Backup. Contents 1.Comparison with current backup methods 2.Introducing Snapshot EFB 3.Snapshot EFB features 4.Organization.
Case Study: Business Continuity Planning for Site- Level Disaster Kimberley A. Pyles Northrop Grumman Corporation
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
Backup Strategy. An Exam question will ask you to describe a backup strategy. Be able to explain: Safe, secure place in different location. Why? – For.
Everything your business needs to know but probably doesn’t.
Backups Rob Limbaugh March 2, Agenda  Explain of a Backup and purpose  Habits  Discuss Types  Risk/Scope  Disasters and Recovery.
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
Understand Database Backups and Restore Database Administration Fundamentals LESSON 5.2.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Disaster Protection and Recovery By: Michael Morrell Ross Ashenfelter Teresa Furnish Karla Maddox.
Lesson 11 – NETWORK DISASTER RECOVERY Disaster recovery plans Network backup and restoration OVERVIEW.
1 AQA ICT AS Level © Nelson Thornes Backup and its importance.
Back Up and Recovery Sue Kayton February 2013.
1 Disaster Recovery Planning & Cross-Border Backup of Data among AMEDA Members Vipin Mahabirsingh Managing Director, CDS Mauritius For Workgroup on Cross-Border.
Fe Angela M. Verzosa1 Vital Records Management. 2 Vital Records Management The objective is to prevent the loss of information which is critical to the.
November 2009 Network Disaster Recovery October 2014.
Data Security GCSE ICT.
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
IS 380.  Provides detailed procedures to keep the business running and minimize loss of life and money  Identifies emergency response procedures  Identifies.
Dr.Backup Online Backup Service (888) (toll free)
Disaster Recovery Advice 6 th November Data What do you need to backup? System States All or Critical Data.
DotHill Systems Data Management Services. Page 2 Agenda Why protect your data?  Causes of data loss  Hardware data protection  DMS data protection.
Module 7. Data Backups  Definitions: Protection vs. Backups vs. Archiving  Why plan for and execute data backups?  Considerations  Issues/Concerns.
Ways to organize electronic files Witness fitness By: Simran and Navneet.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Co-location Sites for Business Continuity and Disaster Recovery Peter Lesser (212) Peter Lesser (212) Kraft.
By Srosh Abdali.  Disaster recovery is the process, policies and procedures related to preparing for recovery or continuation of technology infrastructure.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Module 9 Planning a Disaster Recovery Solution. Module Overview Planning for Disaster Mitigation Planning Exchange Server Backup Planning Exchange Server.
IT Disaster Recovery CAUBO 2008 Information Systems and Technology.
Founded in 1981, Executive Software is the industry leader in system performance software for Windows NT/2000/XP and DEC VMS systems. Developed Diskeeper,
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
McLean HIGHER COMPUTER NETWORKING Lesson 15 (a) Disaster Avoidance Description of disaster avoidance: use of anti-virus software use of fault tolerance.
CIT 470: Advanced Network and System AdministrationSlide #1 CIT 470: Advanced Network and System Administration Disaster Recovery.
Phases of BCP The BCP process can be divided into the following life cycle phases: Creation of a business continuity and disaster recovery policy. Business.
Cosc 4750 Backups Why Backup? In case of failure In case of loss of files –User and system files Because you will regret it, if you don’t. –DUMB = Disasters.
Security and Backup. Introduction A back-up strategy must cover all eventualities: Accidental damage Equipment failure Deliberate damage It must consider:
20/12/20151 Data Structures Backing up and Archiving Data.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
The Problem YOU are responsible for confidential, mission- critical data... but.
The aim of producing a backup strategy is to make sure that a computer system can be returned to its original state if data has been lost or corrupted.
Disaster Recovery: Can Your Business Survive Data Loss? DR Strategies for Today and Tomorrow.
Managing Data & Information Procedures & Techniques.
TRUE CANADIAN CLOUD Cloud Experts since The ORION Nebula Ecosystem.
Practical IT Research that Drives Measurable Results Leverage Server Virtualization for DR Affordability and Agility 1Info-Tech Research Group.
ICT Disaster Recovery Plan Monitoring & Audit Committee 23 rd November 2010.
1 AQA ICT AS Level © Nelson Thornes How annoying is it when you lose files on your home computer?? For an organisation it’s a REAL DISASTER!!
BACKUP AND RESTORE. The main area to be consider when designing a backup strategy Which information should be backed up Which technology should be backed.
Backup and Disaster Dr Stuart Petch CeG IT/IS Manager
Networking Objectives Understand what the following policies will contain – Disaster recovery – Backup – Archiving – Acceptable use – failover.
Disaster Recovery & Secure Backups
Alicia A. Coon COSC 480 October 27, 2006
Planning for Application Recovery
Lesson Objectives Aims You should be able to:
A PC is like a large cabinet… containing your
Backup your Data © EIT, Author Gay Robertson, 2017.
Back Up and Recovery Sue Kayton October 2015.
Backing Up 01/12/2018.
Using the Cloud for Backup, Archiving & Disaster Recovery
Presentation transcript:

Preservasi Informasi Digital

 It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and Worms  Power and Telecommunications Outages

 The whole idea behind data and program backup is to prevent loss of data from the computer system when the server or network crashes.  The reconstruction of data is time-consuming and extremely expensive

Method of Backup  Incremental backup  Data Mirroring  Replication: 1.Back up or replicate on a second drive in the same cabinet 2.Replication would be to have another drive or server in a different machine or power grid. 3.highest level of replication is across geographical areas

issues to consider: 1. the time it takes to recover the data and how much data loss you can live with 2. The time it takes to get the operations back up and running.

 What type of backup method do you choose for your institution, building, network, or office?  depends upon the resources (people, equipment, and money) your organization has, and how critical the data and the computer operations are to the survival of our institution

Backup Media  There are several choices depending upon the amount of data you have, the frequency of backup, and how critical the data is to the survival of your institution  What backup media are often use?

Remember:  You should have copies or originals of these stored somewhere safe and off-site.

Software “What happens if you lose your data in a major server or network crash and it turns out that there isn’t a current backup for the software. In fact, the software that you were using was the newest version of some program, and the computer center can’t find that version and must use the previous one. Do you realize that you cannot open current data files with older software versions?”

 it is important to keep up with software changes  It isn’t essential to purchase every upgrade, but pay attention to the industry

Operating Systems What operating system are you using today?  Your computer services department staff needs to document the changes in operating systems, as does your records manager.

Hardware  The protection of hardware should include preventing obsolescence.  When you deaccession the hardware, make certain the hard drives are clean data by reformatting the disk, not just deleting the data.

 What if your computer system is running old computer software on old computer equipment and you can’t afford to upgrade?

On-Site Storage  Fireproof cabinets are designed for paper documents, and in some cases microfilm and microfiche. Fireproof cabinets are usually rated at 1,500–2,000º F. Magnetic media will begin to melt at 125ºF  The same goes for safes; they won’t keep the magnetic media from melting.

Access to Backup Data  Where do you store the backups?  How much of the system is on the backup tapes? And how often is it backed up?  Do you store the tapes on top of the computer, in a “fireproof” cabinet in the room (both bad ideas), at home, in a physical data storage vault, in the car, with a vendor, at the bank?  At what point do you send the backups from on-site or local storage to remote storage?  Who can get access to the backups?  Can you load the backups in a remote location or access the data from an alternative computing center?

Off-Site Storage  Data should be transferred off-site on a very regular basis.  Often organizations will keep the most recent backup in their office or a nearby building, and then ship the backup tapes to the remote storage facility once a week.

 Options for transferring the data off-site:  physically take it or have it delivered to your storage facility  send the data to a remote data storage facility via the Web, phone lines, or FTP depending upon how much data you have and where the facility is located.  Remote backup businesses can also describe their service as data vaulting

Data Storage Service Providers  (Appendix B, Protecting Your Library’s Digital Sources)

Hot, Cold, and Mobile Recovery Sites  “Hot sites” are facilities that are completely wired together with the hardware that your organization needs to get its information services up and running quickly.  Organizations contract with these facilities to provide technical support should a disaster be declared

 “Cold sites” are wired computer rooms without the hardware. These facilities are usually rented when the computer staff needs a long-term facility from which to operate.  Mobile recovery. These facilities are movable trailers that are wired for telecommunications or have satellite communications for the user