SlideShare a Scribd company logo
6
Most read
8
Most read
13
Most read
Backup and Recovery Topic Six
How many of you have ever lost work on a computer?
How often do you back up your work or PC or laptop?
Threats to ICT Systems Computer/hardware failure Deliberate damage Accidental damage Theft Hacking Fire Terrorist attack Natural disasters Viruses Software bugs Power cuts
Malpractice and Crime Malpractice – improper, careless or unprofessional conduct Crime – illegal act, punishable by law, contravention of a law
Viruses Main threat from malicious damage Program that replicates itself and infects computers. Usually carries with it a payload that causes damage Annoying messages Delete programs or data Use up resources and slow down running
Viruses On the internet find out the names and ‘modus operandi’ of three different types of virus. Viruses take time and resources to get rid of. Trojans – performs a legitimate task but also has an undesirable function Worm – keeps replicating itself using more resources up
Viruses Spread by Email (commonly attachments) Intranet Shared disks Banner adverts Downloads
Preventing Viruses Install virus checking software Do not open emails from unknown sources Do not open file attachments unless from a known source Keep software up to date Have an AUP Train staff to be aware of problems Do not allow programs such as games etc Prevent use of user removable media if possible
The Importance of Backup Backup procedures Copies taken regularly on a routine basis Copies kept away from the computer system Copies could be kept in a fireproof safe Copies preferably kept off site
Online Backup Services Advantage is the procedure can be automated Backup is off site on a separate server Data is encrypted before sending to prevent security problems Disadvantage is trust and cost www.datadepositbox.com/democitytv.asp
Backup Procedures Use a different tape/disk each day and rotate them Make one person responsible Keep backups safe Rehearse recovery procedure
Scheduling Backups Backing up uses system resources so system will slow down Backups can be manual or automatically scheduled Use of ancestral file system (3 generations) Full backup and partial (transaction) backup
The Needs of Individuals Backup strategy What When How Storage
What Types of backup Full backup Incremental backup Differential backup (cumulative) Continual backup (mirrored disks)
When Dependant upon how much data changes and how often it changes Individuals Organisations Systematic Often in the evening
How Wide variety of storage media Depends upon Storage capacity Portability Speed of data transfer Speed of access Requirement to be connected to different devices
Backup Media Magnetic tape (cheap and removable) Magnetic disk (simple) Optical media (slow transfer rate) Pen/flash drives (small storage) Floppy disks – no more!
Responsibility for Backups Why is this needed? Recovery procedures Alternative accommodation Availability of staff at short notice to recover backups Availability of hardware to run backups Training for staff on recovery procedures Alternative communication lines
Continuity of Service Dual processing RAID systems Clustering Examples of organisations needing continuity of service?
Homework Case Study 1 on page 215 of your text book. Please have ready to hand in first lesson after the half term.
 

More Related Content

What's hot (20)

PPT
Presentation on backup and recoveryyyyyyyyyyyyy
Tehmina Gulfam
 
PPTX
2.6 backup and recovery
mrmwood
 
PPT
Disaster Recovery & Data Backup Strategies
Spiceworks
 
PDF
Data Backup and Recovery.pdf
Ashraf Hossain
 
PPTX
Email investigation
Animesh Shaw
 
PPT
Backup strategy
mrscjrobertson
 
PPTX
Processing Crimes and Incident Scenes
primeteacher32
 
PDF
03 Data Recovery - Notes
Kranthi
 
PPT
Introduction to computer forensic
Online
 
PPTX
DATA RECOVERY TECHNIQUES
Venkatesh Pensalwar
 
PDF
CNIT 121: 8 Forensic Duplication
Sam Bowne
 
PPTX
System Security-Chapter 1
Vamsee Krishna Kiran
 
PPT
Database backup and recovery basics
Shahed Mohamed
 
PDF
Data recovery
Nithin Sathees
 
PPTX
Memory forensics
Sunil Kumar
 
PPTX
Memory forensics.pptx
9905234521
 
PPT
Database backup & recovery
Mustafa Khan
 
PDF
Information Security Lecture Notes
FellowBuddy.com
 
PDF
Incident response methodology
Piyush Jain
 
Presentation on backup and recoveryyyyyyyyyyyyy
Tehmina Gulfam
 
2.6 backup and recovery
mrmwood
 
Disaster Recovery & Data Backup Strategies
Spiceworks
 
Data Backup and Recovery.pdf
Ashraf Hossain
 
Email investigation
Animesh Shaw
 
Backup strategy
mrscjrobertson
 
Processing Crimes and Incident Scenes
primeteacher32
 
03 Data Recovery - Notes
Kranthi
 
Introduction to computer forensic
Online
 
DATA RECOVERY TECHNIQUES
Venkatesh Pensalwar
 
CNIT 121: 8 Forensic Duplication
Sam Bowne
 
System Security-Chapter 1
Vamsee Krishna Kiran
 
Database backup and recovery basics
Shahed Mohamed
 
Data recovery
Nithin Sathees
 
Memory forensics
Sunil Kumar
 
Memory forensics.pptx
9905234521
 
Database backup & recovery
Mustafa Khan
 
Information Security Lecture Notes
FellowBuddy.com
 
Incident response methodology
Piyush Jain
 

Similar to Backup And Recovery (20)

PPT
backup-and-recovery-1234722875295639-2.ppt
IrfanAthallah1
 
PPT
3e - Computer Crime
MISY
 
PPT
3e - Security And Privacy
MISY
 
PPT
3e - Security Of Data
MISY
 
PPT
OS Security 2009
Deborah Obasogie
 
DOCX
Chapter 2Controlling a ComputerChapter 2 OverviewOverv
EstelaJeffery653
 
PPT
Computer security
Merma Niña Callanta
 
PDF
IS L07 - Security, Ethics and Privacy
Jan Wong
 
PPT
Digital Immunity -The Myths and Reality
amiable_indian
 
PPT
Desktop Security 8 9 07
Michigan Nonprofit Association
 
PPTX
22-ch7.pptx
nokedo123
 
PPT
Understanding operating systems 5th ed ch11
BarrBoy
 
PPTX
Operating System and Virus (Introduction).pptx
DondonGoles
 
PPTX
Database security
afzaalkhalid1
 
PPTX
Protection and security
mbadhi
 
DOCX
W01p2virus wayman robert
robsworld
 
PPT
OPERATING SYSTEM
MuruganandamC3
 
PPT
Cyber forensics
pranjal dutta
 
PPTX
4.-Computer-Security for grade 10 preparation.pptx
PurnaBahadurRana1
 
PPT
Computer security and_privacy_2010-2011
lbcollins18
 
backup-and-recovery-1234722875295639-2.ppt
IrfanAthallah1
 
3e - Computer Crime
MISY
 
3e - Security And Privacy
MISY
 
3e - Security Of Data
MISY
 
OS Security 2009
Deborah Obasogie
 
Chapter 2Controlling a ComputerChapter 2 OverviewOverv
EstelaJeffery653
 
Computer security
Merma Niña Callanta
 
IS L07 - Security, Ethics and Privacy
Jan Wong
 
Digital Immunity -The Myths and Reality
amiable_indian
 
Desktop Security 8 9 07
Michigan Nonprofit Association
 
22-ch7.pptx
nokedo123
 
Understanding operating systems 5th ed ch11
BarrBoy
 
Operating System and Virus (Introduction).pptx
DondonGoles
 
Database security
afzaalkhalid1
 
Protection and security
mbadhi
 
W01p2virus wayman robert
robsworld
 
OPERATING SYSTEM
MuruganandamC3
 
Cyber forensics
pranjal dutta
 
4.-Computer-Security for grade 10 preparation.pptx
PurnaBahadurRana1
 
Computer security and_privacy_2010-2011
lbcollins18
 
Ad

More from Wynthorpe (16)

PPT
Work Experience Presentation
Wynthorpe
 
PPT
Combined Powerpoint
Wynthorpe
 
PPT
Malawi Quiz
Wynthorpe
 
PPT
Ict – The Answer To Everything
Wynthorpe
 
PPT
Prd Presentation
Wynthorpe
 
PPT
Safety And Security Of Data Student Work
Wynthorpe
 
PPT
Safety And Security Of Data 4
Wynthorpe
 
PPT
Safety And Security Of Data 2
Wynthorpe
 
PPT
Safety And Security Of Data 1
Wynthorpe
 
PPT
Chris Dalby
Wynthorpe
 
PPT
Data And Information 2
Wynthorpe
 
PPT
Audio And Image Files
Wynthorpe
 
PPT
Data And Information
Wynthorpe
 
PPT
AQA AS in ICT Course Introduction
Wynthorpe
 
PPT
Can You Tell
Wynthorpe
 
PPT
Using New Technology In The Classroom
Wynthorpe
 
Work Experience Presentation
Wynthorpe
 
Combined Powerpoint
Wynthorpe
 
Malawi Quiz
Wynthorpe
 
Ict – The Answer To Everything
Wynthorpe
 
Prd Presentation
Wynthorpe
 
Safety And Security Of Data Student Work
Wynthorpe
 
Safety And Security Of Data 4
Wynthorpe
 
Safety And Security Of Data 2
Wynthorpe
 
Safety And Security Of Data 1
Wynthorpe
 
Chris Dalby
Wynthorpe
 
Data And Information 2
Wynthorpe
 
Audio And Image Files
Wynthorpe
 
Data And Information
Wynthorpe
 
AQA AS in ICT Course Introduction
Wynthorpe
 
Can You Tell
Wynthorpe
 
Using New Technology In The Classroom
Wynthorpe
 
Ad

Recently uploaded (20)

PDF
community health nursing question paper 2.pdf
Prince kumar
 
PDF
Biological Bilingual Glossary Hindi and English Medium
World of Wisdom
 
PPTX
Soil and agriculture microbiology .pptx
Keerthana Ramesh
 
PDF
Generative AI: it's STILL not a robot (CIJ Summer 2025)
Paul Bradshaw
 
PDF
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
PPTX
How to Set Maximum Difference Odoo 18 POS
Celine George
 
PDF
SSHS-2025-PKLP_Quarter-1-Dr.-Kerby-Alvarez.pdf
AishahSangcopan1
 
PPTX
STAFF DEVELOPMENT AND WELFARE: MANAGEMENT
PRADEEP ABOTHU
 
PPTX
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
PDF
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 
PPTX
I AM MALALA The Girl Who Stood Up for Education and was Shot by the Taliban...
Beena E S
 
PPTX
MENINGITIS: NURSING MANAGEMENT, BACTERIAL MENINGITIS, VIRAL MENINGITIS.pptx
PRADEEP ABOTHU
 
PDF
0725.WHITEPAPER-UNIQUEWAYSOFPROTOTYPINGANDUXNOW.pdf
Thomas GIRARD, MA, CDP
 
PDF
Stokey: A Jewish Village by Rachel Kolsky
History of Stoke Newington
 
PDF
The Constitution Review Committee (CRC) has released an updated schedule for ...
nservice241
 
PPT
Talk on Critical Theory, Part II, Philosophy of Social Sciences
Soraj Hongladarom
 
PDF
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 
PDF
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
PPTX
PATIENT ASSIGNMENTS AND NURSING CARE RESPONSIBILITIES.pptx
PRADEEP ABOTHU
 
PPTX
grade 5 lesson matatag ENGLISH 5_Q1_PPT_WEEK4.pptx
SireQuinn
 
community health nursing question paper 2.pdf
Prince kumar
 
Biological Bilingual Glossary Hindi and English Medium
World of Wisdom
 
Soil and agriculture microbiology .pptx
Keerthana Ramesh
 
Generative AI: it's STILL not a robot (CIJ Summer 2025)
Paul Bradshaw
 
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
How to Set Maximum Difference Odoo 18 POS
Celine George
 
SSHS-2025-PKLP_Quarter-1-Dr.-Kerby-Alvarez.pdf
AishahSangcopan1
 
STAFF DEVELOPMENT AND WELFARE: MANAGEMENT
PRADEEP ABOTHU
 
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
LAW OF CONTRACT (5 YEAR LLB & UNITARY LLB )- MODULE - 1.& 2 - LEARN THROUGH P...
APARNA T SHAIL KUMAR
 
I AM MALALA The Girl Who Stood Up for Education and was Shot by the Taliban...
Beena E S
 
MENINGITIS: NURSING MANAGEMENT, BACTERIAL MENINGITIS, VIRAL MENINGITIS.pptx
PRADEEP ABOTHU
 
0725.WHITEPAPER-UNIQUEWAYSOFPROTOTYPINGANDUXNOW.pdf
Thomas GIRARD, MA, CDP
 
Stokey: A Jewish Village by Rachel Kolsky
History of Stoke Newington
 
The Constitution Review Committee (CRC) has released an updated schedule for ...
nservice241
 
Talk on Critical Theory, Part II, Philosophy of Social Sciences
Soraj Hongladarom
 
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
PATIENT ASSIGNMENTS AND NURSING CARE RESPONSIBILITIES.pptx
PRADEEP ABOTHU
 
grade 5 lesson matatag ENGLISH 5_Q1_PPT_WEEK4.pptx
SireQuinn
 

Backup And Recovery

  • 2. How many of you have ever lost work on a computer?
  • 3. How often do you back up your work or PC or laptop?
  • 4. Threats to ICT Systems Computer/hardware failure Deliberate damage Accidental damage Theft Hacking Fire Terrorist attack Natural disasters Viruses Software bugs Power cuts
  • 5. Malpractice and Crime Malpractice – improper, careless or unprofessional conduct Crime – illegal act, punishable by law, contravention of a law
  • 6. Viruses Main threat from malicious damage Program that replicates itself and infects computers. Usually carries with it a payload that causes damage Annoying messages Delete programs or data Use up resources and slow down running
  • 7. Viruses On the internet find out the names and ‘modus operandi’ of three different types of virus. Viruses take time and resources to get rid of. Trojans – performs a legitimate task but also has an undesirable function Worm – keeps replicating itself using more resources up
  • 8. Viruses Spread by Email (commonly attachments) Intranet Shared disks Banner adverts Downloads
  • 9. Preventing Viruses Install virus checking software Do not open emails from unknown sources Do not open file attachments unless from a known source Keep software up to date Have an AUP Train staff to be aware of problems Do not allow programs such as games etc Prevent use of user removable media if possible
  • 10. The Importance of Backup Backup procedures Copies taken regularly on a routine basis Copies kept away from the computer system Copies could be kept in a fireproof safe Copies preferably kept off site
  • 11. Online Backup Services Advantage is the procedure can be automated Backup is off site on a separate server Data is encrypted before sending to prevent security problems Disadvantage is trust and cost www.datadepositbox.com/democitytv.asp
  • 12. Backup Procedures Use a different tape/disk each day and rotate them Make one person responsible Keep backups safe Rehearse recovery procedure
  • 13. Scheduling Backups Backing up uses system resources so system will slow down Backups can be manual or automatically scheduled Use of ancestral file system (3 generations) Full backup and partial (transaction) backup
  • 14. The Needs of Individuals Backup strategy What When How Storage
  • 15. What Types of backup Full backup Incremental backup Differential backup (cumulative) Continual backup (mirrored disks)
  • 16. When Dependant upon how much data changes and how often it changes Individuals Organisations Systematic Often in the evening
  • 17. How Wide variety of storage media Depends upon Storage capacity Portability Speed of data transfer Speed of access Requirement to be connected to different devices
  • 18. Backup Media Magnetic tape (cheap and removable) Magnetic disk (simple) Optical media (slow transfer rate) Pen/flash drives (small storage) Floppy disks – no more!
  • 19. Responsibility for Backups Why is this needed? Recovery procedures Alternative accommodation Availability of staff at short notice to recover backups Availability of hardware to run backups Training for staff on recovery procedures Alternative communication lines
  • 20. Continuity of Service Dual processing RAID systems Clustering Examples of organisations needing continuity of service?
  • 21. Homework Case Study 1 on page 215 of your text book. Please have ready to hand in first lesson after the half term.
  • 22.