Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Pertemuan 23 Contingency Planning Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.

Similar presentations


Presentation on theme: "1 Pertemuan 23 Contingency Planning Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1."— Presentation transcript:

1 1 Pertemuan 23 Contingency Planning Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1

2 2 Learning Outcomes Pada akhir pertemuan ini, diharapkan mahasiswa akan mampu : Mahasiswa dapat menunjukkan hubungan antara Contingency planning dan crisis management

3 3 Outline Materi Data Recovery –How Does Data Loss Happen? –Do Nothing –Calling in The Experts –Protecting Yourself

4 4 Data Recovery If people are a company’s most valuable asset, then data comes a close second. As companies become more dependent on technology for all aspects of their operations, the information contained on computer disks and back-up tapes can mean the difference between continued success and failure. While most companies believe that their data is safe, many may not have set up event he most basic of back-up systems to protect it and data loss can happen to anyone.

5 5 How Does Data Loss Happen? Although data is a valuable commodity, not enough emphasis is placed on protecting this vulnerable asset from loss. While computer hardware and software are fallible, humans are notoriously even more so. Unfortunately many companies and individuals do not have – or do not put into practice – adequate back-up procedures, leaving themselves open to data loss. The majority of problems are caused by human error, such as accidentally overwriting back-up tapes, deleting important files, inadvertently formatting a hard disk or mishandling a laptop.

6 6 Malicious data loss can also be an issue, particularly where companies fail to make appropriate use of passwords. While there needs to be a balance between the complexity and frequency of password change and the ease with which users can remember them, to have passwords – even at the basic user level – that are common knowledge makes a company unnecessarily vulnerable. It is not unusual to find a list of everyone’s password stored in an easily accessible place within an office, or even a board displaying ‘this week’s password’.

7 7 Even if your staff are competent and trustworthy, hardware and software can still fail unexpectedly. Operating systems or packages may contain bugs or become corrupt, causing them to malfunction,with consequences such as overwritten data. Power surges from the power supply, or lightning, can also cause damage to computer equipment, and it is possible for the motor or the control board of a hard disk to burn out, locking its data inside, or for the disk just to fail when disaster strikes on a larger scale, there is always the more dramatic risk of the fire and water damage too.

8 8 Do Nothing Unfortunately, many companies are not prepared for the reality of hard disk or tape failure and often make a bad situation much worse. Retrievable data is often lost through inappropriate attempts to recover it. Simply rebooting a computer can cause the data to be overwritten permanently, as the system creates temporary files in supposedly unused space. A physically damage disk can become significantly more damage, sometimes to the point of no data being recoverable.

9 9 Calling in The Experts Whilst commercial data recovery tools exist, their use is not advisable as it is highly unlikely that a software tool written months ago, perhaps a continent away, can accurately diagnose the difference between a corrupted file system and a damaged head. These tools always provide a ‘best guess’ at what the problem is, and then give you the option to ‘go ahead and write to the media’, which is not a particularly safe thing to do.

10 10 Sometimes it is necessary to write customised programs for individual recoveries. When data has been lost because of software corruption rather than physical damage, extracting and rebuilding the files is the major process in recovery.

11 11 Protecting Yourself ‘Don’t panic’ is the first piece of advice to remember in a data loss emergency, and ‘do nothing’ – except call the experts – is the second. However, there are a number of simple steps you can take to protect your company against disaster. Put in place a regular, reliable back-up regime and make sure that it is strictly implemented by trained personnel. Duplicate the back-up to a second type of media so that if one fails the other is available.

12 12 Monitor the back-up to ensure that it has taken place and watch out for signs of anything unusual in the way the system operates. Keep at least one set of back-up tapes off site so that, if you premises burn down or are flooded, you will not lose your data. Back up before installing any new software. If possible, leave your systems on all the time in consistent environmental conditions – hardware failure happens most often at start-up and shut- down. Keep up with technology.

13 13 The End


Download ppt "1 Pertemuan 23 Contingency Planning Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1."

Similar presentations


Ads by Google