Backup And Recovery

5,242 views

Published on

A powerpoint for Y12 As AQA ICT Unit 2

Published in: Education
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
5,242
On SlideShare
0
From Embeds
0
Number of Embeds
10
Actions
Shares
0
Downloads
372
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Backup And Recovery

  1. 1. Backup and Recovery Topic Six
  2. 2. How many of you have ever lost work on a computer?
  3. 3. How often do you back up your work or PC or laptop?
  4. 4. Threats to ICT Systems <ul><li>Computer/hardware failure </li></ul><ul><li>Deliberate damage </li></ul><ul><li>Accidental damage </li></ul><ul><li>Theft </li></ul><ul><li>Hacking </li></ul><ul><li>Fire </li></ul><ul><li>Terrorist attack </li></ul><ul><li>Natural disasters </li></ul><ul><li>Viruses </li></ul><ul><li>Software bugs </li></ul><ul><li>Power cuts </li></ul>
  5. 5. Malpractice and Crime <ul><li>Malpractice – improper, careless or unprofessional conduct </li></ul><ul><li>Crime – illegal act, punishable by law, contravention of a law </li></ul>
  6. 6. Viruses <ul><li>Main threat from malicious damage </li></ul><ul><li>Program that replicates itself and infects computers. </li></ul><ul><li>Usually carries with it a payload that causes damage </li></ul><ul><ul><li>Annoying messages </li></ul></ul><ul><ul><li>Delete programs or data </li></ul></ul><ul><ul><li>Use up resources and slow down running </li></ul></ul>
  7. 7. Viruses <ul><li>On the internet find out the names and ‘modus operandi’ of three different types of virus. </li></ul><ul><li>Viruses take time and resources to get rid of. </li></ul><ul><li>Trojans – performs a legitimate task but also has an undesirable function </li></ul><ul><li>Worm – keeps replicating itself using more resources up </li></ul>
  8. 8. Viruses <ul><li>Spread by </li></ul><ul><ul><li>Email (commonly attachments) </li></ul></ul><ul><ul><li>Intranet </li></ul></ul><ul><ul><li>Shared disks </li></ul></ul><ul><ul><li>Banner adverts </li></ul></ul><ul><ul><li>Downloads </li></ul></ul>
  9. 9. Preventing Viruses <ul><li>Install virus checking software </li></ul><ul><li>Do not open emails from unknown sources </li></ul><ul><li>Do not open file attachments unless from a known source </li></ul><ul><li>Keep software up to date </li></ul><ul><li>Have an AUP </li></ul><ul><li>Train staff to be aware of problems </li></ul><ul><li>Do not allow programs such as games etc </li></ul><ul><li>Prevent use of user removable media if possible </li></ul>
  10. 10. The Importance of Backup <ul><li>Backup procedures </li></ul><ul><li>Copies taken regularly on a routine basis </li></ul><ul><li>Copies kept away from the computer system </li></ul><ul><li>Copies could be kept in a fireproof safe </li></ul><ul><li>Copies preferably kept off site </li></ul>
  11. 11. Online Backup Services <ul><li>Advantage is the procedure can be automated </li></ul><ul><li>Backup is off site on a separate server </li></ul><ul><li>Data is encrypted before sending to prevent security problems </li></ul><ul><li>Disadvantage is trust and cost </li></ul><ul><li>www.datadepositbox.com/democitytv.asp </li></ul>
  12. 12. Backup Procedures <ul><li>Use a different tape/disk each day and rotate them </li></ul><ul><li>Make one person responsible </li></ul><ul><li>Keep backups safe </li></ul><ul><li>Rehearse recovery procedure </li></ul>
  13. 13. Scheduling Backups <ul><li>Backing up uses system resources so system will slow down </li></ul><ul><li>Backups can be manual or automatically scheduled </li></ul><ul><li>Use of ancestral file system (3 generations) </li></ul><ul><li>Full backup and partial (transaction) backup </li></ul>
  14. 14. The Needs of Individuals <ul><li>Backup strategy </li></ul><ul><ul><li>What </li></ul></ul><ul><ul><li>When </li></ul></ul><ul><ul><li>How </li></ul></ul><ul><ul><li>Storage </li></ul></ul>
  15. 15. What <ul><li>Types of backup </li></ul><ul><ul><li>Full backup </li></ul></ul><ul><ul><li>Incremental backup </li></ul></ul><ul><ul><li>Differential backup (cumulative) </li></ul></ul><ul><ul><li>Continual backup (mirrored disks) </li></ul></ul>
  16. 16. When <ul><li>Dependant upon how much data changes and how often it changes </li></ul><ul><li>Individuals </li></ul><ul><li>Organisations </li></ul><ul><ul><li>Systematic </li></ul></ul><ul><ul><li>Often in the evening </li></ul></ul>
  17. 17. How <ul><li>Wide variety of storage media </li></ul><ul><li>Depends upon </li></ul><ul><ul><li>Storage capacity </li></ul></ul><ul><ul><li>Portability </li></ul></ul><ul><ul><li>Speed of data transfer </li></ul></ul><ul><ul><li>Speed of access </li></ul></ul><ul><ul><li>Requirement to be connected to different devices </li></ul></ul>
  18. 18. Backup Media <ul><li>Magnetic tape (cheap and removable) </li></ul><ul><li>Magnetic disk (simple) </li></ul><ul><li>Optical media (slow transfer rate) </li></ul><ul><li>Pen/flash drives (small storage) </li></ul><ul><li>Floppy disks – no more! </li></ul>
  19. 19. Responsibility for Backups <ul><li>Why is this needed? </li></ul><ul><li>Recovery procedures </li></ul><ul><ul><li>Alternative accommodation </li></ul></ul><ul><ul><li>Availability of staff at short notice to recover backups </li></ul></ul><ul><ul><li>Availability of hardware to run backups </li></ul></ul><ul><ul><li>Training for staff on recovery procedures </li></ul></ul><ul><ul><li>Alternative communication lines </li></ul></ul>
  20. 20. Continuity of Service <ul><li>Dual processing </li></ul><ul><li>RAID systems </li></ul><ul><li>Clustering </li></ul><ul><li>Examples of organisations needing continuity of service? </li></ul>
  21. 21. Homework <ul><li>Case Study 1 on page 215 of your text book. </li></ul><ul><li>Please have ready to hand in first lesson after the half term. </li></ul>

×