SlideShare a Scribd company logo
Backups of security devices, Performance
Analysis
Backup
Why Backup?
“If you are not backing up your files
regularly, you deserve to lose them.”
Average user experiences loss once a year
Backup
What Can Cause Data Loss?
• Incorrect software use
• Input data incorrectly
• Software may harm data
• Hard disk malfunctions
• Accidentally delete files
• Virus infection
Backup
Methods
Full backup
Differential backup
Incremental backup
Media
Diskette
Tape
Zip disk
CD-R / CR-RW
DVD-RAM
Mirrored hard drive
Full Backup
• Complete type of backup operation
• make a copy of all the data including files, folders,
settings, applications
• On - storage devices like hard drive, SSD, HDD, etc.
• files and folders will be backed up again entirely in any
subsequent backup operations – redundant copies of data
• Needs much disk space
Incremental Backup
• backing up all the files that have changed since the last
backup operation
Differential Backup
• backing up the only changed files since the last full
backup
Mirror Backup
• mirror of source is being supported up
• when record is erased from source, that document -
erased in Mirror Backup too
Full PC Backup
• whole picture of PC’s hard drive
Local Backup
• backup where capacity medium is kept close within reach
or in structure with source
• second inward hard drive, connected outer hard drive,
CD/DVD-More, Network Attached storage (NAS)
Offsite Backup
• Backup - set in an alternate topographical area from
source
• Cloud Backup
• FTP Backup
Hardware and Software
• Desktops and laptops – Computer equipment can be damaged, lost, stolen.
• Removable media – Media degrades over time. Software programs to read
the media change and can become obsolete. Hardware changes over time,
and is not always backward compatible.
• Cloud storage
– Cloud providers go out of business
– Data formats change (what you upload may not be useable
when you download it)
– Accidents happen. Data is corrupted, or stolen.
File Formats
• Think about the ability to use and re-use data in the future. Both for you,
and for others.
• Accessibility of future data because of technology changes - proactively
plan for hardware and software obsolescence.
• Think about who needs access to your data. Are you collaborating with
someone within the University, or outside of it?
• Conducting funded research - be aware of any data storage and data
sharing requirements.
• Think about data security.
Best Practices for File Formats
Formats most likely to be accessible in the future are:
• non-proprietary
• open
• documented standard commonly used by a discipline-specific
research community
• standard representation (ASCII, Unicode)
• unencrypted and uncompressed
Remember that comprehensive documentation (metadata) is
essential to accurate use, and reuse, of all data.
Data Security and Access Control
• Network security
– Keep confidential or highly sensitive data off
computers or servers connected to the internet
• Physical security
– Access to buildings and rooms
• Computer systems & files
– Use strong passwords on files and systems
– Virus protection (updated continuously and running!)
– Encryption
Data Backups
• Reduces the risk of damage or loss
• Use multiple locations (here-near-far or 3-2-1)
-Keep at least 3 copies of data
- Store 2 backup copies on different storage media.
- Store 1 backup copy offsite.
• Create a backup schedule and put someone dependable in
charge
• Use reliable backup medium
• Test your backup system (test file recovery, data consistency, data
accuracy)

More Related Content

PPTX
2.6 backup and recovery
PPTX
Data Management 101
PDF
Data Storage & Preservation
PPTX
Back up-and-storage v1
PPTX
Research Data Management Fundamentals for MSU Engineering Students
PDF
Andrew Waugh presentation
PPT
Data security
PPT
University of Bath Research Data Management training for researchers
2.6 backup and recovery
Data Management 101
Data Storage & Preservation
Back up-and-storage v1
Research Data Management Fundamentals for MSU Engineering Students
Andrew Waugh presentation
Data security
University of Bath Research Data Management training for researchers

Similar to 7-Backups of security Devices-03-06-2023.ppt (20)

PPT
3e - Security Of Data
PPT
Allison Stanfield
PDF
Tech comm presentation 2014 01-16
PPT
Andrew Waugh presentation
PPTX
Data Management 101 (2015)
PPTX
information security and backup system
PPT
Unit 3
PPTX
research_data_management.pptx
PPTX
Research Data Management
PDF
A33 tips and best practice for db as by francisco alvarez
PPTX
Introduction to RDM for trainee physicians
PPTX
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
PDF
Schrodinger’s Backup: Is Your Backup Really a Backup?
PDF
Preventing data loss
PPT
ISDD Back Up Strategies
PPTX
A brief introduction to data storage
PPTX
Research Data Curation _ Grad Humanities Class
PPTX
Storing Your Research Data
3e - Security Of Data
Allison Stanfield
Tech comm presentation 2014 01-16
Andrew Waugh presentation
Data Management 101 (2015)
information security and backup system
Unit 3
research_data_management.pptx
Research Data Management
A33 tips and best practice for db as by francisco alvarez
Introduction to RDM for trainee physicians
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
Schrodinger’s Backup: Is Your Backup Really a Backup?
Preventing data loss
ISDD Back Up Strategies
A brief introduction to data storage
Research Data Curation _ Grad Humanities Class
Storing Your Research Data
Ad

More from abhichowdary16 (7)

PPTX
trigno.pptx
PPT
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
PPT
20-MOD 8 Self and Work Management-20-07-2023.ppt
PPTX
Class IX Maths Construction Module 1 .pptx
PPTX
mathsproject-
PPTX
triangles ppt.pptx
PPT
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
trigno.pptx
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
20-MOD 8 Self and Work Management-20-07-2023.ppt
Class IX Maths Construction Module 1 .pptx
mathsproject-
triangles ppt.pptx
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
Ad

Recently uploaded (20)

PDF
737-MAX_SRG.pdf student reference guides
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
PDF
86236642-Electric-Loco-Shed.pdf jfkduklg
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PDF
Analyzing Impact of Pakistan Economic Corridor on Import and Export in Pakist...
PPTX
Artificial Intelligence
PDF
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PPTX
Information Storage and Retrieval Techniques Unit III
737-MAX_SRG.pdf student reference guides
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
III.4.1.2_The_Space_Environment.p pdffdf
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
86236642-Electric-Loco-Shed.pdf jfkduklg
Fundamentals of safety and accident prevention -final (1).pptx
Analyzing Impact of Pakistan Economic Corridor on Import and Export in Pakist...
Artificial Intelligence
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
Exploratory_Data_Analysis_Fundamentals.pdf
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
Categorization of Factors Affecting Classification Algorithms Selection
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
Information Storage and Retrieval Techniques Unit III

7-Backups of security Devices-03-06-2023.ppt

  • 1. Backups of security devices, Performance Analysis
  • 2. Backup Why Backup? “If you are not backing up your files regularly, you deserve to lose them.” Average user experiences loss once a year
  • 3. Backup What Can Cause Data Loss? • Incorrect software use • Input data incorrectly • Software may harm data • Hard disk malfunctions • Accidentally delete files • Virus infection
  • 4. Backup Methods Full backup Differential backup Incremental backup Media Diskette Tape Zip disk CD-R / CR-RW DVD-RAM Mirrored hard drive
  • 5. Full Backup • Complete type of backup operation • make a copy of all the data including files, folders, settings, applications • On - storage devices like hard drive, SSD, HDD, etc. • files and folders will be backed up again entirely in any subsequent backup operations – redundant copies of data • Needs much disk space
  • 6. Incremental Backup • backing up all the files that have changed since the last backup operation
  • 7. Differential Backup • backing up the only changed files since the last full backup
  • 8. Mirror Backup • mirror of source is being supported up • when record is erased from source, that document - erased in Mirror Backup too
  • 9. Full PC Backup • whole picture of PC’s hard drive
  • 10. Local Backup • backup where capacity medium is kept close within reach or in structure with source • second inward hard drive, connected outer hard drive, CD/DVD-More, Network Attached storage (NAS)
  • 11. Offsite Backup • Backup - set in an alternate topographical area from source • Cloud Backup • FTP Backup
  • 12. Hardware and Software • Desktops and laptops – Computer equipment can be damaged, lost, stolen. • Removable media – Media degrades over time. Software programs to read the media change and can become obsolete. Hardware changes over time, and is not always backward compatible. • Cloud storage – Cloud providers go out of business – Data formats change (what you upload may not be useable when you download it) – Accidents happen. Data is corrupted, or stolen.
  • 13. File Formats • Think about the ability to use and re-use data in the future. Both for you, and for others. • Accessibility of future data because of technology changes - proactively plan for hardware and software obsolescence. • Think about who needs access to your data. Are you collaborating with someone within the University, or outside of it? • Conducting funded research - be aware of any data storage and data sharing requirements. • Think about data security.
  • 14. Best Practices for File Formats Formats most likely to be accessible in the future are: • non-proprietary • open • documented standard commonly used by a discipline-specific research community • standard representation (ASCII, Unicode) • unencrypted and uncompressed Remember that comprehensive documentation (metadata) is essential to accurate use, and reuse, of all data.
  • 15. Data Security and Access Control • Network security – Keep confidential or highly sensitive data off computers or servers connected to the internet • Physical security – Access to buildings and rooms • Computer systems & files – Use strong passwords on files and systems – Virus protection (updated continuously and running!) – Encryption
  • 16. Data Backups • Reduces the risk of damage or loss • Use multiple locations (here-near-far or 3-2-1) -Keep at least 3 copies of data - Store 2 backup copies on different storage media. - Store 1 backup copy offsite. • Create a backup schedule and put someone dependable in charge • Use reliable backup medium • Test your backup system (test file recovery, data consistency, data accuracy)

Editor's Notes

  • #13: Your desktop or laptop computer should store only your current working copy of your data. Your master copy should be stored in a safe environment, and it should be copied in another location as well. Data redundancy is very important. Your laptop can break down, the hard drive can crash, your computer can be infected with a virus, your laptop is stolen. What happens if it is the ONLY copy of your data? Removable media are vulnerable to temperature and humidity fluctuations, poor handling, air, moisture, and light conditions. The program you used to generate or analyze the data could be upgraded by the manufacturer, and it might no longer work with your data. The software has changed, and no longer runs on your computer. Removable media should be migrated to new media every 3-5 years. Hard drives should be migrated every 5 years. The consistency of the recorded data should be checked yearly. Cloud storage providers are providing a service for a fee. They are a business, and as such they can go bankrupt, be bought out, or be legislated out of existence. Cloud storage is simply storage. What you put in is what you get out. Don’t make the mistake of thinking of them as a long-term storage solution, like an archive. Have another option available, because if they go out of business, you may have a very limited amount of time to move your data to a new provider. You will not be able to move it directly from one service to another.
  • #14: Plan for the future at the start of any data collection activity. You may need your data in one format to analyze it, and another to visualize it. You may want to share it with a collaborator who needs it in a specific format. Perhaps the software tool you need to use requires a format that only it has. Being aware of these requirements will make the later stages of your work easier and more productive. Think about how software and hardware change over time. Proprietary software often has a short “shelf life”. Microsoft has changed Word quite a few times over the years. If you try to open an old 1989 copy of a Word file with the 2010 version, you will get nothing but gibberish. (The first Word program was released in 1983. It was in MS-DOS). Later versions are not always backwards compatible. The same holds true for many proprietary software products. Hardware also changes over time. Operating systems change, hard drive file formats change. The mechanical bits of computers change and break down. The data may be still on an older hard drive, but if the software that reads it is no longer available, or the bearings that spin the disc are frozen, you will never be able to access that data. Access for your collaborators is something you need to be aware of. If they are at UVa, they are probably using the same systems as you, or the data can be migrated to a format you can both access and use. But if they are in Europe, or Asia, they may not have access to the same equipment or software. This is especially important if you are working with highly sensitive data, such as personal identifiers or HIPPA regulated data. Do your collaborators have access to your data storage environments? Many funders, especially US government ones, require data sharing as a part of your funding. They may specify specific formats for data sharing and data storage. Data security is an important consideration. Can you move the data easily? Consider factors such as size, security level, format. What are the requirements imposed by the funder, the institution, or collaborators?
  • #15: You will probably need to keep your working data in a proprietary format until your data analysis is finished. It is always a good idea to have your primary data file backed up in both the proprietary format you are using for analysis, and a non-proprietary one. Data redundancy is a simple but effective deterrent to unimagined software and hardware failures. For long-term data storage (archiving) and sharing, you want to select a file format which is non-proprietary for maximum reuse potential. Open formats are best. Convert your data from proprietary formats to open or discipline-defined standards. The following list comes from the UK Data Archive, the preeminent authority on digital research data in the social sciences and humanities. [http://www.data-archive.ac.uk/create-manage/format/formats-table] Quantitative tabular data: SPSS portable format (.por), comma-separated values (.csv), tab-delimited files (.tab), text files (.txt) Geospatial data: ESRI Shapefile (.shp, .shx, .prj, .sbx, .sbn), TIFF (.tif, .tfw), Cad data (.dwg) Qualitative data: XML, rich text format (.rtf), plain text data (ASCII .txt) Digital Image data: TIFF (.tif) uncompressed Digital Audio data: Free Lossless Audio Codec (FLAC) (.flac) Digital Video data: MPEG-4 (.mp4), motion JPEG 2000 (.mj2) Documentation and scripts: Rich text format (.rtf), PDF/A or PDF (.pdf), HTML (.htm), Open Document Text (.odt) Don’t forget the metadata! Comprehensive and complete documentation is essential so that all future users can understand the data.
  • #16: The PI, or an assigned team member, should be responsible for maintaining the master copy. Restrict write access to specific members of the team. Document and update your guidelines (include responsibilities) so if team members change, new members will know the requirements. Record changes with your working data with Version control. Network security: Keep highly sensitive, confidential or IP-valuable data off internet-connected servers (or behind firewalls). Physical security: Who has access to your office and to the data files? Be careful of allowing repairs by an outside company. Computer systems and files: Keep virus protection up to date, and active. Be sure your computer has a login password. Do not send personal or confidential data via e-mail or FTP. Encrypt your data prior to sending. If you have IRB requirements, be sure to follow them. You may need to address data storage when acquiring consent and confidentially agreements for data users. Many IRB’s require 2 levels of security when working with sensitive or confidential data. This can be a password-secured computer in a locked office, or password-protected data files on a password-protected computer. Encryption is another option to ensure the security of data.
  • #17: Data redundancy is very important. Regular back-ups protect against disasters and accidental or malicious data loss. Types of problems: Hardware failures Software problems Virus infection Hacking Power failures Human errors Ideally, your backup should be stored in a different zone: you want to be able to recover your data if something bad happens. If you keep your backup on the same device/media as your primary, or master, then in the case of a disaster you will lose all of it. 3-2-1 Rule: Keep 3 copies of your data. 2 different media (for example - hard drive and optical media). 1 copy stored offsite, ideally in a different threat zone. Here-near-far: Keep 3 copies of your data. 1 here (your working copy), 1 near (your primary backup), 1 far (your primary data, kept in a different threat zone) What is a threat zone? A different geographical location from the one you are working in. If a natural disaster occurred in Virginia, and all of your data files are here, then you will probably lose everything. Put your primary, or primary backup, on a media that is secure, and send it to a friend or family member in another state for safe keeping. Can the cloud be considered a different zone? Yes, but only if the servers aren’t in the same zone you are in. Backup your data frequently. Copy that backup frequently. Don’t touch the primary unless you need it. Ideally, create a schedule for backing up your data, and follow it. Have someone be responsible for the backup schedule. Follow-up. Periodically test your backed up data for accuracy and consistency. Your schedule should include this. Your schedule should also include the dates when data files are created, so you know when you should migrate to fresh media. Disaster recovery: If the worst happens, recover your data from the primary backup. You may have to start your analysis again, but it is better than having to collect the data again. If you have been saving and backing up your data on a regular schedule, you should lose no more than your work between backups. This is a great reason to do those backups weekly.