The aim of producing a backup strategy is to make sure that a computer system can be returned to its original state if data has been lost or corrupted.

Slides:



Advertisements
Similar presentations
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Advertisements

Information Technology Disaster Recovery Awareness Program.
Backing up and Archiving Data Chapter 1. Introduction This presentation covers the following: – What is backing up – What is archiving – Why are both.
Overview of Transaction Processing and Enterprise Resource Planning Systems Chapter 2.
Backup Strategy. An Exam question will ask you to describe a backup strategy. Be able to explain: Safe, secure place in different location. Why? – For.
Everything your business needs to know but probably doesn’t.
Chapter 14 System Controls. A Quote “The factory of the future will have only two employees, a man and a dog. The man will be there to feed the dog. The.
Session - 15 RECOVERY CONTROL - 1 Matakuliah: M0184 / Pengolahan Data Distribusi Tahun: 2005 Versi:
Processing Integrity and Availability Controls
Factors to be taken into account when designing ICT Security Policies
Preservasi Informasi Digital.  It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and.
Overview of Transaction Processing and Enterprise Resource Planning Systems Chapter 2.
Chapter Lead Black Slide © 2001 Business & Information Systems 2/e.
Procedures for Backup and Recovery Section 14. Key points and questions What data should be backed up and how often? What do we mean by full backup, incremental.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Processing Integrity and Availability Controls
TRANSACTION PROCESSING SYSTEM (TPS)
Backup Strategy. Backup strategy Backup copy is a second copy saved to another location, usually on a backup device e.g. USB stick.Backup copy is a second.
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
Disaster Planning and Security Policies. Threats to data DeliberateTerrorism Criminal vandalism/sabotage White collar crime Accidental Floods and fire,
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Module Designing Computer-based Information Systems
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 10 Business Operations.
Disaster Recovery Strategies & criteria for evaluation of information management strategies.
Chapter 11: Designing a Data Recovery Solution for a Database MCITP Administrator: Microsoft SQL Server 2005 Database Server Infrastructure Design Study.
Chapter 13 Sequential File Processing. Master Files Set of files used to store companies data in areas like payroll, inventory Usually processed by batch.
Module 7. Data Backups  Definitions: Protection vs. Backups vs. Archiving  Why plan for and execute data backups?  Considerations  Issues/Concerns.
Question 23 As an accountant of an organization, discuss why it might be necessary to initiate systems analysis. {6 marks} Giving reasons for your answer,
Standard Grade Computing OPERATING SYSTEMS CHAPTER 20.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
© 2001 by Prentice Hall11-1 Local Area Networks, 3rd Edition David A. Stamper Part 4: Installation and Management Chapter 11 LAN Administration: Backup.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
PAYROLL PROCESSING. PAYROLL In a company, payroll is the sum of all financial records of salaries, wages, bonuses, and deductions.
1 California State University, Fullerton Chapter 10 Business Operations.
Modes of Processing. Transactions  Transactions are events which need to be recorded with the production, sale and distribution of goods and services.
 2001 Prentice Hall Business Publishing, Accounting Information Systems, 8/E, Bodnar/Hopwood Chapter 10 Electronic Data Processing Systems.
13-1 COBOL for the 21 st Century Nancy Stern Hofstra University Robert A. Stern Nassau Community College James P. Ley University of Wisconsin-Stout (Emeritus)
Sequential Files Chapter 13. Master Files Set of files used to store companies data in areas like payroll, inventory Set of files used to store companies.
Test and Review chapter State the differences between archive and back-up data. Answer: Archive data is a copy of data which is no longer in regular.
BACKUP & RECOVERY Option 1: Transaction Processing Systems.
SUPPLEMENTAL B An Overview of The General Ledger Architecture.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Verification & Validation F451 AS Computing. Why check data? It’s useless if inaccurate. Also, wrong data: Can be annoying Can cost a fortune Can be dangerous.
An Overview of The General Ledger Architecture.  Files are used to store data and processing instruction. The two types of files computer users use most.
Security and Backup. Introduction A back-up strategy must cover all eventualities: Accidental damage Equipment failure Deliberate damage It must consider:
1 Chapter Overview Understanding Data Restoration Issues Understanding the Types of Database Backups Understanding the Restoration Process.
Types of Processing of Data www. ICT-Teacher.com.
Data Processing LO: Understanding the need for data processing and the methods used. Learning Outcome: Explain the following terms- Transaction file,
13-1 Sequential File Processing Chapter Chapter Contents Overview of Sequential File Processing Sequential File Updating - Creating a New Master.
20/12/20151 Data Structures Backing up and Archiving Data.
13- 1 Chapter 13.  Overview of Sequential File Processing  Sequential File Updating - Creating a New Master File  Validity Checking in Update Procedures.
Managing Data & Information Procedures & Techniques.
Verification & Validation
The Causeway Company uses the following procedures to process the cash received from credit sales. The mailroom receives checks and remittance advices.
The concept of Data Processing. INPUT DESIGN Input Data Persistent Data Process Output.
1 AQA ICT AS Level © Nelson Thornes How annoying is it when you lose files on your home computer?? For an organisation it’s a REAL DISASTER!!
( ) 1 Chapter # 8 How Data is stored DATABASE.
AS computing Data Entry. Structured data This kind of data has a structure. Word processed documents are usually structured. They have paragraphs, indentation.
Overview of Transaction Processing and Enterprise Resource Planning Systems Chapter 2.
TRANSACTION PROCESSING SYSTEM (TPS)
Transaction processing systems
AS ICT Module 2 Objectives: Security of Data
Ways in which ICT is used
Processing Integrity and Availability Controls
Overview of Transaction Processing and Enterprise Resource Planning Systems Chapter 2.
Backup and restoration of data, redundancy
Computer communications
CHAPTER 6 ELECTRONIC DATA PROCESSING SYSTEMS
2.8 – Payroll applications
Presentation transcript:

The aim of producing a backup strategy is to make sure that a computer system can be returned to its original state if data has been lost or corrupted.

A backup strategy is put in place to avoid permanent data loss and to ensure the integrity of stored data i.e can get back to a previous version and build up the data correctly if current data found to be in error.

Factors that should be considered in a backup strategy: Selection of storage medium depends on volume of data Frequency of backup depends on how often the data is updated No. of backup copies kept depends how often data is updated What will be copied; full (all data) or differential (just changes) Recovery procedures; how quickly correct data is needed Location of backup – how secure is this data?

A backup strategy needs a well documented and tested recovery procedure to ensure backup data is restored properly Factors that should be considered in a recovery procedure: A well documented procedure that allocates roles and responsibilities to staff. Availability of alternative hardware and accommodation if the originals have been destroyed. Availability of original software such as the customised operating system and application programs! That up-to-date backup data is readily available

Batch processing systems: Defn: A large number of similar paper documents are typed up onto a transaction tape. The transaction tape updates the master file at a regular set time. Eg Payroll: timesheets are typed into a transaction file and update the employee master file each Friday night and produce wage cheques and payslips. Timesheet Transact G34 Grand Father Employee master PayrollWeek 34 Father Employee master G35 Timesheet Transact G35 PayrollWeek 35 Son Employee master G36 How would the Son file be regenerated?

Online backup of small/medium interactive transaction systems: Transactions are typed in and processed immediately before the next transaction is entered. Eg Paying a gas bill a business can’t afford to lose even a small amount of data but can lose some operational time while data is restored from backup. There is no prepared transaction tape so the system creates a record on an online transaction log as each transaction is typed in. The master file is backed up every night. Daily Transactio n Log Father / Son Customer Account master Interactive transaction processing If the system crashes the son master file is restored from last nights father backup after adding the days transaction log to it.