SlideShare a Scribd company logo
1 of 31
Data Backup and
Disaster Recovery
Objectives
 Explain what backup is.
 Explain data backup and recovery plan.
 Explain the types of backup.
 Explain the types of backup media.
 Explain the need for data backup security.
 Explain what disaster recovery is.
 Explain the disaster recovery strategies.
What is Backup?
 Backup – is a duplicate copy of key
information such physical (paper) and
computer records.
 A good set of back procedures is
necessary to ensure that data is protected.
What is Backup?
 Data that should be backed up regularly
includes, but is not limited to
 email correspondence, audit files, user
information, utilities and applications,
operating systems, financial data and
databases, as well as customer lists.
Data Backup and Recovery Plan
The following are some factors that you might
consider in creating a backup and recovery
plan.
 Schedule of Backup
 Backing up data should be done at a convenient
time.
 Location of Backup Storage
 It is highly recommended that another set of data
backup is stored remotely in case of a natural
disaster as fire, leak, etc.
Data Backup and Recovery Plan
(cont’d)
 Data Backup Contents
 This will help you to decide it the data needs
to be backed up, how it should be backed up
and when it should be backed up.
 Frequency of Backups
 The rate at which the data changes effects
the frequency the data should be backed up.
Data Backup and Recovery Plan
(cont’d)
 Time of data restoration
 The planning of backup depends a lot on the
time it takes to recover a system
 Type of information contained in the
system
 It is important to know what information the
data contains so that you can identify it as
critical, confidential and etc.
Data Backup and Recovery Plan
(cont’d)
 Backup media
 Backup tapes are cheap, compact and can
store large amounts of data.
Types of Backup
 There are different combinations of
backups available:
 Full (Normal)
 Back up all data from the hard disk or a directory
or folder of the hard drive.
 Copy
 All the selected files and folders are backed up
and archive attribute is not changed to allow other
types of backup to be performed on the same
data.
Types of Backup (cont’d)
 Incremental
 only files that have changed or been created
since the last back up, whether the backup
itself is an incremental or full backup.
 Differential
 files that have changed or been created since
the last full backup.
 Daily
 files that have changed since the last daily
backup
Types of Backup Media
 Tape Drives
 Tape drivers can range in capacity from a few
megabytes to hundreds of gigabytes.
Types of Backup Media (cont’d)
 Disk Drives
 Disk drives offers high speed but expensive
backup media.
Types of Backup Media (cont’d)
 Removable Disks
 Removable drives are fast, easy to install and
portable.
Types of Backup Media (cont’d)
 Digital Audio Tape
 DAT drives have a larger capacity as
compared to standard tape drive.
Types of Backup Media (cont’d)
 Optical Jukeboxes
 Optical jukebox offer excellent amounts of
secure storage space ranging from 5 to 20
terabytes.
Types of Backup Media (cont’d)
 Autoloader tape systems
 Autoloader tape systems use a magazine of
tapes to create extended backup volumes.
 It is recommended for businesses that needs
very high capacity.
Factors in Choosing Backup Media
 Factors to consider in selecting an
appropriate backup solution:
 Speed
 It refers to how fast data can be backed up and
recovered.
 Reliability
 It refers to the reliability of the backup service and
media.
Factors in Choosing Backup Media
 Capacity
 It refers to the amount of data to backup given the
time and resource constraints.
 Extensibility
 It refers to the ability of the backup solution to
address the current needs of the organization
 Cost
 It refers to the cost of the backup solution and it
should conform to the budget availability.
Backup Tips
 Provide a point person to perform rollback in
the case of an emergency.
 Keep a record of the contents of the backup
media and date of backup.
Always verify backup.
 Create a restore point.
Backup Tips
 Encrypt and provide high permission on the
backup file.
 Create a detailed guideline on backup
recovery.
Data Backup Security
 There is a need to take steps to secure the
backups if the information is confidential and
critical such as personal or proprietary
information.
Data Backup Security
 Implement restrict access on the backup file
and to backup storage location.
 Store backups at an offsite facility.
What is Disaster Recovery?
 Disaster Recovery is the restoration of
system operations after a disaster has
occurred which causes damage or
physical loss.
 Three types of sites
 Hot Site
 It has the systems, communications and data on
stand by thus allowing to get back online and
resume operations within a few hours of failure.
What is Disaster Recovery?
 Warm Site
 Has systems and communications on stand by
but requires data to be restored first before
operation can be resumed.
 Cold Site
 Simply a physical location that has all the
resources necessary to support the system
Disaster Recovery Strategies
 Plan a backup schedule
 A backup plan should be based on the
requirements for restoring data.
Disaster Recovery Strategies
 Plan to backup open files
 Open files are files that are normally skipped
during the backup process.
Disaster Recovery Strategies
 Plan restore with automated System
Recovery (ASR)
 ASR is a new tool to automatically restore the
system after a system failure.
Disaster Recovery Strategies
Disaster Recovery Strategies (cont’d)
 Test restores
 Verifying the backup by testing restore is one
of the most overloaded aspect of disaster
recovery planning.
 Backup should be tested to validate the
backup and prepare for recovery.
 By testing restore, restore procedures can be
modified and documented conclusively.
Disaster Recovery Strategies (cont’d)
 Some of the common problems encountered
during restoration are the following:
 Incompatibility in hardware
 Missing hardware driver
 Corrupted backup media.
Summary
 Explain what backup is.
 Explain data backup and recovery plan.
 Explain the types of backup.
 Explain the types of backup media.
 Explain the need for data backup security.
 Explain what disaster recovery is.
 Explain the disaster recovery strategies.

More Related Content

What's hot

2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recoverymrmwood
 
Data Backup and Recovery.pdf
Data Backup and Recovery.pdfData Backup and Recovery.pdf
Data Backup and Recovery.pdfAshraf Hossain
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
Information Technology Disaster Planning
Information Technology Disaster PlanningInformation Technology Disaster Planning
Information Technology Disaster Planningguest340570
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating SystemMeghaj Mallick
 
Backing Up and Recovery
Backing Up and RecoveryBacking Up and Recovery
Backing Up and RecoveryMaham Huda
 
Email investigation
Email investigationEmail investigation
Email investigationAnimesh Shaw
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensicsRahul Baghla
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applicationswebhostingguy
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policieswardjo
 
Data recovery
Data recoveryData recovery
Data recoverybhaumik_c
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Net at Work
 
Computer security
Computer securityComputer security
Computer securityfiza1975
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityswapneel07
 
Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.Aakash Panchal
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 

What's hot (20)

2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recovery
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 
Data Backup and Recovery.pdf
Data Backup and Recovery.pdfData Backup and Recovery.pdf
Data Backup and Recovery.pdf
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Information Technology Disaster Planning
Information Technology Disaster PlanningInformation Technology Disaster Planning
Information Technology Disaster Planning
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating System
 
Backing Up and Recovery
Backing Up and RecoveryBacking Up and Recovery
Backing Up and Recovery
 
Email investigation
Email investigationEmail investigation
Email investigation
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Windows Registry
Windows RegistryWindows Registry
Windows Registry
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policies
 
Data recovery
Data recoveryData recovery
Data recovery
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
 
Computer security
Computer securityComputer security
Computer security
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.Fundamentals of Servers, server storage and server security.
Fundamentals of Servers, server storage and server security.
 
Data security
Data securityData security
Data security
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 

Similar to Data Backup & Disaster Recovery Guide

Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesSpiceworks
 
Enterprise data protection meeting
Enterprise data protection meetingEnterprise data protection meeting
Enterprise data protection meetingcsandit
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanRishu Mehra
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data  Disaster  Recovery  PlanCreating And Implementing A Data  Disaster  Recovery  Plan
Creating And Implementing A Data Disaster Recovery PlanRishu Mehra
 
MySQL Enterprise Backup
MySQL Enterprise BackupMySQL Enterprise Backup
MySQL Enterprise BackupMark Swarbrick
 
Comp8 unit9c lecture_slides
Comp8 unit9c lecture_slidesComp8 unit9c lecture_slides
Comp8 unit9c lecture_slidesCMDLMS
 
Data recovery report
Data recovery reportData recovery report
Data recovery reporttutannandi
 
A brief introduction to data storage
A brief introduction to data storageA brief introduction to data storage
A brief introduction to data storagePreludedx
 
Backup & recovery with rman
Backup & recovery with rmanBackup & recovery with rman
Backup & recovery with rmanitsabidhussain
 
Business Continuity Presentation
Business Continuity PresentationBusiness Continuity Presentation
Business Continuity Presentationperry57123
 
Understanding Memory in Computing part 1.pptx
Understanding Memory in Computing part 1.pptxUnderstanding Memory in Computing part 1.pptx
Understanding Memory in Computing part 1.pptxPravash Chandra Das
 
Black Box Backup System
Black Box Backup SystemBlack Box Backup System
Black Box Backup SystemCSCJournals
 
HPE Data Protector Best Practice Guide
HPE Data Protector Best Practice GuideHPE Data Protector Best Practice Guide
HPE Data Protector Best Practice GuideAndrey Karpov
 
Disaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the differenceDisaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the differencejeetendra mandal
 
Information management
Information managementInformation management
Information managementDeepak John
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoverySejahtera Affif
 
Dp%20 fudamentals%20%28ch1%29
Dp%20 fudamentals%20%28ch1%29Dp%20 fudamentals%20%28ch1%29
Dp%20 fudamentals%20%28ch1%29Navid Abbaspour
 

Similar to Data Backup & Disaster Recovery Guide (20)

Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
 
Enterprise data protection meeting
Enterprise data protection meetingEnterprise data protection meeting
Enterprise data protection meeting
 
Backup Exec 21
Backup Exec 21Backup Exec 21
Backup Exec 21
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery PlanCreating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data Disaster Recovery Plan
 
Creating And Implementing A Data Disaster Recovery Plan
Creating And Implementing A Data  Disaster  Recovery  PlanCreating And Implementing A Data  Disaster  Recovery  Plan
Creating And Implementing A Data Disaster Recovery Plan
 
Data recovery
Data recoveryData recovery
Data recovery
 
MySQL Enterprise Backup
MySQL Enterprise BackupMySQL Enterprise Backup
MySQL Enterprise Backup
 
Backup strategy plan
Backup strategy planBackup strategy plan
Backup strategy plan
 
Comp8 unit9c lecture_slides
Comp8 unit9c lecture_slidesComp8 unit9c lecture_slides
Comp8 unit9c lecture_slides
 
Data recovery report
Data recovery reportData recovery report
Data recovery report
 
A brief introduction to data storage
A brief introduction to data storageA brief introduction to data storage
A brief introduction to data storage
 
Backup & recovery with rman
Backup & recovery with rmanBackup & recovery with rman
Backup & recovery with rman
 
Business Continuity Presentation
Business Continuity PresentationBusiness Continuity Presentation
Business Continuity Presentation
 
Understanding Memory in Computing part 1.pptx
Understanding Memory in Computing part 1.pptxUnderstanding Memory in Computing part 1.pptx
Understanding Memory in Computing part 1.pptx
 
Black Box Backup System
Black Box Backup SystemBlack Box Backup System
Black Box Backup System
 
HPE Data Protector Best Practice Guide
HPE Data Protector Best Practice GuideHPE Data Protector Best Practice Guide
HPE Data Protector Best Practice Guide
 
Disaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the differenceDisaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the difference
 
Information management
Information managementInformation management
Information management
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recovery
 
Dp%20 fudamentals%20%28ch1%29
Dp%20 fudamentals%20%28ch1%29Dp%20 fudamentals%20%28ch1%29
Dp%20 fudamentals%20%28ch1%29
 

Recently uploaded

Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 

Recently uploaded (20)

Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 

Data Backup & Disaster Recovery Guide

  • 2. Objectives  Explain what backup is.  Explain data backup and recovery plan.  Explain the types of backup.  Explain the types of backup media.  Explain the need for data backup security.  Explain what disaster recovery is.  Explain the disaster recovery strategies.
  • 3. What is Backup?  Backup – is a duplicate copy of key information such physical (paper) and computer records.  A good set of back procedures is necessary to ensure that data is protected.
  • 4. What is Backup?  Data that should be backed up regularly includes, but is not limited to  email correspondence, audit files, user information, utilities and applications, operating systems, financial data and databases, as well as customer lists.
  • 5. Data Backup and Recovery Plan The following are some factors that you might consider in creating a backup and recovery plan.  Schedule of Backup  Backing up data should be done at a convenient time.  Location of Backup Storage  It is highly recommended that another set of data backup is stored remotely in case of a natural disaster as fire, leak, etc.
  • 6. Data Backup and Recovery Plan (cont’d)  Data Backup Contents  This will help you to decide it the data needs to be backed up, how it should be backed up and when it should be backed up.  Frequency of Backups  The rate at which the data changes effects the frequency the data should be backed up.
  • 7. Data Backup and Recovery Plan (cont’d)  Time of data restoration  The planning of backup depends a lot on the time it takes to recover a system  Type of information contained in the system  It is important to know what information the data contains so that you can identify it as critical, confidential and etc.
  • 8. Data Backup and Recovery Plan (cont’d)  Backup media  Backup tapes are cheap, compact and can store large amounts of data.
  • 9. Types of Backup  There are different combinations of backups available:  Full (Normal)  Back up all data from the hard disk or a directory or folder of the hard drive.  Copy  All the selected files and folders are backed up and archive attribute is not changed to allow other types of backup to be performed on the same data.
  • 10. Types of Backup (cont’d)  Incremental  only files that have changed or been created since the last back up, whether the backup itself is an incremental or full backup.  Differential  files that have changed or been created since the last full backup.  Daily  files that have changed since the last daily backup
  • 11. Types of Backup Media  Tape Drives  Tape drivers can range in capacity from a few megabytes to hundreds of gigabytes.
  • 12. Types of Backup Media (cont’d)  Disk Drives  Disk drives offers high speed but expensive backup media.
  • 13. Types of Backup Media (cont’d)  Removable Disks  Removable drives are fast, easy to install and portable.
  • 14. Types of Backup Media (cont’d)  Digital Audio Tape  DAT drives have a larger capacity as compared to standard tape drive.
  • 15. Types of Backup Media (cont’d)  Optical Jukeboxes  Optical jukebox offer excellent amounts of secure storage space ranging from 5 to 20 terabytes.
  • 16. Types of Backup Media (cont’d)  Autoloader tape systems  Autoloader tape systems use a magazine of tapes to create extended backup volumes.  It is recommended for businesses that needs very high capacity.
  • 17. Factors in Choosing Backup Media  Factors to consider in selecting an appropriate backup solution:  Speed  It refers to how fast data can be backed up and recovered.  Reliability  It refers to the reliability of the backup service and media.
  • 18. Factors in Choosing Backup Media  Capacity  It refers to the amount of data to backup given the time and resource constraints.  Extensibility  It refers to the ability of the backup solution to address the current needs of the organization  Cost  It refers to the cost of the backup solution and it should conform to the budget availability.
  • 19. Backup Tips  Provide a point person to perform rollback in the case of an emergency.  Keep a record of the contents of the backup media and date of backup. Always verify backup.  Create a restore point.
  • 20. Backup Tips  Encrypt and provide high permission on the backup file.  Create a detailed guideline on backup recovery.
  • 21. Data Backup Security  There is a need to take steps to secure the backups if the information is confidential and critical such as personal or proprietary information.
  • 22. Data Backup Security  Implement restrict access on the backup file and to backup storage location.  Store backups at an offsite facility.
  • 23. What is Disaster Recovery?  Disaster Recovery is the restoration of system operations after a disaster has occurred which causes damage or physical loss.  Three types of sites  Hot Site  It has the systems, communications and data on stand by thus allowing to get back online and resume operations within a few hours of failure.
  • 24. What is Disaster Recovery?  Warm Site  Has systems and communications on stand by but requires data to be restored first before operation can be resumed.  Cold Site  Simply a physical location that has all the resources necessary to support the system
  • 25. Disaster Recovery Strategies  Plan a backup schedule  A backup plan should be based on the requirements for restoring data.
  • 26. Disaster Recovery Strategies  Plan to backup open files  Open files are files that are normally skipped during the backup process.
  • 27. Disaster Recovery Strategies  Plan restore with automated System Recovery (ASR)  ASR is a new tool to automatically restore the system after a system failure.
  • 29. Disaster Recovery Strategies (cont’d)  Test restores  Verifying the backup by testing restore is one of the most overloaded aspect of disaster recovery planning.  Backup should be tested to validate the backup and prepare for recovery.  By testing restore, restore procedures can be modified and documented conclusively.
  • 30. Disaster Recovery Strategies (cont’d)  Some of the common problems encountered during restoration are the following:  Incompatibility in hardware  Missing hardware driver  Corrupted backup media.
  • 31. Summary  Explain what backup is.  Explain data backup and recovery plan.  Explain the types of backup.  Explain the types of backup media.  Explain the need for data backup security.  Explain what disaster recovery is.  Explain the disaster recovery strategies.