1 AQA ICT AS Level © Nelson Thornes 2008 1. 2 2 How annoying is it when you lose files on your home computer?? For an organisation it’s a REAL DISASTER!!

Slides:



Advertisements
Similar presentations
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Advertisements

AS ICT. Identify suitable uses of common storage media understand the types of access and access speeds required for each use (e.g. serial/sequential,
Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens.
Backing up and Archiving Data Chapter 1. Introduction This presentation covers the following: – What is backing up – What is archiving – Why are both.
Backing Up Your Computer Hard Drive Lou Koch June 27, 2006.
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
Backup Strategy. An Exam question will ask you to describe a backup strategy. Be able to explain: Safe, secure place in different location. Why? – For.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Everything your business needs to know but probably doesn’t.
Backups Rob Limbaugh March 2, Agenda  Explain of a Backup and purpose  Habits  Discuss Types  Risk/Scope  Disasters and Recovery.
Preservasi Informasi Digital.  It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and.
1 AQA ICT AS Level © Nelson Thornes Backup and its importance.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Back Up and Recovery Sue Kayton February 2013.
Security and Backup Avoid disasters – have a good backup policy Avoid disasters – have a tight security scheme in place UK law dictates the board of directors.
3.1 Storage devices and media
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Procedures for Backup and Recovery Section 14. Key points and questions What data should be backed up and how often? What do we mean by full backup, incremental.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Protecting ICT Systems
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Essential Computer Concepts
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
IT Security for Users By Matthew Moody.
1.1 System Performance Security Module 1 Version 5.
Dr.Backup Online Backup Service (888) (toll free)
BACKUP AND ARCHIVING DATA BACKUP AND RECOVERY OF DATA.
INFO1 – Practical problem solving in the digital world
The Simple Side of Computer Security for The Brownies That Like To Read!!
Module 7. Data Backups  Definitions: Protection vs. Backups vs. Archiving  Why plan for and execute data backups?  Considerations  Issues/Concerns.
1 Availability Policy (slides from Clement Chen and Craig Lewis)
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
11 DISASTER RECOVERY Chapter 13. Chapter 13: DISASTER RECOVERY2 OVERVIEW  Back up server data using the Backup utility and the Ntbackup command  Restore.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
BACKUP & RECOVERY Option 1: Transaction Processing Systems.
McLean HIGHER COMPUTER NETWORKING Lesson 15 (a) Disaster Avoidance Description of disaster avoidance: use of anti-virus software use of fault tolerance.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Verification & Validation F451 AS Computing. Why check data? It’s useless if inaccurate. Also, wrong data: Can be annoying Can cost a fortune Can be dangerous.
Security and Backup. Introduction A back-up strategy must cover all eventualities: Accidental damage Equipment failure Deliberate damage It must consider:
20/12/20151 Data Structures Backing up and Archiving Data.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Protecting Your Data With Just Get Backup, LLC. Agenda How important is your data – Acknowledging worst-case scenarios. Understanding that data backup.
The aim of producing a backup strategy is to make sure that a computer system can be returned to its original state if data has been lost or corrupted.
Managing Data & Information Procedures & Techniques.
Verification & Validation
1 AQA ICT AS Level © Nelson Thornes Firewalls and Virus Checkers.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Unit 12 – IT Technical Support – Anne Sewell Aims of the lesson: To carry out a back-up of files to a USB or desktop. This is a build-up exercise towards.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Welcome to the ICT Department Unit 3_5 Security Policies.
ICT IGCSE Theory – Revision Presentation 3.1 Storage devices and media Chapter 3: Storage devices and media Identify storage devices,
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Backup and Disaster Dr Stuart Petch CeG IT/IS Manager
Networking Objectives Understand what the following policies will contain – Disaster recovery – Backup – Archiving – Acceptable use – failover.
Chapter 6 Protecting Your Files
AS ICT Module 2 Objectives: Security of Data
Backup your Data © EIT, Author Gay Robertson, 2017.
Back Up and Recovery Sue Kayton October 2015.
Backup and restoration of data, redundancy
Presentation transcript:

1 AQA ICT AS Level © Nelson Thornes

2 2 How annoying is it when you lose files on your home computer?? For an organisation it’s a REAL DISASTER!!

3 AQA ICT AS Level © Nelson Thornes Computer/ hardware failure Hacking Deliberate damage Fire Terrorist attack Natural disasters Theft Accidental damage virses Software bugs Powercuts Threats to ICT systems?

4 AQA ICT AS Level © Nelson Thornes Earthquake – Los Angeles 1994 Floods – Gloucestershire, UK 2007 Terrorism – City of London 1993 Natural disasters account for only 2% of loss. Natural or man-made disasters

5 AQA ICT AS Level © Nelson Thornes Disadvantages? Context of use? Characteristics?

6 AQA ICT AS Level © Nelson Thornes Context of use Characteristic Disadvantages?

7 AQA ICT AS Level © Nelson Thornes Context of use Characteristic Disadvantages?

8 AQA ICT AS Level © Nelson Thornes Grade C Grade A Grade B What type of backup should be used? Can you all list the elements of an organisation’s backup strategy? Can you suggest examples for the elements you have discussed? Can you explain why you have suggested these examples in reference to a specific scenario / organisation?

9 AQA ICT AS Level © Nelson Thornes Re-cap…. Crime? Example? Malpractice? Example? Examples of virus… Trojan? Worm? How do viruses spread? -External -Internal -Intranet -Clicking on banner ads -Downloads eg game sites How to prevent viruses? 1.Install virus checking software 2.Keep antivirus software up to date 3.Do NOT open from unknown sources 4.Have a clear ACCEPTABLE USE POLICY 5.Train staff 6.Prevent downloads (games / videos etc) 7.Avoid the use of removable media

10 AQA ICT AS Level © Nelson Thornes AQA ICT AS Level © Nelson Thornes 2008 What do we mean by backup? A backup is simply an extra copy of the data / software from a computer system. If data becomes corrupted or is stolen, it can be restored from the backup copy. A backup and recovery strategy is needed to plan how data is backed up and how it will be recovered. A recovery strategy may also include sourcing hardware and office space. Backup and its importance The data an organisation holds is a very valuable commodity and is usually worth more than the cost of the hardware and software together! Remember… Think about how a business would operate without the following… -Customer database -Supplier database -Product database -Records of all correspondence (e.g. price lists, quotes) -Accounts info

11 AQA ICT AS Level © Nelson Thornes AQA ICT AS Level © Nelson Thornes 2008 “Of companies that had a major loss of computerised records, 43% never re-open, 51% close within two years and only 6% will survive long-term.” Jim Hoffer, "Backing Up Business - Industry Trend or Event", Health Management Technology, Jan 2001 Backup in business

12 AQA ICT AS Level © Nelson Thornes AQA ICT AS Level © Nelson Thornes 2008 What kind of institutions would this be essential for? The system / data held are so critical to the business that they cannot be lost even for a short period of time. This means the ICT system must keep running so a user would not notice that anything happened. Online booking and ordering systems are examples of systems where 24/7 reliability is essential. If a customer finds the system down, they may go to a competitor!! Why is there a need for continuity of service???

13 AQA ICT AS Level © Nelson Thornes AQA ICT AS Level © Nelson Thornes 2008 Are procedures / actions put in place in order to get the system working again (back to its original state) The procedure must be a tried and tested plan – WHY? List the things that would need to be considered in the recovery procedure? If the system does break down a RECOVERY PROCEDURE is needed… Alternative accommodation (should the building be destroyed) Availability of staff at short notice to help recover the backups Availability of hardware to run the back ups on Training for staff to instruct them how to get things back to normal Availability of alternative communication lines to get network facilities back

14 AQA ICT AS Level © Nelson Thornes AQA ICT AS Level © Nelson Thornes 2008 backup strategy will include the following…. 1.What data needs to be backed up? 2.How often does the data need to be backed up? 3.When does the data need to be backed up? 4.Which backup media will be used? 5.Who will be responsible? 6.Where will the backup be stored? Backup strategy are actions a person or organisation can take to ensure that regular back up copies are made… 6 Questions!!

15 AQA ICT AS Level © Nelson Thornes AQA ICT AS Level © Nelson Thornes What data needs to be backed up? The amount of data that needs to be backed up will effect the type of backup used There are 3 types of backup: –Full –Differential –incremental

16 AQA ICT AS Level © Nelson Thornes AQA ICT AS Level © Nelson Thornes 2008 Full Incremental Differential What type of backup should be used? Make a copy of ALL the files Make a copy of files that have changed since the LAST FULL back up Make a copy of files that have changed since the LAST back up

17 AQA ICT AS Level © Nelson Thornes AQA ICT AS Level © Nelson Thornes 2008 Benefits and limitations summary…. Type of backup Time taken to perform backup Time taken for restoration Storage space required for backup Full Differential Incremental Compare against the other types of backup when you answer

18 AQA ICT AS Level © Nelson Thornes AQA ICT AS Level © Nelson Thornes 2008 Benefits and limitations summary…. Type of backup Time taken to perform backup Time taken for restoration Storage space required for backup Full Differential Incremental Compare against the other types of backup when you answer

19 AQA ICT AS Level © Nelson Thornes AQA ICT AS Level © Nelson Thornes 2008 Depends on how often the data changes Ideal situation for data to be backed up is as soon as it changes Therefore most server-based systems have RAID drives –Save data onto several drives at the same time in a process called “mirroring” –This means that if one drive fails, the next one takes over and there is no loss of data –Best solution for if computers are in use 24 hours a day and there is no time at which a backup can be conveniently taken 2.how often does the data need to be backed up?

20 AQA ICT AS Level © Nelson Thornes AQA ICT AS Level © Nelson Thornes 2008 Many systems back their data up overnight when they are not in use As files cannot normally be backed up when they are in use Program and system files might not change as frequently as data files –So they only need to be backed up when they are changed 3. When does the data need to be backed up?

21 AQA ICT AS Level © Nelson Thornes AQA ICT AS Level © Nelson Thornes 2008 Type of back up? MonTuesWedThursFriNo. of storage devices used? Full All subjects Full All subjects Full All subjects Full All subjects Full All subjects FDFull All subjects Diff ICT Diff ICT Diff ART ICT Diff Media ART ICT FI FULL All subjects ICTNo school-No backup ARTMEDIA FDIFULL All subjects INC- artINC – BSINC - maths DIFF – Art / BS / maths Backup takes place at 5pm every day Subjects – ICT / Maths / Media / Art

22 AQA ICT AS Level © Nelson Thornes AQA ICT AS Level © Nelson Thornes which back up media will be used? Magnetic tapeMagnetic tape Hard disk Optical disk RAID Remote backup service These are the main types of backup media that you need to know about. Click on the links for more information. Click here to continue.here

23 AQA ICT AS Level © Nelson Thornes AQA ICT AS Level © Nelson Thornes 2008 Removable flash drive CDR or DVDR Disk These media are suitable for backing up home computers or for small business use. Click here to return to list of backup devices.here Backup media Removable hard disk

24 AQA ICT AS Level © Nelson Thornes AQA ICT AS Level © Nelson Thornes 2008 Hard Disk These media have large capacities and can be stored away from the main computer. A hard disk in another location can be used for backup. A laptop can be transferred and backed up to the user’s desktop computer hard disk. Backup media Click here to return to list of backup devices.here

25 AQA ICT AS Level © Nelson Thornes AQA ICT AS Level © Nelson Thornes 2008 RAID systems – instant backups in real time Click here to return to list of backup devices.here Backup media

26 AQA ICT AS Level © Nelson Thornes AQA ICT AS Level © Nelson Thornes 2008 DAT tape Removable media with large capacity – mostly for business use, Click here to return to list of backup devices.here Backup media

27 AQA ICT AS Level © Nelson Thornes AQA ICT AS Level © Nelson Thornes 2008 Remote backup services can be used for online backups. Click here to return to list of backup devices.here Backup services

28 AQA ICT AS Level © Nelson Thornes AQA ICT AS Level © Nelson Thornes 2008 A specific person needs to be designated to look after the backup procedure –Changing tapes when needed –Storing them appropriately Person responsible can be: –Network manager –Single user 5. who will be responsible?

29 AQA ICT AS Level © Nelson Thornes AQA ICT AS Level © Nelson Thornes 2008 Store it away from the original pc or server –In a remote base off site –Another part of the organisation In a fire/flood proof safe –Sometimes the person responsible takes the previous tape home with them Storage location needs to be secure to protect against theft. 6. where will the backup be stored (kept)?

30 AQA ICT AS Level © Nelson Thornes AQA ICT AS Level © Nelson Thornes 2008 Backup Strategy… ExpansionExample What How When Which Who Where What Documents instead of program files etc Every day / week / fortnight / month ?? Morning / afternoon / over night ?? USB / CD – R / DAT tape ? Could be the IT Technician in a org Off site – safe place Full / Differential / Incremental ?? Task – Complete the table

31 AQA ICT AS Level © Nelson Thornes AQA ICT AS Level © Nelson Thornes 2008 Backup Strategy… ExpansionExample What Files should be included in the backup? How Often should the backup take place? When When in the day (24hrs) should the backup take place? Which Storage medium should be used for the backup? Who Is responsible for the backup? Where Should storage media containing the backup be kept? What Type of backup should be run? Documents instead of music etc Every day / week / fortnight / month ?? Morning / afternoon / over night ?? USB / CD – R / DAT tape ? Could be the IT Technician in a org Off site – safe place Full / Differential / Incremental ??

32 AQA ICT AS Level © Nelson Thornes AQA ICT AS Level © Nelson Thornes 2008 Exam Question Many organisations such as retailers are expanding their e-commerce operations and need ICT systems that are available 24 hours a day every day of the year. It is important for their customers that the ICT systems are kept working. E-commerce operations have specific needs for the backup and recovery of their systems. Describe how these needs could be met. 10 marks

33 AQA ICT AS Level © Nelson Thornes AQA ICT AS Level © Nelson Thornes 2008