Skip to main content

 

Data security week 7 blog

 

Why is Backups important

 

The purpose of the backup is to create a copy of data that can be recovered in the event of a system failure. System failures can be the result of hardware or software failure, data corruption, a malicious attack (virus or malware), or accidental deletion of data. Backup copies allow data to be restored  would provide the means of restoring to a previous point after the incident has been dealt with.

Backups is a vital method of storing data and keeping it safe, when you take your time and set up a good backup strategy you can ensure that data can easily be recovered. Storing copies of data on a separate device for example USB stick, an external hard drive, A disk ah storage system, cloud storage or tape drive  can protect you against data loss or corruption. most of these devices need to be at the location of your PC or laptop When trying to restore but you can store the devices in a safe place until you need it of your choosing. With a cloud storage you can use it anywhere as long as you got Internet because your data is stored in the cloud.

 

Strategies

 

now we went over why it is important to back up your data and the functions no we're going to talk about strategy. It is a good idea to get into a routine on backing up your data either weekly or monthly basis.

There are many ways that you can make you are back up routine. But there is four main ways that backup scan be divided into:

1.      Full backup - A full backup is exactly that – a backup of every single file and folder stored on the system. No matter what kind of tech trouble you run into, you’ll have access to the lost data. The drawback? Full backups take longer and require more space.

2.      Incremental backup - Incremental backups work like this: an initial full backup is made. Then, subsequent backups only store the changes made since the previous backup. With this strategy, restoring data is a little slower, but the backup process itself is much quicker and requires less space than a full backup.

3.      Differential backup - Differential backup is very similar to incremental backup. First, an initial full backup is made. Subsequent backups only store the changes made. Differential backups require a little more storage space than incremental backups, but they do offer faster data recovery.

4.      Mirror backup - Mirror backup systems take an exact copy of the data. The key benefit of mirror backups is that they don’t store old, outdated files – when a file is deleted from the source, they disappear from the backup, too. This means mirror backups don’t demand as much storage space as full backup systems

The 3 -2-1 rule is a strategy that is States that three copies of data should be made so for example one original copy and two backups the two separate storage devices should be used and the one copy should be kept a different location.

 

Cloud backup is a service in which the data and applications on a business's servers are backed up and stored on a remote server. Businesses opt to back up to the cloud to keep files and data readily available in the event of a system failure, outage, or natural disaster. The importance of testing backups lets you verify the necessary data is available for recovery. Plus, testing helps you learn how to actually implement recovery following a data loss. If a backup test fails, you can take the steps needed to ensure you don't actually lose valuable information.

 

Data recovery

 

Data Recovery is the process of retrieving data from damaged, failed, or corrupted storage. media. Data is being retrieved from different storage devices such as hard disk drives, storage tapes, CDs, DVDs, RAID, and many other electronic storage devices. So, when you delete something whether it is on purpose or by accident the data is not actually deleted it works like it will remove the data and free up space for more data to be stored on that device so it's like essentially pretended to be deleted so the device thinks that you've got more space to put more storage onto it.

The first thing I would do when trying to recover data is check my recycling bin sometimes you accidentally delete file and it's just hidden in your recycling bin. If the file that you were looking for was not there I would Perform a backup from my last initial backup. This should recover the deleted file.

Disk Drill is A programme available for Microsoft Windows and Mac iOS, disk drill is a software programme that recovers data. It performs a sophisticated scan to identify and rebuild hundreds of different file types as works document, photos, videos and Music.

Comments

Popular posts from this blog

VADDAL RILEY HOME WORKOUT IN LOCKDOWN!!!

Viddal Riley is a up and coming boxer, he has had 4 professional fight and has won all 4 fights, he also fought in the under card of  Manny Pacquiao in Las Vagas on the 28/02/2020 leading the only KO of that night. Viddal also has a Youtube  channel where he posts quite frequently. He post about Boxing, Coaching, Music and challenges if you want to check it out here it is  https://www.youtube.com/channel/UC9BaJIXnYSyYalbCVfZTZ4A . He has put out a video on a home work out that you can do in the lock down here it is -- Warm up -- 5 mins Skipping at your own level Double jump skipping High knees skipping Ground work -- Sit ups -- x12 Dorsal Raise -- x12 Pike Sit Ups -- x12 Bur-pee Stand Ups -- x12 Thumb Touching Push Ups -- x12 Pike Sit Ups Alternative Legs -- x12  Squat Thrust -- x12 Abdominal Hold -- 25 secs Bur-pee Jumps -- x12 Finger Tip Push Ups -- x12 Elbow To Knee Sit Ups -- x12  Rest Warn Down Done! Here is the link if you need a demonstration :--   h
  Data security week 6 blog Configuration of firewall and I had to keep your device safe using firewall There are many firewalls out there some that may cost money and some that are free today we're going to focus on zone alarm firewall. In this example I'll be using the free trial package for zone alarm usually zone alarm does have   annual costs fee for £54.95. Zone Alarm protect home users and small businesses from emerging cyber threats with the same next-generation technology trusted by the world’s largest companies, tailored to your needs. The ZoneAlarm Firewall protects your computer from most of those threats. It defines three security zones Trusted, Public, and Blocked. By default, the Public Zone works in High security mode, and the Trusted Zone works in Medium security mode: High security mode for Public Zone lets you connect to network resources but prevents other unauthorized network users and computers from accessing the resources on your computer and co