0% found this document useful (0 votes)
23 views10 pages

Backup and Recovery and Security

Uploaded by

Coder kids
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views10 pages

Backup and Recovery and Security

Uploaded by

Coder kids
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

BACKUP AND

RECOVERY
• . Backup: Backup refers to storing a copy of original data
which can be used in case of data loss. Backup is
considered one of the approaches to data protection.
Important data of the organization needs to be kept in
backup efficiently for protecting valuable data. Backup can
be achieved by storing a copy of the original data
separately or in a database on storage devices. There are
various types of backups are available like full backup,
incremental backup, Local backup, mirror backup, etc.
• 2. Recovery: Recovery refers to restoring lost data by
following some processes. Even if the data was backed up
still lost so it can be recovered by using/implementing
some recovery techniques. When a database fails due to
any reason then there is a chance of data loss, so in that
case recovery process helps in improve the reliability of the
database.
DIFFERENCE BETWEEN BACKUP AND
RECOVERY
Backup Recovery

Backup refers to storing a copy of original data separately. Recovery refers to restoring the lost data in case of failure.

So we can say Backup is a copy of data which is used to So we can say Recovery is a process of retrieving lost,
restore original data after a data loss/damage occurs. corrupted or damaged data to its original state.

In simple backup is the replication of data. In simple recovery is the process to store the database.

The prior goal of backup is just to keep one extra copy to The prior goal of recovery is retrieve original data in case
refer in case of original data loss. of original data failure.

It helps in improving data protection. It helps in improving the reliability of the database.

Backup makes the recovery process more easier. Recovery has no role in data backup.

The cost of backup is affordable. The cost of recovery is expensive.


Different types of data backup
• Full backups
• The most basic and complete type of backup operation is a full
backup. As the name implies, this backup type makes a copy of all
data to a storage device, such as a disk or tape. The primary
advantage of performing a full backup during every operation is that
a complete copy of all data is available with a single media set.
• It takes the shortest time to restore data, a metric known as a
recovery time objective. However, the disadvantages are that it
takes longer to perform a full backup than other types, requiring
more storage space.
• Thus, full backups are typically run only periodically. Data centers
with a small amount of data may choose to run a full backup daily or
even more often in some cases
• Incremental backups
• An incremental backup operation will result in copying
only the data that has changed since the last backup
operation of any type. An organization typically uses the
modified timestamp on files and compares them to the
last backup timestamp.

The benefit of an incremental backup is that it copies a
smaller amount of data than a full. Thus, these
operations will have a faster backup speed and require
fewer media to store the backup.
• Differential backups
• A differential backup operation is similar to an incremental the
first time it is performed, in that it will copy all data changed
from the previous backup. However, each time it is run
afterward, it will continue to copy all data changed since the
previous full backup. Therefore, it will store more backed up
data than an incremental on subsequent operations, although
typically far less than a full backup.
• Differential backups require more space and time to complete
than incremental backups, although less than full backups
DATABASE SECURITY
• Database security is the technique that protects and secures
the database against intentional or accidental threats.
• Security concerns will be relevant not only to the data resides
in an organization's database: the breaking of security may
harm other parts of the system, which may ultimately affect
the database structure.
• Consequently, database security includes hardware parts,
software parts, human resources, and data.
• To efficiently do the uses of security needs appropriate
controls, which are distinct in a specific mission and purpose
for the system.
• The requirement for getting proper security while often having
been neglected or overlooked in the past days; is now more
and more thoroughly checked by the different organizations.
Control methods of Database
Security
Database Security means keeping sensitive information safe
and prevent the loss of data. Security of data base is controlled
by Database Administrator (DBA).
The following are the main control measures are used to
provide security of data in databases:
1. Authentication
2. Access control
3. Flow control
4. Database Security applying Statistical Method
5. Encryption
AUTHORIZATION
• What is Authorization?
• Authorization is the process of granting someone to do
something. It means it a way to check if the user has
permission to use a resource or not.
• It defines that what data and information one user can
access. It is also said as AuthZ.
• The authorization usually works with authentication so that
the system could know who is accessing the information.
• Authorization is not always necessary to access information
available over the internet. Some data available over the
internet can be accessed without any authorization.
What is Authentication?
•Authentication is the process of identifying someone's identity
by assuring that the person is the same as what he is claiming
for.

•It is used by both server and client. The server uses


authentication when someone wants to access the information,
and the server needs to know who is accessing the
information. The client uses it when he wants to know that it is
the same server that it claims to be.

•The authentication by the server is done mostly by using


the username and password. Other ways of authentication by
the server can also be done using cards, retina scans, voice
recognition, and fingerprints.

You might also like