SlideShare a Scribd company logo
Click to add Text
Backup and
Recovery
Topic Six
Click to add Text
How many of you
have ever lost
work on a
computer?
Click to add Text
How often
do you
back up
your work
or PC or
laptop?
Threats to ICT Systems
• Computer/hardware failure
• Deliberate damage
• Accidental damage
• Theft
• Hacking
• Fire
• Terrorist attack
• Natural disasters
• Viruses
• Software bugs
• Power cuts
Malpractice and Crime
• Malpractice – improper,
careless or unprofessional
conduct
• Crime – illegal act, punishable
by law, contravention of a law
Viruses
• Main threat from malicious damage
• Program that replicates itself and infects
computers.
• Usually carries with it a payload that
causes damage
– Annoying messages
– Delete programs or data
– Use up resources and slow down running
Viruses
• On the internet find out the names and
‘modus operandi’ of three different types of
virus.
• Viruses take time and resources to get rid
of.
• Trojans – performs a legitimate task but
also has an undesirable function
• Worm – keeps replicating itself using more
resources up
Viruses
• Spread by
–Email (commonly attachments)
–Intranet
–Shared disks
–Banner adverts
–Downloads
Preventing Viruses
• Install virus checking software
• Do not open emails from unknown sources
• Do not open file attachments unless from a
known source
• Keep software up to date
• Have an AUP
• Train staff to be aware of problems
• Do not allow programs such as games etc
• Prevent use of user removable media if possible
The Importance of Backup
• Backup procedures
• Copies taken regularly on a routine basis
• Copies kept away from the computer
system
• Copies could be kept in a fireproof safe
• Copies preferably kept off site
Online Backup Services
• Advantage is the procedure can be
automated
• Backup is off site on a separate server
• Data is encrypted before sending to
prevent security problems
• Disadvantage is trust and cost
• www.datadepositbox.com/democitytv.asp
Backup Procedures
• Use a different tape/disk each day
and rotate them
• Make one person responsible
• Keep backups safe
• Rehearse recovery procedure
Scheduling Backups
• Backing up uses system resources so
system will slow down
• Backups can be manual or automatically
scheduled
• Use of ancestral file system (3
generations)
• Full backup and partial (transaction)
backup
The Needs of Individuals
• Backup strategy
–What
–When
–How
–Storage
What
• Types of backup
–Full backup
–Incremental backup
–Differential backup (cumulative)
–Continual backup (mirrored disks)
When
• Dependant upon how much data
changes and how often it changes
• Individuals
• Organisations
–Systematic
–Often in the evening
How
• Wide variety of storage media
• Depends upon
– Storage capacity
– Portability
– Speed of data transfer
– Speed of access
– Requirement to be connected to different
devices
Backup Media
• Magnetic tape (cheap and removable)
• Magnetic disk (simple)
• Optical media (slow transfer rate)
• Pen/flash drives (small storage)
• Floppy disks – no more!
Responsibility for Backups
• Why is this needed?
• Recovery procedures
– Alternative accommodation
– Availability of staff at short notice to recover
backups
– Availability of hardware to run backups
– Training for staff on recovery procedures
– Alternative communication lines
Continuity of Service
• Dual processing
• RAID systems
• Clustering
• Examples of organisations needing
continuity of service?
Homework
• Case Study 1 on page 215 of your
text book.
• Please have ready to hand in first
lesson after the half term.
backup-and-recovery-1234722875295639-2.ppt

More Related Content

Similar to backup-and-recovery-1234722875295639-2.ppt

It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery
Brian Pichman
 
chapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdfchapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdf
satonaka3
 
Security Architectures and Models.pptx
Security Architectures and Models.pptxSecurity Architectures and Models.pptx
Security Architectures and Models.pptx
RushikeshChikane2
 
Security.pdf
Security.pdfSecurity.pdf
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security Operations
Sam Bowne
 
7. Security Operations
7. Security Operations7. Security Operations
7. Security Operations
Sam Bowne
 
CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security Operations
Sam Bowne
 
INFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYINFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITY
Nishant Pawar
 
7-Backups of security Devices-03-06-2023.ppt
7-Backups of security Devices-03-06-2023.ppt7-Backups of security Devices-03-06-2023.ppt
7-Backups of security Devices-03-06-2023.ppt
abhichowdary16
 
Complete notes security
Complete notes securityComplete notes security
Complete notes security
Kitkat Emoo
 
security in is.pptx
security in is.pptxsecurity in is.pptx
security in is.pptx
selvapriyabiher
 
Web security
Web securityWeb security
Web security
Jin Castor
 
Threats
ThreatsThreats
Threats
sbmiller87
 
Data security
Data securityData security
Data security
sbmiller87
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
G Prachi
 
Quality of information
Quality of informationQuality of information
Quality of information
Mahmoud Shaqria
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentals
Manesh T
 
Cs8792 cns - unit v
Cs8792   cns - unit vCs8792   cns - unit v
Cs8792 cns - unit v
ArthyR3
 
Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptx
DondonGoles
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
Saqib Raza
 

Similar to backup-and-recovery-1234722875295639-2.ppt (20)

It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery It security for libraries part 3 - disaster recovery
It security for libraries part 3 - disaster recovery
 
chapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdfchapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdf
 
Security Architectures and Models.pptx
Security Architectures and Models.pptxSecurity Architectures and Models.pptx
Security Architectures and Models.pptx
 
Security.pdf
Security.pdfSecurity.pdf
Security.pdf
 
CISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security OperationsCISSP Prep: Ch 8. Security Operations
CISSP Prep: Ch 8. Security Operations
 
7. Security Operations
7. Security Operations7. Security Operations
7. Security Operations
 
CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security Operations
 
INFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYINFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITY
 
7-Backups of security Devices-03-06-2023.ppt
7-Backups of security Devices-03-06-2023.ppt7-Backups of security Devices-03-06-2023.ppt
7-Backups of security Devices-03-06-2023.ppt
 
Complete notes security
Complete notes securityComplete notes security
Complete notes security
 
security in is.pptx
security in is.pptxsecurity in is.pptx
security in is.pptx
 
Web security
Web securityWeb security
Web security
 
Threats
ThreatsThreats
Threats
 
Data security
Data securityData security
Data security
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Quality of information
Quality of informationQuality of information
Quality of information
 
Security in computer systems fundamentals
Security in computer systems fundamentalsSecurity in computer systems fundamentals
Security in computer systems fundamentals
 
Cs8792 cns - unit v
Cs8792   cns - unit vCs8792   cns - unit v
Cs8792 cns - unit v
 
Operating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptxOperating System and Virus (Introduction).pptx
Operating System and Virus (Introduction).pptx
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 

Recently uploaded

CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
blueshagoo1
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
khuleseema60
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
nitinpv4ai
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ImMuslim
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 

Recently uploaded (20)

CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 

backup-and-recovery-1234722875295639-2.ppt

  • 1. Click to add Text Backup and Recovery Topic Six
  • 2. Click to add Text How many of you have ever lost work on a computer?
  • 3. Click to add Text How often do you back up your work or PC or laptop?
  • 4. Threats to ICT Systems • Computer/hardware failure • Deliberate damage • Accidental damage • Theft • Hacking • Fire • Terrorist attack • Natural disasters • Viruses • Software bugs • Power cuts
  • 5. Malpractice and Crime • Malpractice – improper, careless or unprofessional conduct • Crime – illegal act, punishable by law, contravention of a law
  • 6. Viruses • Main threat from malicious damage • Program that replicates itself and infects computers. • Usually carries with it a payload that causes damage – Annoying messages – Delete programs or data – Use up resources and slow down running
  • 7. Viruses • On the internet find out the names and ‘modus operandi’ of three different types of virus. • Viruses take time and resources to get rid of. • Trojans – performs a legitimate task but also has an undesirable function • Worm – keeps replicating itself using more resources up
  • 8. Viruses • Spread by –Email (commonly attachments) –Intranet –Shared disks –Banner adverts –Downloads
  • 9. Preventing Viruses • Install virus checking software • Do not open emails from unknown sources • Do not open file attachments unless from a known source • Keep software up to date • Have an AUP • Train staff to be aware of problems • Do not allow programs such as games etc • Prevent use of user removable media if possible
  • 10. The Importance of Backup • Backup procedures • Copies taken regularly on a routine basis • Copies kept away from the computer system • Copies could be kept in a fireproof safe • Copies preferably kept off site
  • 11. Online Backup Services • Advantage is the procedure can be automated • Backup is off site on a separate server • Data is encrypted before sending to prevent security problems • Disadvantage is trust and cost • www.datadepositbox.com/democitytv.asp
  • 12. Backup Procedures • Use a different tape/disk each day and rotate them • Make one person responsible • Keep backups safe • Rehearse recovery procedure
  • 13. Scheduling Backups • Backing up uses system resources so system will slow down • Backups can be manual or automatically scheduled • Use of ancestral file system (3 generations) • Full backup and partial (transaction) backup
  • 14. The Needs of Individuals • Backup strategy –What –When –How –Storage
  • 15. What • Types of backup –Full backup –Incremental backup –Differential backup (cumulative) –Continual backup (mirrored disks)
  • 16. When • Dependant upon how much data changes and how often it changes • Individuals • Organisations –Systematic –Often in the evening
  • 17. How • Wide variety of storage media • Depends upon – Storage capacity – Portability – Speed of data transfer – Speed of access – Requirement to be connected to different devices
  • 18. Backup Media • Magnetic tape (cheap and removable) • Magnetic disk (simple) • Optical media (slow transfer rate) • Pen/flash drives (small storage) • Floppy disks – no more!
  • 19. Responsibility for Backups • Why is this needed? • Recovery procedures – Alternative accommodation – Availability of staff at short notice to recover backups – Availability of hardware to run backups – Training for staff on recovery procedures – Alternative communication lines
  • 20. Continuity of Service • Dual processing • RAID systems • Clustering • Examples of organisations needing continuity of service?
  • 21. Homework • Case Study 1 on page 215 of your text book. • Please have ready to hand in first lesson after the half term.