KEEP IT SAFE - BACK UP! Research Data Management.

Slides:



Advertisements
Similar presentations
Pennsylvania BANNER Users Group 2007 Disaster Recover For The Financial Aid Environment.
Advertisements

COMPUTERS: TOOLS FOR AN INFORMATION AGE Chapter 3 Operating Systems.
Information Management and Technology
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Storage Devices Primary storage: is the storage provided
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Data Storage & Security Dr Alastair F. Brown Head of Computing MRC Human Genetics Unit MRC Institute of Genetics and Molecular Medicine The University.
GRAD 521, Research Data Management Winter 2014 – Lecture 7 Amanda L. Whitmire, Asst. Professor.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Everything your business needs to know but probably doesn’t.
Backups Rob Limbaugh March 2, Agenda  Explain of a Backup and purpose  Habits  Discuss Types  Risk/Scope  Disasters and Recovery.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Introduction to Computers Essential Understanding of Computers and Computer Operations.
Dr Joanna Goodger Information Hertfordshire With Bill Worthington and Mohamed Hansraj Research Data Management For Researchers.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Backups and Disaster Recovery " Two out of every five enterprises that experience a disaster go out of business within five years." (Gartner, Disaster.
New Data Regulation Law 201 CMR TJX Video.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Module 13: Configuring Availability of Network Resources and Content.
Introduction to Windows 7. Desktop Maximize, Minimizing, and Restoring.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Backup for Mac OS X Richard Corzo March 2, Time Machine Built in to Leopard (10.5) and Snow Leopard (10.6) Requires external drive or Apple’s Time.
Chapter Fourteen Windows XP Professional Fault Tolerance.
BACKUP AND ARCHIVING DATA BACKUP AND RECOVERY OF DATA.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
Task 18 Describe the need to create backup copies, and to file them in a separate and safe location also filing and storing hard copies for use in production.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
2015 Risky Business Week Welcome to the 2015 Risky Business Week presentation regarding disaster recovery Risky Business Week.
SECURITY Research Data Management. Research Data Management Security Laptops go missing very regularly; Intel’s study in 2012 surveying 329 private and.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Mobile Device Management Central Management of Wintel Laptop Software and Hardware in a Secure Environment.
Hosted File Backup Ensure that your data is kept safe with our cloud based data back-up service.
Important points and activities.  The objective is to secure life, property, information in the event of a disaster and to facilitate business continuity.
PPD Computing “Business Continuity” David Kelsey 3 May 2012.
Task 16 Describe the need for document control (such as ensuring that completed models are approved, labelled and stored on a suitable storage medium).
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Configuring Data Protection Chapter 12 powered by dj.
Storing data on your computer & network. Storage devices Hardware Hard drive Flash drive Tape File server (HD) SAN NAS Software System software Windows.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
McLean HIGHER COMPUTER NETWORKING Lesson 15 (a) Disaster Avoidance Description of disaster avoidance: use of anti-virus software use of fault tolerance.
CIT 470: Advanced Network and System AdministrationSlide #1 CIT 470: Advanced Network and System Administration Disaster Recovery.
Cosc 4750 Backups Why Backup? In case of failure In case of loss of files –User and system files Because you will regret it, if you don’t. –DUMB = Disasters.
1 Backups Part of a Systems Administrators job is maintaining the integrity of the system. This does not mean that she is expected to prevent anything.
M EANING A backup or the process of backing up is making copies of data which may be used to restore the original after a data loss event. Chutipon Hirankanokkul.
CS101 Storage Information Storage The zeros and ones in the input devices, output devices and process devices are in _______ form and are lost when the.
Understanding Backup and Recovery Methods Lesson 8.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Chapter 6 Protecting Your Files. Protecting Your Files FAQs: – What should I know about losing data? – How can I protect my files from viruses? – How.
Security Operations Chapter 11 Part 2 Pages 1262 to 1279.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Enw / Name. What is a on-line / paper based data capture form Can you give an example where each are used? Automated data capture systems are used around.
Computer Security Sample security policy Dr Alexei Vernitski.
Dr Joanna Goodger Information Hertfordshire With Bill Worthington, Sara Hajnassiri, and Mohamed Hansraj Research Data Management For Researchers.
Dr Joanna Goodger Information Hertfordshire With Bill Worthington, Sara Hajnassiri, and Mohamed Hansraj Research Data Management For Researchers.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Backup and Disaster Dr Stuart Petch CeG IT/IS Manager
IFolder. What is it? System for MIRRORING local hard disc data to a network drive It is NOT A BACKUP solution! Disaster resilience (hard disc crash, fire,
Backup Strategies A Discussion November 19, 2015 Tom Davis.
Chapter 6 Protecting Your Files
Cloud Storage Service with Proven Military Grade Security
Back Up and Recovery Sue Kayton October 2015.
Administering Your Network
Part 3.
Microsoft Office Illustrated Fundamentals
Presentation transcript:

KEEP IT SAFE - BACK UP! Research Data Management

Research Data Management Back Up Backing up should be an automatic part of your everyday research activities. In 2005, an electrical fault in the electronics and laser research building at the University of Southampton cost £50-100M including temporary building hire and transfer of work to Holland. Image if a fire or similar disaster happened at UH How much would it cost you‽ Storing your data on the UH network means that it is stored at de Havilland and at college lane. Mountbatten Building, So’ton Uni. Safeguarding data with Research Data Management

Research Data Management Back Up Theft and Loss are real risks: Next time you travel, make sure that your device is labelled and locked your data is backed up. In 2012, a Dell survey demonstrated that laptops per week are left at US airport security points. They cannot be turned on or analysed so unless your name is on the outside of your mobile device, it will not be returned to you. You have 30 days before auctioning them as government property. Intel conducted a study surveying 329 private and public organizations published in 2010, 7.1% of employee laptops were lost or stolen before the end of their usefulness lifespan. Safeguarding data with Research Data Management

UH PC laptop local drive Networked drives U: and X: Networked drives U: and X: UH server Cluster External HD DVD, Tape Research Data Management Back Up There are UH facilities, but these should be considered secondary back ups. You should have your own back up. Safeguarding data with Research Data Management

Set an autom ated backu p throug h contro l panel Windows Backup and restore Back up your entire content to another disk or to the net. Mac Time machine Research Data Management Back Up Safeguarding data with Research Data Management

Updates the changes to files between two directories and servers rsync Timed schedule to perform tasks – your rsync for example crontab /usr/bin/rsync -avu /data/jgoodger/ /local/data/ /usr/bin/rsync -avu /home/jgoodger/ /local/data/home/ SHELL=/bin/tcsh PATH=/sbin:/bin:/usr/sbin:/usr/bin 17 3 * * * /usr/bin/rsync -avu /data/jgoodger/ /local/data/ Research Data Management Back Up Safeguarding data with Research Data Management