Security and Backup Avoid disasters – have a good backup policy Avoid disasters – have a tight security scheme in place UK law dictates the board of directors.

Slides:



Advertisements
Similar presentations
By Rashid Khan Lesson 6-A Place for Everything: Storage Management.
Advertisements

Backing up and Archiving Data Chapter 1. Introduction This presentation covers the following: – What is backing up – What is archiving – Why are both.
A new standard in Enterprise File Backup. Contents 1.Comparison with current backup methods 2.Introducing Snapshot EFB 3.Snapshot EFB features 4.Organization.
Backing Up Your Computer Hard Drive Lou Koch June 27, 2006.
Backing Up a Hard Disk CGS2564. Why Backup Programs? Faster Optimized to copy files Can specify only files that have changed Safer Can verify backed up.
Backup Strategy. An Exam question will ask you to describe a backup strategy. Be able to explain: Safe, secure place in different location. Why? – For.
Backups Backups are essential for recovering from – mistakes deleting a file by accident making changes to a document or file that turn out to be undesirable.
11 BACKING UP AND RESTORING DATA Chapter 4. Chapter 4: BACKING UP AND RESTORING DATA2 CHAPTER OVERVIEW Describe the various types of hardware used to.
Understand Database Backups and Restore Database Administration Fundamentals LESSON 5.2.
1 Pertemuan 23 Contingency Planning Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Chapter 12 - Backup and Disaster Recovery1 Ch. 12 – Backups and Disaster Recovery MIS 431 – Created Spring 2006.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Advanced Databases DBA: Backups 1. Advanced Databases Agenda Define backup Discuss Backup Terminology Explain various backup and restore options in Oracle.
Implementing Disaster Protection
COMPUTER BACKUP A disaster will happen to you one day…an accidentally deleted file, a new program that caused problems or a virus that wreaked havoc, wiping.
1 AQA ICT AS Level © Nelson Thornes Backup and its importance.
®® Microsoft Windows 7 for Power Users Tutorial 10 Backing Up and Restoring Files.
Guide to Linux Installation and Administration, 2e1 Chapter 13 Backing Up System Data.
Backup Concepts. Introduction Backup and recovery procedures protect your database against data loss and reconstruct the data, should loss occur. The.
Backup & Restore The purpose of backup is to protect data from loss. The purpose of restore is to recover data that is temporarily unavailable due to some.
Document Backup I & II Nasouh Keilani Computer Technician.
Procedures for Backup and Recovery Section 14. Key points and questions What data should be backed up and how often? What do we mean by full backup, incremental.
NovaBACKUP 10 xSP Technical Training By: Nathan Fouarge
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
1 Objectives Discuss the Windows Printer Model and how it is implemented in Windows Server 2008 Install the Print Services components of Windows Server.
1 Chapter Overview Backing Up Your Network Backing Up and Restoring Active Directory.
November 2009 Network Disaster Recovery October 2014.
Backup Strategy. Backup strategy Backup copy is a second copy saved to another location, usually on a backup device e.g. USB stick.Backup copy is a second.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
Chapter Sixteen Data Recovery and Fault Tolerance.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
1. Define the term ‘database’(2) A database is a large and continuously updated collection of stored data structured to allow the various applications.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
BACKUP & RESTORE The purpose of backup is to protect data from loss. The purpose of restore is to recover data that is temporarily unavailable due to some.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 12 Windows 2000 Server.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
David N. Wozei Systems Administrator, IT Auditor.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
Module 12: Managing Disaster Recovery. Overview Preparing for Disaster Recovery Backing Up Data Scheduling Backup Jobs Restoring Data Configuring Shadow.
Maintaining File Services. Shadow Copies of Shared Folders Automatically retains copies of files on a server from specific points in time Prevents administrators.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
IOS110 Introduction to Operating Systems using Windows Session 10 1.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
11 DISASTER RECOVERY Chapter 13. Chapter 13: DISASTER RECOVERY2 OVERVIEW  Back up server data using the Backup utility and the Ntbackup command  Restore.
Disaster Recovery and Business Continuity Planning.
Backups CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
BACKUP & RECOVERY Option 1: Transaction Processing Systems.
McLean HIGHER COMPUTER NETWORKING Lesson 15 (a) Disaster Avoidance Description of disaster avoidance: use of anti-virus software use of fault tolerance.
Component 8/Unit 9bHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 9b Creating Fault Tolerant.
Cosc 4750 Backups Why Backup? In case of failure In case of loss of files –User and system files Because you will regret it, if you don’t. –DUMB = Disasters.
Security and Backup. Introduction A back-up strategy must cover all eventualities: Accidental damage Equipment failure Deliberate damage It must consider:
20/12/20151 Data Structures Backing up and Archiving Data.
1 3 Computing System Fundamentals 3.6 Errors Prevention and Recovery.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
Backing Up Lesson 12. Backups A backup is simply a copy of the data on a computer’s hard disks, stored on another medium in case a hard drive fails. If.
BACKUP AND RESTORE. The main area to be consider when designing a backup strategy Which information should be backed up Which technology should be backed.
Networking Objectives Understand what the following policies will contain – Disaster recovery – Backup – Archiving – Acceptable use – failover.
File-System Management
Basic Guide to Computer Backups
AS ICT Module 2 Objectives: Security of Data
Lesson Objectives Aims You should be able to:
Introduction to Operating Systems
Backing up a Hard Disk Windows XP Tutorial 6.
Backup and restoration of data, redundancy
Presentation transcript:

Security and Backup Avoid disasters – have a good backup policy Avoid disasters – have a tight security scheme in place UK law dictates the board of directors are responsible for security issues – the safeguarding of the data (not the IT department /security officer) Backup Various options here. The aim is to ensure you can recover from a disaster such as a hard disk failure. If the hard disk fails, it will be impossible to retrieve data from it. Copies MUST be taken regularly… just in case.

Security and Backup Backup key points: Decide with what, when, how and what is to be backed up: WITH WHAT: floppy disk, tape streamer such as a Travan or DAT device.. or a larger capacity DLT drive? It comes down to capacity/speed/cost – look through recent magazine reviews/adverts for details WHEN: as often as needed (within reason) as the data/files change often Exact times will depend on the volume of data involved Daily tapes + weekly tapes allows back-tracking through a week or month During office hours or after? See WHATIS.COMWHATIS.COM

Security and Backup HOW:Full Backup A full backup is simply that: a complete backup of every single file. The advantage of such a backup is that files are easily found when needed. Since full backups include all data on the hard drive, you do not have to search through several tapes to find the files you need to restore. In case you need to restore the entire system, all of the most current information can be found on the last backup tape. The disadvantage is that doing nothing but full backups leads to redundancy which wastes both media and time. A backup strategy would normally include a combination of full, incremental and/or differential backups. See: Backup (Internet link)Backup (Internet link) Another includes RAIDAnother includes RAID (Internet link) And another with Grandfather/father/sonAnd another with Grandfather/father/son (Internet link)

Security and Backup HOW: Incremental Backup Incremental backups include files that were created or changed since the last backup (that is, the last full or incremental backup). To achieve this, the status of each file must be recorded either within the backup software or through the use of the archive attribute of the files. If no previous backup was made, an incremental backup is equivalent to a full backup. Incremental backups make better use of media compared to full backups. Only files that were created or changed since the last backup are included, so less backup space is used and less time is required. The disadvantage is that multiple tapes are needed to restore a set of files. The files can be spread over all the tapes in use since the last full backup. You may have to search several tapes to find the file you wish to restore. The backup software can minimize this by remembering where files are located; however a restoration may still require access to all incremental backups.

Security and Backup HOW: Differential Backup A differential backup includes all files that were created or modified since last full backup. Note the difference between incremental and differential: incremental b/up save files changed since the last (incremental or full) backup, whereas differential b/up save files changed since the last full backup. The advantages over full b/up: it is quicker and use less media. The advantage over an incremental b/up: the restore process is more efficient - at worst, the restore will require only the latest differential b/up set and the latest full backup set, whereas an incremental b/up could require all incremental b/up sets and the full b/up set. The disadvantage of a differential backup is that longer and longer time is needed to perform them. The amount of data backed up each time following the full backup gets larger and larger. Compared to incremental backups, differential backups are more wasteful of time and media - each backup would store much of the same information plus the latest information added or created since the last full backup.

Security and Backup WHAT: you pick what files should be included depending on how “valuable” they are All systems need a complete backup – software/OS/files (Why?)

Security and Backup Other points: Grandfather-father-son backups for batch processing systems is used See p281 / ch. 59 for an example To look for: RAID Disk Mirroring And what about Internet Backup options? (See whatis.com) and… m/intro.htmhttp:// m/intro.htm

Security and Backup Security Issues Personnel policy to cover: Recruitment – references needed! Most damage to systems/files is done by employees… Training – to stop errors Supervision Appraisal Separation of duties – duplication of key jobs Termination ! Out NOW & escorted off the premises … and User Name removed from the system immediately: WHY? Employee code of conduct (IT01 – re-read ch.11 “Codes of Practice”) Passwords?