Skip to main content

 

Data security week 7 blog

 

Why is Backups important

 

The purpose of the backup is to create a copy of data that can be recovered in the event of a system failure. System failures can be the result of hardware or software failure, data corruption, a malicious attack (virus or malware), or accidental deletion of data. Backup copies allow data to be restored  would provide the means of restoring to a previous point after the incident has been dealt with.

Backups is a vital method of storing data and keeping it safe, when you take your time and set up a good backup strategy you can ensure that data can easily be recovered. Storing copies of data on a separate device for example USB stick, an external hard drive, A disk ah storage system, cloud storage or tape drive  can protect you against data loss or corruption. most of these devices need to be at the location of your PC or laptop When trying to restore but you can store the devices in a safe place until you need it of your choosing. With a cloud storage you can use it anywhere as long as you got Internet because your data is stored in the cloud.

 

Strategies

 

now we went over why it is important to back up your data and the functions no we're going to talk about strategy. It is a good idea to get into a routine on backing up your data either weekly or monthly basis.

There are many ways that you can make you are back up routine. But there is four main ways that backup scan be divided into:

1.      Full backup - A full backup is exactly that – a backup of every single file and folder stored on the system. No matter what kind of tech trouble you run into, you’ll have access to the lost data. The drawback? Full backups take longer and require more space.

2.      Incremental backup - Incremental backups work like this: an initial full backup is made. Then, subsequent backups only store the changes made since the previous backup. With this strategy, restoring data is a little slower, but the backup process itself is much quicker and requires less space than a full backup.

3.      Differential backup - Differential backup is very similar to incremental backup. First, an initial full backup is made. Subsequent backups only store the changes made. Differential backups require a little more storage space than incremental backups, but they do offer faster data recovery.

4.      Mirror backup - Mirror backup systems take an exact copy of the data. The key benefit of mirror backups is that they don’t store old, outdated files – when a file is deleted from the source, they disappear from the backup, too. This means mirror backups don’t demand as much storage space as full backup systems

The 3 -2-1 rule is a strategy that is States that three copies of data should be made so for example one original copy and two backups the two separate storage devices should be used and the one copy should be kept a different location.

 

Cloud backup is a service in which the data and applications on a business's servers are backed up and stored on a remote server. Businesses opt to back up to the cloud to keep files and data readily available in the event of a system failure, outage, or natural disaster. The importance of testing backups lets you verify the necessary data is available for recovery. Plus, testing helps you learn how to actually implement recovery following a data loss. If a backup test fails, you can take the steps needed to ensure you don't actually lose valuable information.

 

Data recovery

 

Data Recovery is the process of retrieving data from damaged, failed, or corrupted storage. media. Data is being retrieved from different storage devices such as hard disk drives, storage tapes, CDs, DVDs, RAID, and many other electronic storage devices. So, when you delete something whether it is on purpose or by accident the data is not actually deleted it works like it will remove the data and free up space for more data to be stored on that device so it's like essentially pretended to be deleted so the device thinks that you've got more space to put more storage onto it.

The first thing I would do when trying to recover data is check my recycling bin sometimes you accidentally delete file and it's just hidden in your recycling bin. If the file that you were looking for was not there I would Perform a backup from my last initial backup. This should recover the deleted file.

Disk Drill is A programme available for Microsoft Windows and Mac iOS, disk drill is a software programme that recovers data. It performs a sophisticated scan to identify and rebuild hundreds of different file types as works document, photos, videos and Music.

Comments

Popular posts from this blog

 Data security week 5 blog   Intrusion Detection Systems What is Intrusion Detection Systems? Intrusion Detection Systems or in short form IDS. Am going to refer to Intrusion Detection Systems as IDS. IDS is a network security tool that is used to for detecting vulnerability exploits against a target application or computer. Intrusion Prevention Systems (IPS) extended IDS solutions by adding the ability to block threats in addition to detecting them and has become the dominant deployment option for IDS/IPS technologies. IDS monitors network traffic for unusual or suspicious activity and sends an alert to the administrator user. Detection of anomalous activity and reporting it to the network administrator is one of the main functions however, some IDS software can take action based on rules when malicious activity is detected, like blocking certain untrustworthy incoming traffic. IDS can be host based or network-based systems.   How can IDS protect your ne...
  Password policies and importance of data Encryption. what is a password? A password is a secret word or phrase that must be used to gain admission to a place. A Password is a word, phrase, or string of characters intended to differentiate an authorized user or process for the purpose of permitting access, from an unauthorized user or put another way a password is used to prove one's identity or authorize access to a resource.   Passwords and passcodes are the most common way of authenticating users. Examples of their use includes the PIN (Personal Identifier Number) you use with your credit and debit card as well as the many passwords you are expected to remember when logging in to computer-based services. An ideal password must satisfy two conflicting aims. It should be: ·         memorable enough that the user can recall it without writing it down ·         long enough and unique ...

Jesse Lingard home workouts!!!

Manchester United star Jesse Lingard is posting on his social media free work out you can do at home. Manchester United midfielder Jesse Lingard’s 40-minute workout consists of three rounds of four sets of exercises, including cardio, core and overall strength, with a bonus round if you can hack it! His work as follows --  First set no breaks in between  High knees --30 Seconds Bur-pees --30 seconds Mountain climb -- 30 seconds Alternate lunges -- 30 seconds  1 minute rest Second set no breaks in between Sit ups -- x10 Elbows to knees -- x10 Touch heels -- x10 Scissors -- x10 Touch toes -- x10  1 minute rest Third sets no breaks in between   Press up -- 8 to 1 Press up to plank -- x10 Plank left / right -- 30 seconds  1 minute rest Forth sets no breaks in between  Wall sit / squat -- 30 seconds  Revers Lungs -- x10 Jump squats -- x10  Walk on...