Data Backup and Disk Mirroring
Data Backup and Disk Mirroring
Security of com
puter system Firewalls Password
Digital signatures
Protection techn
ologies
Backup
Encryption
Computer Security types
Information security is securing information from unauthorized access,
modification & deletion
Application Security is securing an application by building security feat
ures to prevent from Cyber Threats such as SQL injection, DoS attacks,
data breaches and etc.
Computer Security means securing a standalone machine by keeping it
updated and patched.
Network Security is by securing both the software and hardware technol
ogies need for network.
Cybersecurity is defined as protecting computer systems, which commu
nicate over the computer networks.
GROUP WORK
DATA SECURITY METHODS
Make a research and create a ppt:
1st User Access Management
2nd Data Backup
3rd Disk mirroring
Include:
• Definition
• Purpose
• Advantages
• Disadvantages
COMPUTER SECURITY METHODS
User access management - in enterprise IT is about defining and mana
ging the roles and access privileges of individual network users and the
circumstances in which users are granted those privileges.
Backup refers to the copying of physical or virtual files or databases to a
secondary location for preservation in case of equipment failure or catas
trophe. Backup and recovery describes the process of creating and stori
ng copies of data that can be used to protect organizations against data
loss.
Disk mirroring techniques - a technique used to protect a computer sy
stem from loss of data and other potential losses due to disk failures. In t
his technique, the data is duplicated by being written to two or more iden
tical hard drives, all of which are connected to one disk controller card. If
one hard drive fails, the data can be retrieved from the other mirrored ha
rd drives.
USER ACCESS MANAGEMENT (UAM)
Also known as identity and access management (IAM), is the administr
ation of giving individual users within a system access to the tools they
need at the right time. For businesses, this usually includes access to e
xternal applications, permissions, and security requirements.
User Account Management include
User Accounts and User Account Groups
Domains
Software Permissions
Log on Methods
Workspaces
Guest Log On in WebStation
Backup.
• A backup is the creation of a copy of data or files for storage on another disk or on another s
erver.
• Important files should be backed up periodically as files and data can be damaged, accident
ally overwritten, or deleted.
• A schedule is defined for the backup. Usually, the company has a person who is responsible
for backups, as this process must be controlled.
• Keep your backups in a secure location. It can be a removable disk or cloud storage.
• The backup media or files must be tagged to know when the backup was created and what it
contains.
https://www.youtube.com/watch?v=o-83E6levzM&t=50s
Recommendations system backup
strategy:
✔ Encrypt any backup containing sensitive data.
✔ Do not forget to put your backups in different locations; offline and
online.
✔ Always verify your backups to ensure that files are correctly backe
d up and can be retrieved.
✔ Backup and recovery systems that are implemented but are kept on
media connected to your computer can be threatened by the very
same dangers that your PC can.
Advantages and Disadvantages
Advantages
• We can recover data if the original data will be lost
• You can store multiple copies in different locations
Disadvantages
• You will need extra memory to store a copy
• If your backup will be in the same room as the opiginal, th
en in case of fires, floods, this will not save your data
Types of backup
• Local Backup
For this type of backup, portable storage is used (removable hard disk, flash
memory, CD disks). It's easy to carry with you and your files will always be a
vailable to you.
• Remote Backup
This is also often referred to as cloud backup, which is when the copy is held
in cloud storage.
This type of data backup is safer than home storage. It will not be affected by
floods, fires and other things that can happen where you live. Whatever happ
ens, your files will be safe.
How can I back up my files?
If you want to back up important files, use an archiving program.
• Put all your files in one archive
• Place a copy on a removable hard drive, flash memory, CD-ROM, or cloud storage.
Some programs have a data backup function. In this case, it is enough to configure the back
up settings.
https://www.youtube.com/watch?v=FIL6L7f32Bs
RAID Mirroring (Redundant Array of Ind
ependent Disks)
RAID is a storing data method on more than one h
ard drives. It can be used to increase performance
and also most often used to protect critical data on a
storage server.
Usually RAID involves recording duplicate copies of
stored data, they can be used when necessary and t
o reconstruct lost data. It helps to increase the fault
tolerance, such as a system crash of a storage syste
m.
DISK
MIRRORING
• The purpose of disk
mirroring is to increase fault
tolerance. For example, if
one hard drive fails, the
system will instantly switch to
the other hard-drive without
any loss of data.
• More than one copy of
each block is stored in a
separate disk. Thus, every
block has two (or more)
copies, lying on different
disks.
What is RAID 0,1,5,10?
*Look at the video from start to 2:26
*
https://www.youtube.com/watch?v=U-OCdTeZLac
Advantages and diadvantages of using disk mirroring
Advantages
• This technology is simple and easy to implement.
• Provides high fault tolerance when working with two disks.
• If one hard drive fails, the data can be retrieved from the other mirrored hard driv
es.
Disadvantages
• The usable storage capacity is only half of the total disk capacity.
• You cannot replace a failed drive while the computer is running.
• If a virus attaches to a file and starts replicating, this will also happen on the mirr
ored disk.
• If you accidentally delete a file on one disk, it will be deleted on the other.
Activity 1 Words: a copy, different server, corrupted, full ba
ckup, incremental backup, reliable.
Choose appropriate word: both, capacity, cost, data recovery, Disk Mirroring, mi
rror, pairs of drives, replace, two.
Exam questions(answer in your copy
books and check)
1. Explain what is meant by data backup [2]
2. A company makes regular of its data. Explain how it can be
st make sure that the backups are safe. [2]
3. Someone suggests that online backup would be convinient
. Explain what is meant by an online backup. [1]
4. Explain why an online backup provides extra security. [1]
Answers