Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.

Slides:



Advertisements
Similar presentations
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Advertisements

Information Technology Disaster Recovery Awareness Program.
Backing up and Archiving Data Chapter 1. Introduction This presentation covers the following: – What is backing up – What is archiving – Why are both.
Case Study: Business Continuity Planning for Site- Level Disaster Kimberley A. Pyles Northrop Grumman Corporation
Backing Up Your Computer Hard Drive Lou Koch June 27, 2006.
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Backup and Disaster Recovery (BDR) A LOGICAL Alternative to costly Hosted BDR ELLEGENT SYSTEMS, Inc.
Backup Strategy. An Exam question will ask you to describe a backup strategy. Be able to explain: Safe, secure place in different location. Why? – For.
Everything your business needs to know but probably doesn’t.
Backups Rob Limbaugh March 2, Agenda  Explain of a Backup and purpose  Habits  Discuss Types  Risk/Scope  Disasters and Recovery.
Understand Database Backups and Restore Database Administration Fundamentals LESSON 5.2.
Disaster Protection and Recovery By: Michael Morrell Ross Ashenfelter Teresa Furnish Karla Maddox.
Lesson 11 – NETWORK DISASTER RECOVERY Disaster recovery plans Network backup and restoration OVERVIEW.
Preservasi Informasi Digital.  It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and.
COMPUTER BACKUP A disaster will happen to you one day…an accidentally deleted file, a new program that caused problems or a virus that wreaked havoc, wiping.
1 AQA ICT AS Level © Nelson Thornes Backup and its importance.
Back Up and Recovery Sue Kayton February 2013.
1 Disaster Recovery Planning & Cross-Border Backup of Data among AMEDA Members Vipin Mahabirsingh Managing Director, CDS Mauritius For Workgroup on Cross-Border.
Fe Angela M. Verzosa1 Vital Records Management. 2 Vital Records Management The objective is to prevent the loss of information which is critical to the.
>> Press Enter to go to the Next Slide Backup Express Speed Backup Express Speed "Backup Express" will backup all your important files.
November 2009 Network Disaster Recovery October 2014.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Data Security GCSE ICT.
Video Following is a video of what can happen if you don’t update your security settings! security.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
IS 380.  Provides detailed procedures to keep the business running and minimize loss of life and money  Identifies emergency response procedures  Identifies.
Dr.Backup Online Backup Service (888) (toll free)
Chapter Fourteen Windows XP Professional Fault Tolerance.
Disaster Recovery Advice 6 th November Data What do you need to backup? System States All or Critical Data.
Module 7. Data Backups  Definitions: Protection vs. Backups vs. Archiving  Why plan for and execute data backups?  Considerations  Issues/Concerns.
Ways to organize electronic files Witness fitness By: Simran and Navneet.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
McLean HIGHER COMPUTER NETWORKING Lesson 15 (a) Disaster Avoidance Description of disaster avoidance: use of anti-virus software use of fault tolerance.
CIT 470: Advanced Network and System AdministrationSlide #1 CIT 470: Advanced Network and System Administration Disaster Recovery.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Cosc 4750 Backups Why Backup? In case of failure In case of loss of files –User and system files Because you will regret it, if you don’t. –DUMB = Disasters.
Security and Backup. Introduction A back-up strategy must cover all eventualities: Accidental damage Equipment failure Deliberate damage It must consider:
The Ultimate Backup Solution.
20/12/20151 Data Structures Backing up and Archiving Data.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Protecting Your Data With Just Get Backup, LLC. Agenda How important is your data – Acknowledging worst-case scenarios. Understanding that data backup.
The aim of producing a backup strategy is to make sure that a computer system can be returned to its original state if data has been lost or corrupted.
Society & Computers PowerPoint
Managing Data & Information Procedures & Techniques.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
1 AQA ICT AS Level © Nelson Thornes How annoying is it when you lose files on your home computer?? For an organisation it’s a REAL DISASTER!!
Backup and Disaster Dr Stuart Petch CeG IT/IS Manager
Dial-In Number: 1 (631) Webinar ID: FHC Tech Talk Automation and Efficiency Series Talk #1 Carbonite automated backup.
Networking Objectives Understand what the following policies will contain – Disaster recovery – Backup – Archiving – Acceptable use – failover.
Chapter 6 Protecting Your Files
Database recovery contd…
The importance of computer backups
Lesson Objectives Aims You should be able to:
A PC is like a large cabinet… containing your
Backup your Data © EIT, Author Gay Robertson, 2017.
Back Up and Recovery Sue Kayton October 2015.
Backing Up 01/12/2018.
Have you seen this screen?
Using the Cloud for Backup, Archiving & Disaster Recovery
Presentation transcript:

Preventing Common Causes of loss

Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when you meant to save it as something else. Prevention: – Anything you don’t want to lose should be backed up onto some external medium – insurance policies don’t cover this type of loss. – have all users’ directories reside on the network so that data is backed up automatically

Limitation: – The only limitation here is the amount of memory storage capacity allocated to each person or account.

Viruses and Worms How they invade our computer?

virus invades your program, causing your computer to send out messages with the same attachment to everyone in your address book attach to program files, causing the programs to perform improperly. others infect DOS files, corrupting the operating system and requiring many hours of work to reformat the hard drive.

Prevention:

Other computer viruses are called worms Removing the worm includes reformatting the hard drive and restoring all the programs and files. If you haven’t backed up your files and programs, you will have to re-create them, a most time-consuming chore.

Power and Telecommunications Outages Power Outages Prevention: A problem with auto-backup

TELECOMMUNICATIONS OUTAGES Prevention:

If there is a sustained loss of telecommunications or power, your institution should declare a “disaster” with your data storage/backup service provider and activate your disaster response plan for computer services.

Regular Backup Procedures The whole idea behind data and program backup is to prevent loss of data from the computer system when the server or network crashes. The reconstruction of data is time-consuming and extremely expensive

Method of Backup – Incremental backup Data Mirroring – Replication: 1.Back up or replicate on a second drive in the same cabinet 2.Replication would be to have another drive or server in a different machine or power grid. 3.highest level of replication is across geographical areas

issues to consider: 1.the time it takes to recover the data and how much data loss you can live with 2.The time it takes to get the operations back up and running.

What type of backup method do you choose for your institution, building, network, or office? depends upon the resources (people, equipment, and money) your organization has, and how critical the data and the computer operations are to the survival of our institution

Backup Media There are several choices depending upon the amount of data you have, the frequency of backup, and how critical the data is to the survival of your institution What backup media are often use?

Remember: You should have copies or originals of these stored somewhere safe and off-site.

Keeping Up with the Changes Software “What happens if you lose your data in a major server or network crash and it turns out that there isn’t a current backup for the software. In fact, the software that you were using was the newest version of some program, and the computer center can’t find that version and must use the previous one. Do you realize that you cannot open current data files with older software versions?”

it is important to keep up with software changes It isn’t essential to purchase every upgrade, but pay attention to the industry

Operating Systems What operating system are you using today? Your computer services department staff needs to document the changes in operating systems, as does your records manager.

Hardware The protection of hardware should include preventing obsolescence. When you deaccession the hardware, make certain the hard drives are clean data by reformatting the disk, not just deleting the data.

What if your computer system is running old computer software on old computer equipment and you can’t afford to upgrade?

Protecting Your Assets On-Site Storage Fireproof cabinets are designed for paper documents, and in some cases microfilm and microfiche. Fireproof cabinets are usually rated at 1,500–2,000º F. Magnetic media will begin to melt at 125ºF The same goes for safes; they won’t keep the magnetic media from melting.

Access to Backup Data Where do you store the backups? How much of the system is on the backup tapes? And how often is it backed up? Do you store the tapes on top of the computer, in a “fireproof” cabinet in the room (both bad ideas), at home, in a physical data storage vault, in the car, with a vendor, at the bank? At what point do you send the backups from on-site or local storage to remote storage? Who can get access to the backups? Can you load the backups in a remote location or access the data from an alternative computing center?

Off-Site Storage Data should be transferred off-site on a very regular basis. Often organizations will keep the most recent backup in their office or a nearby building, and then ship the backup tapes to the remote storage facility once a week.

Options for transferring the data off-site: – physically take it or have it delivered to your storage facility – send the data to a remote data storage facility via the Web, phone lines, or FTP depending upon how much data you have and where the facility is located. – Remote backup businesses can also describe their service as data vaulting

Data Storage Service Providers (Appendix B, Protecting Your Library’s Digital Sources)

Hot, Cold, and Mobile Recovery Sites “Hot sites” are facilities that are completely wired together with the hardware that your organization needs to get its information services up and running quickly. Organizations contract with these facilities to provide technical support should a disaster be declared

“Cold sites” are wired computer rooms without the hardware. These facilities are usually rented when the computer staff needs a long-term facility from which to operate. Mobile recovery. These facilities are movable trailers that are wired for telecommunications or have satellite communications for the user