SlideShare a Scribd company logo
Backup and Recovery Topic Six
How many of you have ever lost work on a computer?
How often do you back up your work or PC or laptop?
Threats to ICT Systems Computer/hardware failure Deliberate damage Accidental damage Theft Hacking Fire Terrorist attack Natural disasters Viruses Software bugs Power cuts
Malpractice and Crime Malpractice – improper, careless or unprofessional conduct Crime – illegal act, punishable by law, contravention of a law
Viruses Main threat from malicious damage Program that replicates itself and infects computers. Usually carries with it a payload that causes damage Annoying messages Delete programs or data Use up resources and slow down running
Viruses On the internet find out the names and ‘modus operandi’ of three different types of virus. Viruses take time and resources to get rid of. Trojans – performs a legitimate task but also has an undesirable function Worm – keeps replicating itself using more resources up
Viruses Spread by Email (commonly attachments) Intranet Shared disks Banner adverts Downloads
Preventing Viruses Install virus checking software Do not open emails from unknown sources Do not open file attachments unless from a known source Keep software up to date Have an AUP Train staff to be aware of problems Do not allow programs such as games etc Prevent use of user removable media if possible
The Importance of Backup Backup procedures Copies taken regularly on a routine basis Copies kept away from the computer system Copies could be kept in a fireproof safe Copies preferably kept off site
Online Backup Services Advantage is the procedure can be automated Backup is off site on a separate server Data is encrypted before sending to prevent security problems Disadvantage is trust and cost www.datadepositbox.com/democitytv.asp
Backup Procedures Use a different tape/disk each day and rotate them Make one person responsible Keep backups safe Rehearse recovery procedure
Scheduling Backups Backing up uses system resources so system will slow down Backups can be manual or automatically scheduled Use of ancestral file system (3 generations) Full backup and partial (transaction) backup
The Needs of Individuals Backup strategy What When How Storage
What Types of backup Full backup Incremental backup Differential backup (cumulative) Continual backup (mirrored disks)
When Dependant upon how much data changes and how often it changes Individuals Organisations Systematic Often in the evening
How Wide variety of storage media Depends upon Storage capacity Portability Speed of data transfer Speed of access Requirement to be connected to different devices
Backup Media Magnetic tape (cheap and removable) Magnetic disk (simple) Optical media (slow transfer rate) Pen/flash drives (small storage) Floppy disks – no more!
Responsibility for Backups Why is this needed? Recovery procedures Alternative accommodation Availability of staff at short notice to recover backups Availability of hardware to run backups Training for staff on recovery procedures Alternative communication lines
Continuity of Service Dual processing RAID systems Clustering Examples of organisations needing continuity of service?
Homework Case Study 1 on page 215 of your text book. Please have ready to hand in first lesson after the half term.
 
Ad

More Related Content

What's hot (20)

2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recovery
mrmwood
 
Backup strategy
Backup strategyBackup strategy
Backup strategy
mrscjrobertson
 
03 backup-and-recovery
03 backup-and-recovery03 backup-and-recovery
03 backup-and-recovery
hunny garg
 
Backup & restore in windows
Backup & restore in windowsBackup & restore in windows
Backup & restore in windows
Jab Vtl
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
Spiceworks
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
Tehmina Gulfam
 
Backing Up and Recovery
Backing Up and RecoveryBacking Up and Recovery
Backing Up and Recovery
Maham Huda
 
Data Backup and Recovery.pdf
Data Backup and Recovery.pdfData Backup and Recovery.pdf
Data Backup and Recovery.pdf
Ashraf Hossain
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
FellowBuddy.com
 
Backup
BackupBackup
Backup
AboubacarAhamadaRouf
 
Distributed file systems chapter 9
Distributed file systems chapter 9Distributed file systems chapter 9
Distributed file systems chapter 9
Alagappa Government Arts College, Karaikudi
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
Yateesh Yadav
 
Information Technology Disaster Planning
Information Technology Disaster PlanningInformation Technology Disaster Planning
Information Technology Disaster Planning
guest340570
 
Backup tools
Backup toolsBackup tools
Backup tools
university of Gujrat, pakistan
 
Basic principles of backup policies by Andrea Mauro, Backup Academy
Basic principles of backup policies by Andrea Mauro, Backup AcademyBasic principles of backup policies by Andrea Mauro, Backup Academy
Basic principles of backup policies by Andrea Mauro, Backup Academy
Veeam Software
 
DB security
 DB security DB security
DB security
ERSHUBHAM TIWARI
 
Top 10 PC Maintenance Tasks That You Need To Remember
Top 10 PC Maintenance Tasks That You Need To RememberTop 10 PC Maintenance Tasks That You Need To Remember
Top 10 PC Maintenance Tasks That You Need To Remember
sherireid89
 
Protection and security
Protection and securityProtection and security
Protection and security
mbadhi
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
Abhishek Pachisia
 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
vishal choudhary
 
2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recovery
mrmwood
 
03 backup-and-recovery
03 backup-and-recovery03 backup-and-recovery
03 backup-and-recovery
hunny garg
 
Backup & restore in windows
Backup & restore in windowsBackup & restore in windows
Backup & restore in windows
Jab Vtl
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
Spiceworks
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
Tehmina Gulfam
 
Backing Up and Recovery
Backing Up and RecoveryBacking Up and Recovery
Backing Up and Recovery
Maham Huda
 
Data Backup and Recovery.pdf
Data Backup and Recovery.pdfData Backup and Recovery.pdf
Data Backup and Recovery.pdf
Ashraf Hossain
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
FellowBuddy.com
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
Yateesh Yadav
 
Information Technology Disaster Planning
Information Technology Disaster PlanningInformation Technology Disaster Planning
Information Technology Disaster Planning
guest340570
 
Basic principles of backup policies by Andrea Mauro, Backup Academy
Basic principles of backup policies by Andrea Mauro, Backup AcademyBasic principles of backup policies by Andrea Mauro, Backup Academy
Basic principles of backup policies by Andrea Mauro, Backup Academy
Veeam Software
 
Top 10 PC Maintenance Tasks That You Need To Remember
Top 10 PC Maintenance Tasks That You Need To RememberTop 10 PC Maintenance Tasks That You Need To Remember
Top 10 PC Maintenance Tasks That You Need To Remember
sherireid89
 
Protection and security
Protection and securityProtection and security
Protection and security
mbadhi
 

Similar to Backup And Recovery (20)

backup-and-recovery-1234722875295639-2.ppt
backup-and-recovery-1234722875295639-2.pptbackup-and-recovery-1234722875295639-2.ppt
backup-and-recovery-1234722875295639-2.ppt
IrfanAthallah1
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
MISY
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
MISY
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of Data
MISY
 
OS Security 2009
OS Security 2009OS Security 2009
OS Security 2009
Deborah Obasogie
 
Chapter 2Controlling a ComputerChapter 2 OverviewOverv
Chapter 2Controlling a ComputerChapter 2 OverviewOvervChapter 2Controlling a ComputerChapter 2 OverviewOverv
Chapter 2Controlling a ComputerChapter 2 OverviewOverv
EstelaJeffery653
 
Computer security
Computer securityComputer security
Computer security
Merma Niña Callanta
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
Jan Wong
 
Digital Immunity -The Myths and Reality
Digital Immunity -The Myths and RealityDigital Immunity -The Myths and Reality
Digital Immunity -The Myths and Reality
amiable_indian
 
Desktop Security 8 9 07
Desktop Security 8 9 07Desktop Security 8 9 07
Desktop Security 8 9 07
Michigan Nonprofit Association
 
22-ch7.pptx
22-ch7.pptx22-ch7.pptx
22-ch7.pptx
nokedo123
 
Understanding operating systems 5th ed ch11
Understanding operating systems 5th ed ch11Understanding operating systems 5th ed ch11
Understanding operating systems 5th ed ch11
BarrBoy
 
Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptx
DondonGoles
 
Database security
Database securityDatabase security
Database security
afzaalkhalid1
 
W01p2virus wayman robert
W01p2virus wayman robertW01p2virus wayman robert
W01p2virus wayman robert
robsworld
 
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
MuruganandamC3
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
pranjal dutta
 
4.-Computer-Security for grade 10 preparation.pptx
4.-Computer-Security for grade 10 preparation.pptx4.-Computer-Security for grade 10 preparation.pptx
4.-Computer-Security for grade 10 preparation.pptx
PurnaBahadurRana1
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
lbcollins18
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and security
superb11b
 
backup-and-recovery-1234722875295639-2.ppt
backup-and-recovery-1234722875295639-2.pptbackup-and-recovery-1234722875295639-2.ppt
backup-and-recovery-1234722875295639-2.ppt
IrfanAthallah1
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
MISY
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
MISY
 
3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of Data
MISY
 
Chapter 2Controlling a ComputerChapter 2 OverviewOverv
Chapter 2Controlling a ComputerChapter 2 OverviewOvervChapter 2Controlling a ComputerChapter 2 OverviewOverv
Chapter 2Controlling a ComputerChapter 2 OverviewOverv
EstelaJeffery653
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
Jan Wong
 
Digital Immunity -The Myths and Reality
Digital Immunity -The Myths and RealityDigital Immunity -The Myths and Reality
Digital Immunity -The Myths and Reality
amiable_indian
 
Understanding operating systems 5th ed ch11
Understanding operating systems 5th ed ch11Understanding operating systems 5th ed ch11
Understanding operating systems 5th ed ch11
BarrBoy
 
Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptx
DondonGoles
 
W01p2virus wayman robert
W01p2virus wayman robertW01p2virus wayman robert
W01p2virus wayman robert
robsworld
 
4.-Computer-Security for grade 10 preparation.pptx
4.-Computer-Security for grade 10 preparation.pptx4.-Computer-Security for grade 10 preparation.pptx
4.-Computer-Security for grade 10 preparation.pptx
PurnaBahadurRana1
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
lbcollins18
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and security
superb11b
 
Ad

More from Wynthorpe (16)

Work Experience Presentation
Work Experience PresentationWork Experience Presentation
Work Experience Presentation
Wynthorpe
 
Combined Powerpoint
Combined PowerpointCombined Powerpoint
Combined Powerpoint
Wynthorpe
 
Malawi Quiz
Malawi QuizMalawi Quiz
Malawi Quiz
Wynthorpe
 
Ict – The Answer To Everything
Ict – The Answer To EverythingIct – The Answer To Everything
Ict – The Answer To Everything
Wynthorpe
 
Prd Presentation
Prd PresentationPrd Presentation
Prd Presentation
Wynthorpe
 
Safety And Security Of Data Student Work
Safety And Security Of Data Student WorkSafety And Security Of Data Student Work
Safety And Security Of Data Student Work
Wynthorpe
 
Safety And Security Of Data 4
Safety And Security Of Data 4Safety And Security Of Data 4
Safety And Security Of Data 4
Wynthorpe
 
Safety And Security Of Data 2
Safety And Security Of Data 2Safety And Security Of Data 2
Safety And Security Of Data 2
Wynthorpe
 
Safety And Security Of Data 1
Safety And Security Of Data 1Safety And Security Of Data 1
Safety And Security Of Data 1
Wynthorpe
 
Chris Dalby
Chris DalbyChris Dalby
Chris Dalby
Wynthorpe
 
Data And Information 2
Data And Information 2Data And Information 2
Data And Information 2
Wynthorpe
 
Audio And Image Files
Audio And Image FilesAudio And Image Files
Audio And Image Files
Wynthorpe
 
Data And Information
Data And InformationData And Information
Data And Information
Wynthorpe
 
AQA AS in ICT Course Introduction
AQA AS in ICT Course IntroductionAQA AS in ICT Course Introduction
AQA AS in ICT Course Introduction
Wynthorpe
 
Can You Tell
Can You TellCan You Tell
Can You Tell
Wynthorpe
 
Using New Technology In The Classroom
Using New Technology In The ClassroomUsing New Technology In The Classroom
Using New Technology In The Classroom
Wynthorpe
 
Work Experience Presentation
Work Experience PresentationWork Experience Presentation
Work Experience Presentation
Wynthorpe
 
Combined Powerpoint
Combined PowerpointCombined Powerpoint
Combined Powerpoint
Wynthorpe
 
Ict – The Answer To Everything
Ict – The Answer To EverythingIct – The Answer To Everything
Ict – The Answer To Everything
Wynthorpe
 
Prd Presentation
Prd PresentationPrd Presentation
Prd Presentation
Wynthorpe
 
Safety And Security Of Data Student Work
Safety And Security Of Data Student WorkSafety And Security Of Data Student Work
Safety And Security Of Data Student Work
Wynthorpe
 
Safety And Security Of Data 4
Safety And Security Of Data 4Safety And Security Of Data 4
Safety And Security Of Data 4
Wynthorpe
 
Safety And Security Of Data 2
Safety And Security Of Data 2Safety And Security Of Data 2
Safety And Security Of Data 2
Wynthorpe
 
Safety And Security Of Data 1
Safety And Security Of Data 1Safety And Security Of Data 1
Safety And Security Of Data 1
Wynthorpe
 
Data And Information 2
Data And Information 2Data And Information 2
Data And Information 2
Wynthorpe
 
Audio And Image Files
Audio And Image FilesAudio And Image Files
Audio And Image Files
Wynthorpe
 
Data And Information
Data And InformationData And Information
Data And Information
Wynthorpe
 
AQA AS in ICT Course Introduction
AQA AS in ICT Course IntroductionAQA AS in ICT Course Introduction
AQA AS in ICT Course Introduction
Wynthorpe
 
Can You Tell
Can You TellCan You Tell
Can You Tell
Wynthorpe
 
Using New Technology In The Classroom
Using New Technology In The ClassroomUsing New Technology In The Classroom
Using New Technology In The Classroom
Wynthorpe
 
Ad

Recently uploaded (20)

To study the nervous system of insect.pptx
To study the nervous system of insect.pptxTo study the nervous system of insect.pptx
To study the nervous system of insect.pptx
Arshad Shaikh
 
LDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini UpdatesLDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini Updates
LDM Mia eStudios
 
One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 
Quality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdfQuality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdf
Dr. Bindiya Chauhan
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-30-2025.pptx
YSPH VMOC Special Report - Measles Outbreak  Southwest US 4-30-2025.pptxYSPH VMOC Special Report - Measles Outbreak  Southwest US 4-30-2025.pptx
YSPH VMOC Special Report - Measles Outbreak Southwest US 4-30-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
Odoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo SlidesOdoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo Slides
Celine George
 
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Library Association of Ireland
 
Sinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_NameSinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_Name
keshanf79
 
The ever evoilving world of science /7th class science curiosity /samyans aca...
The ever evoilving world of science /7th class science curiosity /samyans aca...The ever evoilving world of science /7th class science curiosity /samyans aca...
The ever evoilving world of science /7th class science curiosity /samyans aca...
Sandeep Swamy
 
P-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 finalP-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 final
bs22n2s
 
How to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odooHow to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odoo
Celine George
 
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Library Association of Ireland
 
Unit 6_Introduction_Phishing_Password Cracking.pdf
Unit 6_Introduction_Phishing_Password Cracking.pdfUnit 6_Introduction_Phishing_Password Cracking.pdf
Unit 6_Introduction_Phishing_Password Cracking.pdf
KanchanPatil34
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
Anti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptxAnti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptx
Mayuri Chavan
 
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessUltimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Mark Soia
 
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulsepulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
sushreesangita003
 
Introduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe EngineeringIntroduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe Engineering
Damian T. Gordon
 
Biophysics Chapter 3 Methods of Studying Macromolecules.pdf
Biophysics Chapter 3 Methods of Studying Macromolecules.pdfBiophysics Chapter 3 Methods of Studying Macromolecules.pdf
Biophysics Chapter 3 Methods of Studying Macromolecules.pdf
PKLI-Institute of Nursing and Allied Health Sciences Lahore , Pakistan.
 
Operations Management (Dr. Abdulfatah Salem).pdf
Operations Management (Dr. Abdulfatah Salem).pdfOperations Management (Dr. Abdulfatah Salem).pdf
Operations Management (Dr. Abdulfatah Salem).pdf
Arab Academy for Science, Technology and Maritime Transport
 
To study the nervous system of insect.pptx
To study the nervous system of insect.pptxTo study the nervous system of insect.pptx
To study the nervous system of insect.pptx
Arshad Shaikh
 
LDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini UpdatesLDMMIA Reiki Master Spring 2025 Mini Updates
LDMMIA Reiki Master Spring 2025 Mini Updates
LDM Mia eStudios
 
One Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learningOne Hot encoding a revolution in Machine learning
One Hot encoding a revolution in Machine learning
momer9505
 
Quality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdfQuality Contril Analysis of Containers.pdf
Quality Contril Analysis of Containers.pdf
Dr. Bindiya Chauhan
 
Odoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo SlidesOdoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo Slides
Celine George
 
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Niamh Lucey, Mary Dunne. Health Sciences Libraries Group (LAI). Lighting the ...
Library Association of Ireland
 
Sinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_NameSinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_Name
keshanf79
 
The ever evoilving world of science /7th class science curiosity /samyans aca...
The ever evoilving world of science /7th class science curiosity /samyans aca...The ever evoilving world of science /7th class science curiosity /samyans aca...
The ever evoilving world of science /7th class science curiosity /samyans aca...
Sandeep Swamy
 
P-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 finalP-glycoprotein pamphlet: iteration 4 of 4 final
P-glycoprotein pamphlet: iteration 4 of 4 final
bs22n2s
 
How to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odooHow to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odoo
Celine George
 
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Marie Boran Special Collections Librarian Hardiman Library, University of Gal...
Library Association of Ireland
 
Unit 6_Introduction_Phishing_Password Cracking.pdf
Unit 6_Introduction_Phishing_Password Cracking.pdfUnit 6_Introduction_Phishing_Password Cracking.pdf
Unit 6_Introduction_Phishing_Password Cracking.pdf
KanchanPatil34
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
Anti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptxAnti-Depressants pharmacology 1slide.pptx
Anti-Depressants pharmacology 1slide.pptx
Mayuri Chavan
 
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam SuccessUltimate VMware 2V0-11.25 Exam Dumps for Exam Success
Ultimate VMware 2V0-11.25 Exam Dumps for Exam Success
Mark Soia
 
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulsepulse  ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
pulse ppt.pptx Types of pulse , characteristics of pulse , Alteration of pulse
sushreesangita003
 
Introduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe EngineeringIntroduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe Engineering
Damian T. Gordon
 

Backup And Recovery

  • 2. How many of you have ever lost work on a computer?
  • 3. How often do you back up your work or PC or laptop?
  • 4. Threats to ICT Systems Computer/hardware failure Deliberate damage Accidental damage Theft Hacking Fire Terrorist attack Natural disasters Viruses Software bugs Power cuts
  • 5. Malpractice and Crime Malpractice – improper, careless or unprofessional conduct Crime – illegal act, punishable by law, contravention of a law
  • 6. Viruses Main threat from malicious damage Program that replicates itself and infects computers. Usually carries with it a payload that causes damage Annoying messages Delete programs or data Use up resources and slow down running
  • 7. Viruses On the internet find out the names and ‘modus operandi’ of three different types of virus. Viruses take time and resources to get rid of. Trojans – performs a legitimate task but also has an undesirable function Worm – keeps replicating itself using more resources up
  • 8. Viruses Spread by Email (commonly attachments) Intranet Shared disks Banner adverts Downloads
  • 9. Preventing Viruses Install virus checking software Do not open emails from unknown sources Do not open file attachments unless from a known source Keep software up to date Have an AUP Train staff to be aware of problems Do not allow programs such as games etc Prevent use of user removable media if possible
  • 10. The Importance of Backup Backup procedures Copies taken regularly on a routine basis Copies kept away from the computer system Copies could be kept in a fireproof safe Copies preferably kept off site
  • 11. Online Backup Services Advantage is the procedure can be automated Backup is off site on a separate server Data is encrypted before sending to prevent security problems Disadvantage is trust and cost www.datadepositbox.com/democitytv.asp
  • 12. Backup Procedures Use a different tape/disk each day and rotate them Make one person responsible Keep backups safe Rehearse recovery procedure
  • 13. Scheduling Backups Backing up uses system resources so system will slow down Backups can be manual or automatically scheduled Use of ancestral file system (3 generations) Full backup and partial (transaction) backup
  • 14. The Needs of Individuals Backup strategy What When How Storage
  • 15. What Types of backup Full backup Incremental backup Differential backup (cumulative) Continual backup (mirrored disks)
  • 16. When Dependant upon how much data changes and how often it changes Individuals Organisations Systematic Often in the evening
  • 17. How Wide variety of storage media Depends upon Storage capacity Portability Speed of data transfer Speed of access Requirement to be connected to different devices
  • 18. Backup Media Magnetic tape (cheap and removable) Magnetic disk (simple) Optical media (slow transfer rate) Pen/flash drives (small storage) Floppy disks – no more!
  • 19. Responsibility for Backups Why is this needed? Recovery procedures Alternative accommodation Availability of staff at short notice to recover backups Availability of hardware to run backups Training for staff on recovery procedures Alternative communication lines
  • 20. Continuity of Service Dual processing RAID systems Clustering Examples of organisations needing continuity of service?
  • 21. Homework Case Study 1 on page 215 of your text book. Please have ready to hand in first lesson after the half term.
  • 22.