System Backup IB Computer Science.

Slides:



Advertisements
Similar presentations
Basic Concepts of a Computer Network
Advertisements

Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
Preservasi Informasi Digital.  It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and.
IT is our job! Mind your own business.. 1.Consulting 2.Support 3.Maintenance Network Assessment We provide you with an overview of your current network,
®® Microsoft Windows 7 for Power Users Tutorial 10 Backing Up and Restoring Files.
Trends (and Some Issues) in Electronic Records Management William Saffady, Professor College of Information and Computer Science Long Island University.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Software Requirements Presented By Dr. Shazzad Hosain.
© 2001 by Prentice Hall11-1 Local Area Networks, 3rd Edition David A. Stamper Part 4: Installation and Management Chapter 11 LAN Administration: Backup.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Task 16 Describe the need for document control (such as ensuring that completed models are approved, labelled and stored on a suitable storage medium).
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
McLean HIGHER COMPUTER NETWORKING Lesson 15 (a) Disaster Avoidance Description of disaster avoidance: use of anti-virus software use of fault tolerance.
ITGS Networks. ITGS Networks and components –Server computers normally have a higher specification than regular desktop computers because they must deal.
Chapter 2 Securing Network Server and User Workstations.
Cosc 4750 Backups Why Backup? In case of failure In case of loss of files –User and system files Because you will regret it, if you don’t. –DUMB = Disasters.
Communications & Networks National 4 & 5 Computing Science.
Communications & Networks National 4 & 5 Computing Science.
IB Computer Science Content developed by Dartford Grammar School Computer Science Department Objects as a programming concept.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Operating systems What is an operating system? A program that: Controls hardware Controls software Creates an interface between the hardware and the user.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
The Functions of Operating Systems Network Operating Systems (NOS)
An Introduction to Local Area Networks An Overview of Peer-to-Peer and Server-Based Models.
Welcome to the ICT Department Unit 3_5 Security Policies.
IB Computer Science Content developed by Dartford Grammar School Computer Science Department Objects as a programming concept.
Protecting Data at Rest Through Encryption CIO Summit November 30, 2007.
Networking Objectives Understand what the following policies will contain – Disaster recovery – Backup – Archiving – Acceptable use – failover.
Computer Organisation
Local Area Networks, 3rd Edition David A. Stamper
Chapter 6: Securing the Cloud
CompTIA Security+ Study Guide (SY0-401)
Planning & System installation
System Design Basics IB Computer Science.
Resource Management IB Computer Science.
Diskless Networks By Sam Morris.
Resource Management IB Computer Science.
Control Systems IB Computer Science.
Planning & System Installation
Planning & System installation
Presentation on Software Requirements Submitted by
Client-Server & Peer-to-Peer Networks
Planning & System installation
Computational Thinking, Problem-solving and Programming: General Principals IB Computer Science.
Planning & System Installation
Planning & System Installation
Planning & System Installation
System Design Basics IB Computer Science.
Computer Organisation
Planning & System installation
Planning & System Installation
Planning & System Installation
Section 15.1 Section 15.2 Identify Webmastering tasks
User Focus IB Computer Science.
System Design Basics IB Computer Science.
An Introduction to Computer Networking
SpiraTest/Plan/Team Deployment Considerations
12 STEPS TO A GDPR AWARE NETWORK
Partition Starter Find out what disk partitioning is, state key features, find a diagram and give an example.
Guarding against loss of data
Operating Systems Tasks 17/02/2019.
Unit 4 IT Security Kerris Davies.
Client/Server and Peer to Peer
System Fundamentals IB - Group 4 - Computer Science
Presentation transcript:

System Backup IB Computer Science

HL Topics 1-7, D1-4 1: System design 2: Computer Organisation 3: Networks 4: Computational thinking 5: Abstract data structures 6: Resource management 7: Control D: OOP

5: Abstract data structures HL & SL 1.1 Overview 1: System design 2: Computer Organisation Planning and system installation 1.1.1 Identify the context for which a new system is planned. 1.1.2 Describe the need for change management 1.1.3 Outline compatibility issues resulting from situations including legacy systems or business mergers. 1.1.4 Compare the implementation of systems using a client’s hardware with hosting systems remotely 1.1.5 Evaluate alternative installation processes 1.1.6 Discuss problems that may arise as a part of data migration 1.1.7 Suggest various types of testing User focus 1.1.8 Describe the importance of user documentation 1.1.9 Evaluate different methods of providing user documentation 1.1.10 Evaluate different methods of delivering user training System backup 1.1.11 Identify a range of causes of data loss 1.1.12 Outline the consequences of data loss in a specified situation 1.1.13 Describe a range of methods that can be used to prevent data loss Software deployment 1.1.14 Describe strategies for managing releases and updates 3: Networks 4: Computational thinking 5: Abstract data structures 6: Resource management 7: Control D: OOP

Describe a range of methods that can be used to prevent data loss Topic 1.1.13 Describe a range of methods that can be used to prevent data loss Content developed by Dartford Grammar School Computer Science Department

Back it up!! Regular back ups: By copying all sensitive information on to a different medium than the one used in the system, like a second hard disk or CDs, chance or information loss can be reduced significantly. By storing these media physically separated from the system, data loss due to malicious activities can be prevented as well. In the case of very sensitive information of large companies like Google, information is often duplicated on servers separated by large distances and in different climates to reduce the chance of data loss due to environmental causes such as tornado or earthquake.

Hard copies Making hard copies: In some cases, information can also be printed out to be archived, like books, texts, important contracts or scientific papers. However creating hard copies can be expensive and take up a large amount space. Hard copies are also liable to data loss, as in the case of print outs getting burned in a fire.

Backups? Who does backups?

Methods to prevent data loss Fail over systems Redundancy Removable media Offsite/online storage Physical security

Failover / Redundancy Content developed by Dartford Grammar School Computer Science Department

Physical security