Traditionally, system administration involves reliable backup and recovery

Traditionally,backup and recovery software products had a purpose, to make a copy of thedata.

Storage administrators are increasingly relying on encryption and othersecurity technologies to store sensitive data. The field is of growingimportance due to increased support in computer systems and the Internet. Butover the last few years, backup software products have evolved to include awhole host of functionalities.Technologysuch as data protection (CDP), file retrieval, data deduplication, repetition,backup reporting tools, and even data archiving have become features or arestrongly integrated with software classroom backup applications enterprise.Generally the computer must be protected from theft, vandalism, opening, launchwith another media. This study aims to provide a description of safe backupsystems and how they function.

Sometimes it is hard to do all the work on your own
Let us help you get a good grade on your paper. Get expert help in mere 10 minutes with:
  • Thesis Statement
  • Structure and Outline
  • Voice and Grammar
  • Conclusion
Get essay help
No paying upfront

 Backup,is one of the most important steps that can be taken to protect the information.Data retention is an insurance plan that enables data retrieval if a problemoccurs, such as disk corruption, accidental deletion of data, virus infection,or theft or loss of equipment.Always agood system administration involves reliable backup and recovery procedures.Based on business needs, data storage procedures should be planned. Integratedbackup and recovery tools are used in the operating system or softwarededicated to other vendors.Some ofthe important facts that should be considered during backup planning are:o Howoften backup data needs to be made and what is the best backup timeo Howmuch data should be storedoOutbound data storage in case of disastero Howlong should backup data be storedo DataSaved Data: The backup media should be stored in a safe place. If data isstored online, securing data from a hacker / intruder is just as importanto Gooddocumentation for recovery and backup procedures Thereare two ways to decide what to backup: (1) special data that are important,such as documents, photos, or video footage; (2) anything, including theoperating system or any program that may be installed except the data. Thefirst way it simplifies the backup process, but the second way is simpler andmore reliable if the whole system needs to be restored when fully disrupted.

Ifthere is no guarantee what to do backup, then backup everything. Some ofthe most commonly used data storage solutions include:?Cassette tapes?Digital Audio Discs (DATs)? Automatictape systems?Magnetic optical discs?Cassette Jukeboxes? MobileDisks? Diskdrives Backuprefers to copying physical, virtual or database files to a secondary storagelocation, in case of hardware failure or other catastrophes. This, using varioussecurity tools and protocols according to accepted standards. The process ofdata retention is essential for a successful disaster recovery plan (DR).

Planningbackup procedures is done depending on the business needs and corporatepurpose. Any disaster recovery plan / procedure is not complete unless it istested. Backup and recovery testing refers to the practices and technologies ofan organization for data security and data retrieval. The aim is to providefast and reliable data retrieval if need arises. The process of obtainingbackup data files is known as file retrieval. Periodically, it should be provenwhether data regulation is working.

Enterprisessupport the information they think to be vulnerable to malicious software, datacorruption, hardware failure, malicious attack, user error, or other unforeseenevents.Whendisaster recovery and recovery is planned, basic rules are how quickly thesystem should be rebuilt in the latest state of the job if the entire system isdestroyed and how much data can be recovered to lose.Thebackup media storage location is important:• Musthave a physical location that is not affected by anything that can destroy themain site:              -Thisway the physical security requirements are doubled              -Backetsare usually a good choice for backup tapes.•Magnetic media is sensitive to temperature:             -Thecommon safaris are not enough to protect the magnetic tape from the fire• Backupof entire computer systems can sometimes be used:             -Expensive             -Letsthe business continue almost immediately Generallythere are two ways to backup: in physical media or in “cloud”.

Physical media include DVD, USB, or external disks. In the use of physicalbackups, the copy is not in the same place as the original data. Media labelsare also set so that backups can be distinguished on a given date or time.Theadvantage of physical media is that backup and recovery of data is donequickly. The disadvantage is that in the event of a disaster it may lose notonly the computer but also the backup.

Therefore, there should be a plan tosave backup copies to a location other than the original. When backups aresaved away, they must also be encrypted- so if they lose backups, at least thedata is protected. When encrypting backups, we need to make sure we keeppasswords securely.Cloudbackup solutions are different. This service means that data is stored in”cloud” (somewhere on the Internet). This works by installing acomputer program, which then automatically backs up the data.

The advantage ofthis solution is that there is no need for disk space and payment for expensiveservers or software licenses. Cloud shortage in the cloud is that it may beslow, especially when there is a lot of data.A backupprocess applies to critical databases or related business line applications.The process is guided by predefined backup policies that specify how often datais stored and how many copies are required, as well as service level agreements(SLAs) that determine how quickly the data should be restored.The mostcommon backup options are every hour, every day, every week, and so on.Personal backup applications such as Microsoft Time Machine and Windows Backupand Restore allow you to create hours when automatic backups are made.

Thesesolutions keep the data quietly while working on the computer, or not. Othersolutions offer “continuous protection”, meaning that all new orchanged documents are backed up when they are shut down by the user.Best practicessuggest that a full backup of data should be scheduled to occur at least once aweek, often over the weekend or overtime. To complete the full weekly backups,enterprises usually plan a series of differential backup jobs or data growththat only store data that has changed since the last full backup was made.The mostimportant and most valuable data, whether personal or business, should bestored in a safe backup location.

The security of this backup site is veryimportant and requires constant monitoring and improvement. Without a BackupData Backup Plan, the entire business can be in jeopardy. If possible, the bestsolution is to backup in both ways: in the physical medium and in the cloud.The backup process needs to be automated as much as possible.Systemadministrators need to be more up-to-date with the systems and networks theymanage.

There is a greater challenge for them, to preserve them and protectthem from hackers. It also helps any organization to be prepared in the eventof any breach of security or misfortune. If system administrators are morecautious and follow good practices during routine administrative tasks, therecan be secure systems.

x

Hi!
I'm Gerard!

Would you like to get a custom essay? How about receiving a customized one?

Check it out