SlideShare a Scribd company logo
1 of 13
Download to read offline
Data Backup and Recovery
Presenter
Ashraf Hossain
Sr. Executive IT
Content
➢ What is Data Backup?
➢ Why we Backup?
➢ Backup Steps: The Basics
➢ Backup Considerations
➢ Methods of Backups
➢ Security Considerations for Backup Data
➢ Backup Frequency
What is Data Backup?
Data backup is the act of copying critical organizational data
to a secondary storage location. Data backup helps to protect
businesses against data loss by providing redundancy to the
primary storage location in case that location is compromised
or fails.
Why we Backup?
There are many reasons why your organization may want to back
up their data. The primary reason is to recover data after its loss.
The loss can occur by accidental deletion, a virus attack, or a
software or hardware failure. If any of those things occur and your
files are backed up, you can easily restore those files. Preventing
events that result in loss of data is most desired, but backing up
data provides the protection for data after a system failure.
Individual computers being backed up are different than servers
being backed up. Individual computer users can back up their own
information when desired and using methods they desire, whereas
data on organization servers need more formal backup procedures
Backup Steps: The Basics
 Find the files that you want to backup (documents,
spreadsheets, databases, etc.)
 Copy the files to backup media (USB Drive, external drive,
cloud storage drive, etc.)
 Repeat above at scheduled frequency.
Note: This is a primary level of backup. Ideally, you
should keep your files organized in folders for easy
identification of files needing backup.
Backup Considerations
 Method:
There are multiple methods of storing backup data. Some
methods are described in the Methods of Backups section.
 What to Backup:
There is a wide range of information that can be backed up. Files
that are stored can be backed up on desktops, notebooks, laptops,
and servers. In addition, data managed by applications you use
such as email programs, client intake programs and other programs
should also be backed up. An organization should discuss which
information is most important. It is important that organization
information be backed up whether it resides in the office, and/or on
any home computers that people may be working on for office
work.
Backup Considerations
 Frequency:
Backups must occur regularly in order to prevent data loss. The
more scheduled backups that take place the better off your
organization. Frequent backups take time, money, and resources
but the benefits outweigh these negatives.
 Storage Location:
It is a good practice to keep some backup information offsite. In
the event that a natural disaster occurs, your backup will mean
nothing if it got destroyed with all the computers and the building.
Backup Considerations
 Security:
Whether the backup data is onsite or offsite, you will want to
ensure the backup information is secure and accessible only by
those authorized to use it to restore lost data.
 Retention:
The amount of history to be saved is another thing to consider.
Depending on the nature of your business, you may want to keep
backups that are years, months, weeks, or even just a day old. Keep
in mind that the more backups you wish to save, the more space
you will need to have (increased cost).
Methods of Backups
You can setup regular backups of data in-house (locally), or via an
external service (vendor).
 Locally-Managed Backups
Many Windows operating systems such as XP and Windows 7
include Backup utilities for setting up regular backups of important
files. There are also software packages (free and purchased) that
can be used to backup data. In either case, wizards typically guide
you through the process of setting up your backup, and include
things such as designating the destination device for your backups
(see options below), choosing the folders/files to be backed up, and
specifying the frequency of backup. Keep in mind that if you use
any of the non-cloud-based destination options for your backup
data, it is advisable to keep a copy of the backup device contents in
a secured location separate from the office.
Methods of Backups
 Backup Destination Options
● Flash storage or USB drives
● CD/DVD
● External hard drive
● Cloud storage
Methods of Backups
 Vendor-Managed Backups
A backup service is another option where you pay companies that
specialize in performing backups for you. Your data is stored on
servers they own.
Below is a list of some backup services.
Security Considerations for
Backup Data
Security attacks — whether in the form of malicious Internet
content, theft of physical devices, login violations, or denials of
service (meaning others are prevented from accessing your site) —
can catch nonprofits off-guard, especially smaller and mid-sized
organizations that may be unaware of possible threats, and
unprepared to deal with them once they occur.
Yet data leakage to the public, systems down-time, and reputation
loss resulting from such security violations can easily turn away
new and existing constituents if such situations are not handled
appropriately and quickly. This may, in turn, impact on the
organization’s reputation and future opportunities for growth.
A computer virus outbreak or a network breach can cost an
organization thousands of dollars. In some cases, it may even lead
to legal liability and lawsuits. Because of these risks, you should
ensure your backup data is protected against unauthorized access.
THANK YOU

More Related Content

What's hot

2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recovery
mrmwood
 
Chapter06 Managing Disks And Data Storage
Chapter06      Managing  Disks And  Data  StorageChapter06      Managing  Disks And  Data  Storage
Chapter06 Managing Disks And Data Storage
Raja Waseem Akhtar
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
Kranthi
 
Chapter07 Advanced File System Management
Chapter07      Advanced  File  System  ManagementChapter07      Advanced  File  System  Management
Chapter07 Advanced File System Management
Raja Waseem Akhtar
 
Network Attached Storage (NAS)
Network Attached Storage (NAS)Network Attached Storage (NAS)
Network Attached Storage (NAS)
sandeepgodfather
 

What's hot (20)

Storage Area Network (San)
Storage Area Network (San)Storage Area Network (San)
Storage Area Network (San)
 
Backup and recovery
Backup and recoveryBackup and recovery
Backup and recovery
 
2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recovery
 
Chapter06 Managing Disks And Data Storage
Chapter06      Managing  Disks And  Data  StorageChapter06      Managing  Disks And  Data  Storage
Chapter06 Managing Disks And Data Storage
 
Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.
 
Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5
 
Backup & restore in windows
Backup & restore in windowsBackup & restore in windows
Backup & restore in windows
 
Data recovery power point
Data recovery power pointData recovery power point
Data recovery power point
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
 
Cloud storage
Cloud storageCloud storage
Cloud storage
 
Chapter07 Advanced File System Management
Chapter07      Advanced  File  System  ManagementChapter07      Advanced  File  System  Management
Chapter07 Advanced File System Management
 
Network Attached Storage (NAS)
Network Attached Storage (NAS)Network Attached Storage (NAS)
Network Attached Storage (NAS)
 
File system security
File system securityFile system security
File system security
 
Windows File Systems
Windows File SystemsWindows File Systems
Windows File Systems
 
Basics of storage Technology
Basics of storage TechnologyBasics of storage Technology
Basics of storage Technology
 
File system.
File system.File system.
File system.
 
Linux File System
Linux File SystemLinux File System
Linux File System
 
Data recovery
Data recoveryData recovery
Data recovery
 
Cloud storage
Cloud storageCloud storage
Cloud storage
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
 

Similar to Data Backup and Recovery.pdf

3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of Data
MISY
 
Not having a good backup
Not having a good backupNot having a good backup
Not having a good backup
Rita Crawford
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recovery
Sejahtera Affif
 
Understanding Memory in Computing part 1.pptx
Understanding Memory in Computing part 1.pptxUnderstanding Memory in Computing part 1.pptx
Understanding Memory in Computing part 1.pptx
Pravash Chandra Das
 
Backup & Its Relevance
Backup & Its RelevanceBackup & Its Relevance
Backup & Its Relevance
Revolucion
 
StoreGrid : Introduction & Features
StoreGrid : Introduction & FeaturesStoreGrid : Introduction & Features
StoreGrid : Introduction & Features
Revolucion
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery Plan
Rishu Mehra
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data  Disaster  Recovery  PlanCreating And Implementing A Data  Disaster  Recovery  Plan
Creating And Implementing A Data Disaster Recovery Plan
Rishu Mehra
 

Similar to Data Backup and Recovery.pdf (20)

3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of Data
 
Small Business Owners.pdf
Small Business Owners.pdfSmall Business Owners.pdf
Small Business Owners.pdf
 
Not having a good backup
Not having a good backupNot having a good backup
Not having a good backup
 
Power Point example for module 3 assignment
Power Point example for module 3 assignmentPower Point example for module 3 assignment
Power Point example for module 3 assignment
 
Black Box Backup System
Black Box Backup SystemBlack Box Backup System
Black Box Backup System
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recovery
 
Understanding Memory in Computing part 1.pptx
Understanding Memory in Computing part 1.pptxUnderstanding Memory in Computing part 1.pptx
Understanding Memory in Computing part 1.pptx
 
A brief introduction to data storage
A brief introduction to data storageA brief introduction to data storage
A brief introduction to data storage
 
Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16
 
Remote Data Backup Protection
Remote Data Backup ProtectionRemote Data Backup Protection
Remote Data Backup Protection
 
Backup & Its Relevance
Backup & Its RelevanceBackup & Its Relevance
Backup & Its Relevance
 
Enterprise data protection meeting
Enterprise data protection meetingEnterprise data protection meeting
Enterprise data protection meeting
 
An Ultimate Guide on Air Gap Backup
An Ultimate Guide on Air Gap BackupAn Ultimate Guide on Air Gap Backup
An Ultimate Guide on Air Gap Backup
 
StoreGrid : Introduction & Features
StoreGrid : Introduction & FeaturesStoreGrid : Introduction & Features
StoreGrid : Introduction & Features
 
Disaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the differenceDisaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the difference
 
Disaster Proof
Disaster ProofDisaster Proof
Disaster Proof
 
Database backup & recovery
Database backup & recoveryDatabase backup & recovery
Database backup & recovery
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery Plan
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data  Disaster  Recovery  PlanCreating And Implementing A Data  Disaster  Recovery  Plan
Creating And Implementing A Data Disaster Recovery Plan
 
ManagedBackup
ManagedBackupManagedBackup
ManagedBackup
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 

Data Backup and Recovery.pdf

  • 1. Data Backup and Recovery Presenter Ashraf Hossain Sr. Executive IT
  • 2. Content ➢ What is Data Backup? ➢ Why we Backup? ➢ Backup Steps: The Basics ➢ Backup Considerations ➢ Methods of Backups ➢ Security Considerations for Backup Data ➢ Backup Frequency
  • 3. What is Data Backup? Data backup is the act of copying critical organizational data to a secondary storage location. Data backup helps to protect businesses against data loss by providing redundancy to the primary storage location in case that location is compromised or fails.
  • 4. Why we Backup? There are many reasons why your organization may want to back up their data. The primary reason is to recover data after its loss. The loss can occur by accidental deletion, a virus attack, or a software or hardware failure. If any of those things occur and your files are backed up, you can easily restore those files. Preventing events that result in loss of data is most desired, but backing up data provides the protection for data after a system failure. Individual computers being backed up are different than servers being backed up. Individual computer users can back up their own information when desired and using methods they desire, whereas data on organization servers need more formal backup procedures
  • 5. Backup Steps: The Basics  Find the files that you want to backup (documents, spreadsheets, databases, etc.)  Copy the files to backup media (USB Drive, external drive, cloud storage drive, etc.)  Repeat above at scheduled frequency. Note: This is a primary level of backup. Ideally, you should keep your files organized in folders for easy identification of files needing backup.
  • 6. Backup Considerations  Method: There are multiple methods of storing backup data. Some methods are described in the Methods of Backups section.  What to Backup: There is a wide range of information that can be backed up. Files that are stored can be backed up on desktops, notebooks, laptops, and servers. In addition, data managed by applications you use such as email programs, client intake programs and other programs should also be backed up. An organization should discuss which information is most important. It is important that organization information be backed up whether it resides in the office, and/or on any home computers that people may be working on for office work.
  • 7. Backup Considerations  Frequency: Backups must occur regularly in order to prevent data loss. The more scheduled backups that take place the better off your organization. Frequent backups take time, money, and resources but the benefits outweigh these negatives.  Storage Location: It is a good practice to keep some backup information offsite. In the event that a natural disaster occurs, your backup will mean nothing if it got destroyed with all the computers and the building.
  • 8. Backup Considerations  Security: Whether the backup data is onsite or offsite, you will want to ensure the backup information is secure and accessible only by those authorized to use it to restore lost data.  Retention: The amount of history to be saved is another thing to consider. Depending on the nature of your business, you may want to keep backups that are years, months, weeks, or even just a day old. Keep in mind that the more backups you wish to save, the more space you will need to have (increased cost).
  • 9. Methods of Backups You can setup regular backups of data in-house (locally), or via an external service (vendor).  Locally-Managed Backups Many Windows operating systems such as XP and Windows 7 include Backup utilities for setting up regular backups of important files. There are also software packages (free and purchased) that can be used to backup data. In either case, wizards typically guide you through the process of setting up your backup, and include things such as designating the destination device for your backups (see options below), choosing the folders/files to be backed up, and specifying the frequency of backup. Keep in mind that if you use any of the non-cloud-based destination options for your backup data, it is advisable to keep a copy of the backup device contents in a secured location separate from the office.
  • 10. Methods of Backups  Backup Destination Options ● Flash storage or USB drives ● CD/DVD ● External hard drive ● Cloud storage
  • 11. Methods of Backups  Vendor-Managed Backups A backup service is another option where you pay companies that specialize in performing backups for you. Your data is stored on servers they own. Below is a list of some backup services.
  • 12. Security Considerations for Backup Data Security attacks — whether in the form of malicious Internet content, theft of physical devices, login violations, or denials of service (meaning others are prevented from accessing your site) — can catch nonprofits off-guard, especially smaller and mid-sized organizations that may be unaware of possible threats, and unprepared to deal with them once they occur. Yet data leakage to the public, systems down-time, and reputation loss resulting from such security violations can easily turn away new and existing constituents if such situations are not handled appropriately and quickly. This may, in turn, impact on the organization’s reputation and future opportunities for growth. A computer virus outbreak or a network breach can cost an organization thousands of dollars. In some cases, it may even lead to legal liability and lawsuits. Because of these risks, you should ensure your backup data is protected against unauthorized access.