Security and Backup. Introduction A back-up strategy must cover all eventualities: Accidental damage Equipment failure Deliberate damage It must consider:

Slides:



Advertisements
Similar presentations
By Rashid Khan Lesson 6-A Place for Everything: Storage Management.
Advertisements

Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens.
Backing up and Archiving Data Chapter 1. Introduction This presentation covers the following: – What is backing up – What is archiving – Why are both.
Backup Strategy. An Exam question will ask you to describe a backup strategy. Be able to explain: Safe, secure place in different location. Why? – For.
RAID- Redundant Array of Inexpensive Drives. Purpose Provide faster data access and larger storage Provide data redundancy.
11 BACKING UP AND RESTORING DATA Chapter 4. Chapter 4: BACKING UP AND RESTORING DATA2 CHAPTER OVERVIEW Describe the various types of hardware used to.
CSCI 3140 Module 8 – Database Recovery Theodore Chiasson Dalhousie University.
Disaster Prevention and Recovery Kristen Emch Christine Jennings-Garant.
Lesson 11 – NETWORK DISASTER RECOVERY Disaster recovery plans Network backup and restoration OVERVIEW.
Back Up and Recovery Sue Kayton February 2013.
Security and Backup Avoid disasters – have a good backup policy Avoid disasters – have a tight security scheme in place UK law dictates the board of directors.
Lecture 39: Review Session #1 Reminders –Final exam, Thursday 3:10pm Sloan 150 –Course evaluation (Blue Course Evaluation) Access through.
Storage Devices or Backing Storage
Servers Redundant Array of Inexpensive Disks (RAID) –A group of hard disks is called a disk array FIGURE Server with redundant NICs.
Backup & Restore The purpose of backup is to protect data from loss. The purpose of restore is to recover data that is temporarily unavailable due to some.
Academic Year 2014 Spring. MODULE CC3005NI: Advanced Database Systems “DATABASE RECOVERY” (PART – 1) Academic Year 2014 Spring.
Document Backup I & II Nasouh Keilani Computer Technician.
Backup Strategy. Backup strategy Backup copy is a second copy saved to another location, usually on a backup device e.g. USB stick.Backup copy is a second.
SQL Server 2008 Implementation and Maintenance Chapter 7: Performing Backups and Restores.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
Protecting ICT Systems
Disaster Planning and Security Policies. Threats to data DeliberateTerrorism Criminal vandalism/sabotage White collar crime Accidental Floods and fire,
Chapter Sixteen Data Recovery and Fault Tolerance.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Secondary Storage Chapter 7.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
BACKUP & RESTORE The purpose of backup is to protect data from loss. The purpose of restore is to recover data that is temporarily unavailable due to some.
BACKUP AND ARCHIVING DATA BACKUP AND RECOVERY OF DATA.
INFO1 – Practical problem solving in the digital world
Advanced Diploma 1 Backing Storage. Advanced Diploma 2 Aims Understand how data is stored Be able to use the binary system to represent ASCII characters.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
© 2001 by Prentice Hall11-1 Local Area Networks, 3rd Edition David A. Stamper Part 4: Installation and Management Chapter 11 LAN Administration: Backup.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
Information: Policy, Strategy and Systems Module Overview
Task 16 Describe the need for document control (such as ensuring that completed models are approved, labelled and stored on a suitable storage medium).
Disaster Recovery and Business Continuity Planning.
Module 15 Managing Windows Server® 2008 Backup and Restore.
BACKUP & RECOVERY Option 1: Transaction Processing Systems.
McLean HIGHER COMPUTER NETWORKING Lesson 15 (a) Disaster Avoidance Description of disaster avoidance: use of anti-virus software use of fault tolerance.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Cosc 4750 Backups Why Backup? In case of failure In case of loss of files –User and system files Because you will regret it, if you don’t. –DUMB = Disasters.
Fault Tolerance and Disaster Recovery. Topics Using Antivirus software Fault tolerance –Power –Redundancy –Storage –Services Disaster Recovery –Backup/Restore.
Thank You!. Tech Advice Matt Straka Backing up F OUNDATION Schedule backups Create backups “on the fly’” Restore Backups Backup Strategies Disaster Recovery.
Learningcomputer.com SQL Server 2008 – Backup and Restore Database.
The Problem YOU are responsible for confidential, mission- critical data... but.
The aim of producing a backup strategy is to make sure that a computer system can be returned to its original state if data has been lost or corrupted.
FILE ORGANIZATION.
Install, configure and test ICT Networks
Verification & Validation
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Security Operations Chapter 11 Part 2 Pages 1262 to 1279.
HNC COMPUTING - COMPUTER PLATFORMS 1 Computer Platforms Week 2 Backing Storage.
1 AQA ICT AS Level © Nelson Thornes How annoying is it when you lose files on your home computer?? For an organisation it’s a REAL DISASTER!!
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Basic Guide to Computer Backups Eric Moore Computer Users Group of Greeley September 13, 2008.
Networking Objectives Understand what the following policies will contain – Disaster recovery – Backup – Archiving – Acceptable use – failover.
Database recovery contd…
Basic Guide to Computer Backups
Database Administration
AS ICT Module 2 Objectives: Security of Data
Managing Multi-User Databases
UNIT 19 Data Security 2.
Choosing the best storage method
Planning and Security Policies
Database Backup and recovery
Computer communications
Presentation transcript:

Security and Backup

Introduction A back-up strategy must cover all eventualities: Accidental damage Equipment failure Deliberate damage It must consider: Security measures Personnel policy to cover data security and employee codes of conduct Directors are responsible for security of all company assets

Backup strategies Key Questions: How often should the backups be done? What should be backed up? Where should the backups be stored? And in terms of planning we need to consider: The value of the data The amount of data stored on the computer Frequency of data changes Type of backup equipment

Full Backup A copy of all the files on the fixed disks Very safe, and simple to restore; But, time-consuming and computer facilities will be off-line while this is happening. Example of large-company strategy: Service agreement to have engineers available within specified time; ‘mirrored disks’ on file server – simultaneous update to both disks; Four tapes for Monday to Thursday stored in fireproof safe in office; Process starts at same time every night; Backup log checked every morning; 3 Friday tapes - Friday tape taken off-site, ‘next’ Friday the oldest Friday tape is used Hardware maintenance performed by Service Agency Occasional tape-restore test

Incremental Backup Full backup once a week, eg Monday On other days, only those files that have been changed during the day are backed up Must be labelled carefully Less time-consuming, but: More complex to restore as all backups have to be restored in the correct sequence

Hardware for backups Small quantities of data: Removable disks – Removable hard drives or USB Memory sticks Larger quantities of data: Tape is usual medium; DAT tape drive can store up to 24Gb for about £200 CD-RW/DVD-RW drive using rewritable disks costs around £ Mb CD disks cost about £1 each, DVDs c£2.50.

On-line back-up (RAID) RAID (Redundant Array of Inexpensive Disks). This technology enables data to be written simultaneously to several disks. Three copies of a database may be held – two locally and one on a remote system. If one system fails then data can still be used on either of the other two.

Grandfather-father-son backups Update Transactions for Day 1 Update Master file (Day 1) (Grandfather) Master File (Day 2) (Father) Transactions for Day 2 Master File (Day 3) (Son)