SlideShare uma empresa Scribd logo
1 de 37
2.6 Backup and Recovery
   Print out Scary backup stories
1.    What 6 questions should you ask yourself before writing a backup
      strategy?
2.    When devising a backup strategy, risk assessment should be carried
      out, what should be looked at during this process?
3.    What effect would it have on an organisation if they lost their data?
4.    What 4 types of backup can be performed?
5.    Describe a Full backup
6.    Describe a differential backup
7.    Describe an incremental backup
8.    In order to make sure backups work what should you do?
9.    What types of media could be used to backup systems?
10.   What is meant by continuity of service and why is it important?
11.   What is RAID
12.   What is DRP and what does it aim to do?
13.   What is backup strategy?
14.   When choosing backup media and devices what factors should be
      taken into consideration?
   Do you backup your work?
   What work do you backup?
   When do you back it up?
   How do you backup your work?
   Which media do you use to backup your work?
   Why do you back up your work?

   Different individuals and organisations have
    different backup needs but they will all ask the
    same questions

   http://ictknowledgebase.org.uk/backupstrategy
   Read and discuss the stories

   What 3 things must you do in order for
    backups to work?
    ◦ Define and implement a good procedure
    ◦ Test that it works
    ◦ Review your procedure often
   I asked you these questions:
    ◦   What work do you backup?
    ◦   When do you back it up?
    ◦   How do you backup your work?
    ◦   Which media do you use to backup your work?


   Organisations will also need to ask these two questions:
    ◦ Who will be responsible for the backup
    ◦ Where will the data be stored

   Establishing the answers to these questions will allow
    the organisation to develop a Backup Strategy*
1.    Assess what risks apply to the data
2.    How likely it is that the hazards creating
      those risks will take place
3.    What effect would it have on the
      organisation if that hazard occurred?

    For some organisations their ICT systems is
     mission critical (They cannot operate without it)

    If EasyJet‟s booking system went down for
     more than 48hrs they would go bankrupt
Natural Disasters           Causes of Lost Data

                                       2%
Human Error
                                  6%
                            13%
                                                  32%
Software Corruption


Virus Attack
                      22%


Hardware Error                          25%


Sabotage
       Must conduct thorough analysis

       Must be monitored
    ◦    e.g. signing up for e-mails or alerts from local
         weather stations so that you are made aware of
         impending weather events
       Damage to reputation
       Damaged loyalty
    ◦    i.e. customers may defect to a competitor
       Loss of labour
       Loss of revenue
       Loss of service
   http://goo.gl/Nlxl5

   On average, businesses lose between $84,000
    and $108,000 (US) for every hour of IT system
    downtime, according to estimates from studies
    and surveys performed by IT industry analyst
    firms.

   It is critical that organisations can recover quickly

   *Discussed later on under „continuity of service‟
   A recent study has shown that of the
    companies that lose their data in a disaster:

   29% are out of business within two years

   Nearly 43% never open their doors after the
    disaster
   As you can see backing up data is important. Most
    organisations will have a backup strategy in place to
    support their data protection and recovery.

   A strategy is simply a plan of action designed to achieve
    an overall aim

   A backup strategy therefore is a planned approach to data
    protection and data recovery

   Policies/Procedures are written to support implementation
    of the strategy

    ◦ A Policy/Procedure might be “a full backup must be performed
      every night”
◦ What work do you backup?
    ◦ When do you back it up?

    ◦How       do you backup your work?
    ◦ Which media do you use to backup your work?
    ◦ Who will be responsible for the backup
    ◦ Where will the data be stored

   You have choices as to HOW you backup your work
   Full Backup
    ◦ All the data that is stored in your files or folders that you wish to
      back up will be saved.

   Advantages
    ◦ EVERYTHING is backed up at once on one device
    ◦ Restoring the data can be a simple process
    ◦ Data can better protected

   Disadvantages
    ◦ Can take a long time to run the backup (depending on quantity of
      data)
    ◦ Can take a long time to restore the back up
    ◦ Storage media and medium for a FULL backup could be expensive
    ◦ Security issue as each full backup contains an entire copy of all
      data
   Differential Backup
    ◦ Only the data that is different since the last FULL backup
      will be saved

   Advantages
    ◦ Reduces the time it takes to restore data
    ◦ Usually an automatic process
    ◦ Only the full and differential backup are needed to
      restore the data

   Disadvantages
    ◦ If to many differential backups are performed size of the
      backup can be larger than full backup
    ◦ Slower than an incremental backup
   Incremental Backup
    ◦ Saves all the files that have been changed since the
      last backup (NOT just the last FULL backup)


   Advantages
    ◦ Fastest way to backup
    ◦ Usually an automatic process

   Disadvantages
    ◦ Restoring data can take a long time
   Full Backup
    ◦ All the data that is stored in your files or folders that you
      wish to back up will be saved.

   Differential Backup
    ◦ Only the data that is different since the last FULL backup
      will be saved

   Incremental Backup
    ◦ Saves all the files that have been changed since the last
      backup (NOT just the last FULL backup)

   Here‟s a video to help illustrate the difference
    between an incremental backup and a differential
    backup: http://goo.gl/3hyG3
   Refers to backup of computer data by automatically saving a copy of
    every change made to that data

   Essentially capturing every version of the data that the user saves.

   Advantages
    ◦ It allows the user or administrator to restore data to any point in time
    ◦ In some situations, continuous data protection will require less space on backup
      media (usually disk) than traditional backup.
       Most continuous data protection solutions save byte or block-level differences rather
          than file-level differences. This means that if you change one byte of a 100 GB file, only
           the changed byte or block is backed up

   Disadvantages
    ◦ The continuous bandwidth usage can adversely affect network
      performance, especially in operations where file sizes are large, such as multimedia
      and CAD design environments.
          To mitigate this risk, companies employ throttling techniques which prioritize network
           traffic in order to reduce the impact of backup on day-to-day operation
   Some solutions which are marketed as
    continuous data protection may only allow
    restores at fixed intervals such as 1 hour, or 24
    hours.

   Such schemes are not universally recognized as
    true continuous data protection, as they do not
    provide the ability to restore to any point in time.

   Such solutions are often based on
    periodical snapshots,
   There is a popular backup method called the
    Grandfather, Father, Son backup

   Homework 1
    ◦ Research the Grandfather, Father, Son backup
      method and create a resource to illustrate this
      process

    http://www.lockergnome.com/it/2005/04/18/gfs-backup-strategy/
◦ What work do you backup?
    ◦ When do you back it up?
    ◦ How do you backup your work?

    ◦Which        media do you use to backup your work?
    ◦ Who will be responsible for the backup
    ◦ Where will the data be stored

   You have choices as to WHICH media you backup
    your work on
   Dependant on:
    ◦   Storage capacity required
    ◦   Portability of device
    ◦   Speed of data transfer
    ◦   Speed of access (time it takes for device to find a
        specific piece of stored data
   Magnetic Tape
   Hard disks
   Optical disks e.g. CD, DVD
   Remote Backup service e.g. online backup
   Flash Memory

   Homework 2
    ◦   Create a PowerPoint presentation with 6 slides
    ◦   Slide 1 called Backup media
    ◦   Slide 2-6 titles are those above (e.g. Magnetic Tape)
    ◦   On slides 2-6 introduce the media (include a picture)
        and then highlight advantages and disadvantages of
        using that media e.g. cost storage capacity, speed etc.
   Have you ever had to recover your work?
   What procedures did you go through in order
    to recover your work?

   Remember recovery (like backup) should be:
    ◦ Planned
    ◦ Checked i.e. checked people understand
    ◦ Tested i.e. checking the recovery
   Organisations need recovery procedures

   These procedures are put in place to get the
    ICT system working again

   Procedures considered include:
    ◦   Alternative accommodation
    ◦   Availability of step to help recovery process
    ◦   Availability of hardware to run the backups
    ◦   Training
    ◦   Availability of alternative communication lines
   Many companies rely on 24/7 service in
    order to function (e.g. online booking
    systems).
   Failure to do so could have financial
    consequences as well as customer
    dissatisfaction.
   Policies are required to ensure this
    happens, should cover:
    ◦ Location of backup
    ◦ Security of backup
    ◦ Appropriate backup for continuous service e.g.
      RAID
   Redundant Array of Independent Disks

   RAID 1 – Mirroring
    ◦ Mirror the drives
    ◦ Exact copy

   RAID 5 – Distributed Parity
    ◦ Strips the data across all 5 drives
    ◦ Can survive on two drives
   Disaster Recovery Plan

   Tries to ensure that businesses can:
    ◦ Resume trading quickly by ensuring ICT services are
      back online as soon as possible
    ◦ Give customer, investors and trading partners
      confidence in the reliability of the company
    ◦ Retain customers who might change companies if
      there is a loss in trading time
   Half the class
    ◦ Research the Grandfather, Father, Son backup method
      and create a resource to illustrate this process

   Other half
    ◦   Create a PowerPoint presentation with 6 slides
    ◦   Slide 1 called Backup media
    ◦   Slide 2-6 titles are those above (e.g. Magnetic Tape)
    ◦   On slides 2-6 introduce the media (include a picture)
        and then highlight advantages and disadvantages of
        using that media e.g. cost storage capacity, speed etc
   Page 99 and 100 of the McNee and Spencer Text
    Book.

   Read both Case Studies and answer the „End of
    sub-Topic Questions‟ 4, 5 and 6 (Page 100)

   For tomorrow‟s lesson (This must be printed out
    prior to lesson NOT on your arrival to the lesson)

    ◦ Thursday detention if failure to complete OR failure to
      have printed out before the lesson

Mais conteúdo relacionado

Mais procurados

BACKUP & RECOVERY IN DBMS
BACKUP & RECOVERY IN DBMSBACKUP & RECOVERY IN DBMS
BACKUP & RECOVERY IN DBMSBaivabiNayak
 
What is cloud backup?
What is cloud backup?What is cloud backup?
What is cloud backup?Asigra
 
Database backup and recovery basics
Database backup and recovery basicsDatabase backup and recovery basics
Database backup and recovery basicsShahed Mohamed
 
Backup & Recovery - Optimize Your Backup and Restore Architectures in the Cloud
Backup & Recovery - Optimize Your Backup and Restore Architectures in the CloudBackup & Recovery - Optimize Your Backup and Restore Architectures in the Cloud
Backup & Recovery - Optimize Your Backup and Restore Architectures in the CloudAmazon Web Services
 
Backup & recovery with rman
Backup & recovery with rmanBackup & recovery with rman
Backup & recovery with rmanitsabidhussain
 
Backup and recovery in oracle
Backup and recovery in oracleBackup and recovery in oracle
Backup and recovery in oraclesadegh salehi
 
Database performance tuning and query optimization
Database performance tuning and query optimizationDatabase performance tuning and query optimization
Database performance tuning and query optimizationUsman Tariq
 
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OSKumar Pritam
 
Backing Up and Recovery
Backing Up and RecoveryBacking Up and Recovery
Backing Up and RecoveryMaham Huda
 
Operating System-Ch8 memory management
Operating System-Ch8 memory managementOperating System-Ch8 memory management
Operating System-Ch8 memory managementSyaiful Ahdan
 
Oracle backup and recovery
Oracle backup and recoveryOracle backup and recovery
Oracle backup and recoveryYogiji Creations
 
Database backup and recovery
Database backup and recoveryDatabase backup and recovery
Database backup and recoveryAnne Lee
 

Mais procurados (20)

BACKUP & RECOVERY IN DBMS
BACKUP & RECOVERY IN DBMSBACKUP & RECOVERY IN DBMS
BACKUP & RECOVERY IN DBMS
 
Distributed DBMS - Unit 9 - Distributed Deadlock & Recovery
Distributed DBMS - Unit 9 - Distributed Deadlock & RecoveryDistributed DBMS - Unit 9 - Distributed Deadlock & Recovery
Distributed DBMS - Unit 9 - Distributed Deadlock & Recovery
 
Backup
BackupBackup
Backup
 
Less16 Recovery
Less16 RecoveryLess16 Recovery
Less16 Recovery
 
What is cloud backup?
What is cloud backup?What is cloud backup?
What is cloud backup?
 
SQL Database Mirroring setup
SQL Database Mirroring setupSQL Database Mirroring setup
SQL Database Mirroring setup
 
Database backup and recovery basics
Database backup and recovery basicsDatabase backup and recovery basics
Database backup and recovery basics
 
Backup & Recovery - Optimize Your Backup and Restore Architectures in the Cloud
Backup & Recovery - Optimize Your Backup and Restore Architectures in the CloudBackup & Recovery - Optimize Your Backup and Restore Architectures in the Cloud
Backup & Recovery - Optimize Your Backup and Restore Architectures in the Cloud
 
Backup & recovery with rman
Backup & recovery with rmanBackup & recovery with rman
Backup & recovery with rman
 
Backup Exec 21
Backup Exec 21Backup Exec 21
Backup Exec 21
 
Backup And Recovery
Backup And RecoveryBackup And Recovery
Backup And Recovery
 
Backup and recovery in oracle
Backup and recovery in oracleBackup and recovery in oracle
Backup and recovery in oracle
 
Data Guard Architecture & Setup
Data Guard Architecture & SetupData Guard Architecture & Setup
Data Guard Architecture & Setup
 
Database performance tuning and query optimization
Database performance tuning and query optimizationDatabase performance tuning and query optimization
Database performance tuning and query optimization
 
Memory Management in OS
Memory Management in OSMemory Management in OS
Memory Management in OS
 
Backing Up and Recovery
Backing Up and RecoveryBacking Up and Recovery
Backing Up and Recovery
 
Operating System-Ch8 memory management
Operating System-Ch8 memory managementOperating System-Ch8 memory management
Operating System-Ch8 memory management
 
Oracle backup and recovery
Oracle backup and recoveryOracle backup and recovery
Oracle backup and recovery
 
Database recovery
Database recoveryDatabase recovery
Database recovery
 
Database backup and recovery
Database backup and recoveryDatabase backup and recovery
Database backup and recovery
 

Semelhante a 2.6 backup and recovery

Data Backup and Recovery.pdf
Data Backup and Recovery.pdfData Backup and Recovery.pdf
Data Backup and Recovery.pdfAshraf Hossain
 
Data backup and disaster recovery
Data backup and disaster recoveryData backup and disaster recovery
Data backup and disaster recoverycatacutanjcsantos
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanRishu Mehra
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data  Disaster  Recovery  PlanCreating And Implementing A Data  Disaster  Recovery  Plan
Creating And Implementing A Data Disaster Recovery PlanRishu Mehra
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesSpiceworks
 
The economics of backup 5 ways disk backup can help your business
The economics of backup 5 ways disk backup can help your businessThe economics of backup 5 ways disk backup can help your business
The economics of backup 5 ways disk backup can help your businessServium
 
Black Box Backup System
Black Box Backup SystemBlack Box Backup System
Black Box Backup SystemCSCJournals
 
Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16Ken Tucker
 
Enterprise data protection meeting
Enterprise data protection meetingEnterprise data protection meeting
Enterprise data protection meetingcsandit
 
Not having a good backup
Not having a good backupNot having a good backup
Not having a good backupRita Crawford
 
Power Point example for module 3 assignment
Power Point example for module 3 assignmentPower Point example for module 3 assignment
Power Point example for module 3 assignmentnaterator
 
Information management
Information managementInformation management
Information managementDeepak John
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoverySejahtera Affif
 
Backing up your data
Backing up your dataBacking up your data
Backing up your dataaaberra
 
Backup & Disaster Recovery for Business Owners & Directors
Backup & Disaster Recovery for Business Owners & DirectorsBackup & Disaster Recovery for Business Owners & Directors
Backup & Disaster Recovery for Business Owners & DirectorsLucy Denver
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of DataMISY
 
8 considerations for evaluating disk based backup solutions
8 considerations for evaluating disk based backup solutions8 considerations for evaluating disk based backup solutions
8 considerations for evaluating disk based backup solutionsServium
 
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and ResilienceMastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and ResilienceMaryJWilliams2
 
HPE Data Protector Best Practice Guide
HPE Data Protector Best Practice GuideHPE Data Protector Best Practice Guide
HPE Data Protector Best Practice GuideAndrey Karpov
 

Semelhante a 2.6 backup and recovery (20)

Data Backup and Recovery.pdf
Data Backup and Recovery.pdfData Backup and Recovery.pdf
Data Backup and Recovery.pdf
 
Data backup and disaster recovery
Data backup and disaster recoveryData backup and disaster recovery
Data backup and disaster recovery
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery Plan
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data  Disaster  Recovery  PlanCreating And Implementing A Data  Disaster  Recovery  Plan
Creating And Implementing A Data Disaster Recovery Plan
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
 
The economics of backup 5 ways disk backup can help your business
The economics of backup 5 ways disk backup can help your businessThe economics of backup 5 ways disk backup can help your business
The economics of backup 5 ways disk backup can help your business
 
Black Box Backup System
Black Box Backup SystemBlack Box Backup System
Black Box Backup System
 
Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16
 
Enterprise data protection meeting
Enterprise data protection meetingEnterprise data protection meeting
Enterprise data protection meeting
 
Not having a good backup
Not having a good backupNot having a good backup
Not having a good backup
 
Power Point example for module 3 assignment
Power Point example for module 3 assignmentPower Point example for module 3 assignment
Power Point example for module 3 assignment
 
Backup strategy plan
Backup strategy planBackup strategy plan
Backup strategy plan
 
Information management
Information managementInformation management
Information management
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recovery
 
Backing up your data
Backing up your dataBacking up your data
Backing up your data
 
Backup & Disaster Recovery for Business Owners & Directors
Backup & Disaster Recovery for Business Owners & DirectorsBackup & Disaster Recovery for Business Owners & Directors
Backup & Disaster Recovery for Business Owners & Directors
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of Data
 
8 considerations for evaluating disk based backup solutions
8 considerations for evaluating disk based backup solutions8 considerations for evaluating disk based backup solutions
8 considerations for evaluating disk based backup solutions
 
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and ResilienceMastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
Mastering Backup and Disaster Recovery: Ensuring Data Continuity and Resilience
 
HPE Data Protector Best Practice Guide
HPE Data Protector Best Practice GuideHPE Data Protector Best Practice Guide
HPE Data Protector Best Practice Guide
 

Mais de mrmwood

3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisationsmrmwood
 
3.8 development methods
3.8 development methods3.8 development methods
3.8 development methodsmrmwood
 
3.7 developing ict solutions
3.7 developing ict solutions3.7 developing ict solutions
3.7 developing ict solutionsmrmwood
 
3.6 legislation and regulations
3.6 legislation and regulations3.6 legislation and regulations
3.6 legislation and regulationsmrmwood
 
3.11 training and supporting users
3.11 training and supporting users3.11 training and supporting users
3.11 training and supporting usersmrmwood
 
3.9 techniques and tools for systems development
3.9 techniques and tools for systems development3.9 techniques and tools for systems development
3.9 techniques and tools for systems developmentmrmwood
 
3.12 external and internal resources
3.12 external and internal resources3.12 external and internal resources
3.12 external and internal resourcesmrmwood
 
2.9 The consequences of the use of ict
2.9 The consequences of the use of ict2.9 The consequences of the use of ict
2.9 The consequences of the use of ictmrmwood
 
2.8 factors affecting the use of ict
2.8 factors affecting the use of ict2.8 factors affecting the use of ict
2.8 factors affecting the use of ictmrmwood
 
2.7 what ict can provide
2.7 what ict can provide2.7 what ict can provide
2.7 what ict can providemrmwood
 
Computer misuse act new 13 12-11
Computer misuse act new 13 12-11Computer misuse act new 13 12-11
Computer misuse act new 13 12-11mrmwood
 
Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11mrmwood
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11mrmwood
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11mrmwood
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents actmrmwood
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents actmrmwood
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents actmrmwood
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Actmrmwood
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
 

Mais de mrmwood (20)

3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations
 
3.8 development methods
3.8 development methods3.8 development methods
3.8 development methods
 
3.7 developing ict solutions
3.7 developing ict solutions3.7 developing ict solutions
3.7 developing ict solutions
 
3.6 legislation and regulations
3.6 legislation and regulations3.6 legislation and regulations
3.6 legislation and regulations
 
3.11 training and supporting users
3.11 training and supporting users3.11 training and supporting users
3.11 training and supporting users
 
3.9 techniques and tools for systems development
3.9 techniques and tools for systems development3.9 techniques and tools for systems development
3.9 techniques and tools for systems development
 
3.12 external and internal resources
3.12 external and internal resources3.12 external and internal resources
3.12 external and internal resources
 
2.9 The consequences of the use of ict
2.9 The consequences of the use of ict2.9 The consequences of the use of ict
2.9 The consequences of the use of ict
 
2.8 factors affecting the use of ict
2.8 factors affecting the use of ict2.8 factors affecting the use of ict
2.8 factors affecting the use of ict
 
2.7 what ict can provide
2.7 what ict can provide2.7 what ict can provide
2.7 what ict can provide
 
Computer misuse act new 13 12-11
Computer misuse act new 13 12-11Computer misuse act new 13 12-11
Computer misuse act new 13 12-11
 
Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
 
Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 

Último

Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Último (20)

Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

2.6 backup and recovery

  • 1. 2.6 Backup and Recovery
  • 2. Print out Scary backup stories
  • 3. 1. What 6 questions should you ask yourself before writing a backup strategy? 2. When devising a backup strategy, risk assessment should be carried out, what should be looked at during this process? 3. What effect would it have on an organisation if they lost their data? 4. What 4 types of backup can be performed? 5. Describe a Full backup 6. Describe a differential backup 7. Describe an incremental backup 8. In order to make sure backups work what should you do? 9. What types of media could be used to backup systems? 10. What is meant by continuity of service and why is it important? 11. What is RAID 12. What is DRP and what does it aim to do? 13. What is backup strategy? 14. When choosing backup media and devices what factors should be taken into consideration?
  • 4.
  • 5. Do you backup your work?  What work do you backup?  When do you back it up?  How do you backup your work?  Which media do you use to backup your work?  Why do you back up your work?  Different individuals and organisations have different backup needs but they will all ask the same questions  http://ictknowledgebase.org.uk/backupstrategy
  • 6. Read and discuss the stories  What 3 things must you do in order for backups to work? ◦ Define and implement a good procedure ◦ Test that it works ◦ Review your procedure often
  • 7. I asked you these questions: ◦ What work do you backup? ◦ When do you back it up? ◦ How do you backup your work? ◦ Which media do you use to backup your work?  Organisations will also need to ask these two questions: ◦ Who will be responsible for the backup ◦ Where will the data be stored  Establishing the answers to these questions will allow the organisation to develop a Backup Strategy*
  • 8. 1. Assess what risks apply to the data 2. How likely it is that the hazards creating those risks will take place 3. What effect would it have on the organisation if that hazard occurred?  For some organisations their ICT systems is mission critical (They cannot operate without it)  If EasyJet‟s booking system went down for more than 48hrs they would go bankrupt
  • 9. Natural Disasters Causes of Lost Data 2% Human Error 6% 13% 32% Software Corruption Virus Attack 22% Hardware Error 25% Sabotage
  • 10. Must conduct thorough analysis  Must be monitored ◦ e.g. signing up for e-mails or alerts from local weather stations so that you are made aware of impending weather events
  • 11. Damage to reputation  Damaged loyalty ◦ i.e. customers may defect to a competitor  Loss of labour  Loss of revenue  Loss of service
  • 12. http://goo.gl/Nlxl5  On average, businesses lose between $84,000 and $108,000 (US) for every hour of IT system downtime, according to estimates from studies and surveys performed by IT industry analyst firms.  It is critical that organisations can recover quickly  *Discussed later on under „continuity of service‟
  • 13. A recent study has shown that of the companies that lose their data in a disaster:  29% are out of business within two years  Nearly 43% never open their doors after the disaster
  • 14.
  • 15.
  • 16. As you can see backing up data is important. Most organisations will have a backup strategy in place to support their data protection and recovery.  A strategy is simply a plan of action designed to achieve an overall aim  A backup strategy therefore is a planned approach to data protection and data recovery  Policies/Procedures are written to support implementation of the strategy ◦ A Policy/Procedure might be “a full backup must be performed every night”
  • 17. ◦ What work do you backup? ◦ When do you back it up? ◦How do you backup your work? ◦ Which media do you use to backup your work? ◦ Who will be responsible for the backup ◦ Where will the data be stored  You have choices as to HOW you backup your work
  • 18. Full Backup ◦ All the data that is stored in your files or folders that you wish to back up will be saved.  Advantages ◦ EVERYTHING is backed up at once on one device ◦ Restoring the data can be a simple process ◦ Data can better protected  Disadvantages ◦ Can take a long time to run the backup (depending on quantity of data) ◦ Can take a long time to restore the back up ◦ Storage media and medium for a FULL backup could be expensive ◦ Security issue as each full backup contains an entire copy of all data
  • 19. Differential Backup ◦ Only the data that is different since the last FULL backup will be saved  Advantages ◦ Reduces the time it takes to restore data ◦ Usually an automatic process ◦ Only the full and differential backup are needed to restore the data  Disadvantages ◦ If to many differential backups are performed size of the backup can be larger than full backup ◦ Slower than an incremental backup
  • 20. Incremental Backup ◦ Saves all the files that have been changed since the last backup (NOT just the last FULL backup)  Advantages ◦ Fastest way to backup ◦ Usually an automatic process  Disadvantages ◦ Restoring data can take a long time
  • 21. Full Backup ◦ All the data that is stored in your files or folders that you wish to back up will be saved.  Differential Backup ◦ Only the data that is different since the last FULL backup will be saved  Incremental Backup ◦ Saves all the files that have been changed since the last backup (NOT just the last FULL backup)  Here‟s a video to help illustrate the difference between an incremental backup and a differential backup: http://goo.gl/3hyG3
  • 22. Refers to backup of computer data by automatically saving a copy of every change made to that data  Essentially capturing every version of the data that the user saves.  Advantages ◦ It allows the user or administrator to restore data to any point in time ◦ In some situations, continuous data protection will require less space on backup media (usually disk) than traditional backup.  Most continuous data protection solutions save byte or block-level differences rather than file-level differences. This means that if you change one byte of a 100 GB file, only the changed byte or block is backed up  Disadvantages ◦ The continuous bandwidth usage can adversely affect network performance, especially in operations where file sizes are large, such as multimedia and CAD design environments.  To mitigate this risk, companies employ throttling techniques which prioritize network traffic in order to reduce the impact of backup on day-to-day operation
  • 23. Some solutions which are marketed as continuous data protection may only allow restores at fixed intervals such as 1 hour, or 24 hours.  Such schemes are not universally recognized as true continuous data protection, as they do not provide the ability to restore to any point in time.  Such solutions are often based on periodical snapshots,
  • 24. There is a popular backup method called the Grandfather, Father, Son backup  Homework 1 ◦ Research the Grandfather, Father, Son backup method and create a resource to illustrate this process http://www.lockergnome.com/it/2005/04/18/gfs-backup-strategy/
  • 25. ◦ What work do you backup? ◦ When do you back it up? ◦ How do you backup your work? ◦Which media do you use to backup your work? ◦ Who will be responsible for the backup ◦ Where will the data be stored  You have choices as to WHICH media you backup your work on
  • 26. Dependant on: ◦ Storage capacity required ◦ Portability of device ◦ Speed of data transfer ◦ Speed of access (time it takes for device to find a specific piece of stored data
  • 27. Magnetic Tape  Hard disks  Optical disks e.g. CD, DVD  Remote Backup service e.g. online backup  Flash Memory  Homework 2 ◦ Create a PowerPoint presentation with 6 slides ◦ Slide 1 called Backup media ◦ Slide 2-6 titles are those above (e.g. Magnetic Tape) ◦ On slides 2-6 introduce the media (include a picture) and then highlight advantages and disadvantages of using that media e.g. cost storage capacity, speed etc.
  • 28. Have you ever had to recover your work?  What procedures did you go through in order to recover your work?  Remember recovery (like backup) should be: ◦ Planned ◦ Checked i.e. checked people understand ◦ Tested i.e. checking the recovery
  • 29. Organisations need recovery procedures  These procedures are put in place to get the ICT system working again  Procedures considered include: ◦ Alternative accommodation ◦ Availability of step to help recovery process ◦ Availability of hardware to run the backups ◦ Training ◦ Availability of alternative communication lines
  • 30. Many companies rely on 24/7 service in order to function (e.g. online booking systems).  Failure to do so could have financial consequences as well as customer dissatisfaction.  Policies are required to ensure this happens, should cover: ◦ Location of backup ◦ Security of backup ◦ Appropriate backup for continuous service e.g. RAID
  • 31. Redundant Array of Independent Disks  RAID 1 – Mirroring ◦ Mirror the drives ◦ Exact copy  RAID 5 – Distributed Parity ◦ Strips the data across all 5 drives ◦ Can survive on two drives
  • 32. Disaster Recovery Plan  Tries to ensure that businesses can: ◦ Resume trading quickly by ensuring ICT services are back online as soon as possible ◦ Give customer, investors and trading partners confidence in the reliability of the company ◦ Retain customers who might change companies if there is a loss in trading time
  • 33. Half the class ◦ Research the Grandfather, Father, Son backup method and create a resource to illustrate this process  Other half ◦ Create a PowerPoint presentation with 6 slides ◦ Slide 1 called Backup media ◦ Slide 2-6 titles are those above (e.g. Magnetic Tape) ◦ On slides 2-6 introduce the media (include a picture) and then highlight advantages and disadvantages of using that media e.g. cost storage capacity, speed etc
  • 34.
  • 35.
  • 36.
  • 37. Page 99 and 100 of the McNee and Spencer Text Book.  Read both Case Studies and answer the „End of sub-Topic Questions‟ 4, 5 and 6 (Page 100)  For tomorrow‟s lesson (This must be printed out prior to lesson NOT on your arrival to the lesson) ◦ Thursday detention if failure to complete OR failure to have printed out before the lesson