Traditionally, function. Backup, is one of the most

backup and recovery programs had a purpose, to make a copy of the data. Their
storage administrators are increasingly relying on encryption and other
security technologies to maintain sensitive data. The field is of growing
importance due to the development of computer systems and the Internet. But
over the last few years, backup software products have evolved to include a
whole host of functionalities.

such as data protection (CDP), file retrieval, data deduplication, repetition,
backup reporting tools, and even data archiving have become features or are
strongly integrated with software classroom backup applications enterprise.
Generally the computer must be protected from theft, vandalism, opening, launch
with another media. This study aims to provide a description of safe backup
systems and how they function.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

is one of the most important steps that can be taken to protect the information.
Data retention is an insurance plan that enables data retrieval if a problem
occurs, such as disk corruption, accidental deletion of data, virus infection,
or theft or loss of equipment.

Always a
good system administration involves reliable backup and recovery procedures.
Based on business needs, data storage procedures should be planned. Integrated
backup and recovery tools are used in the operating system or software
dedicated to other vendors.

Some of
the important facts that should be considered during backup planning are:

o How
often backup data needs to be made and what is the best backup time

o How
much data should be stored

Outbound data storage in case of disaster

o How
long should backup data be stored

o Data
Saved Data: The backup media should be stored in a safe place. If data is
stored online, securing data from a hacker / intruder is just as important

o Good
documentation for recovery and backup procedures


are two ways to decide what to backup: (1) special data that are important,
such as documents, photos, or video footage; (2) anything, including the
operating system or any program that may be installed except the data. The
first way it simplifies the backup process, but the second way is simpler and
more reliable if the whole system needs to be restored when fully disrupted. If
there is no guarantee what to do backup, then backup everything.

Some of
the most commonly used data storage solutions include:

Cassette tapes

Digital Audio Discs (DATs)

? Automatic
tape systems

Magnetic optical discs

Cassette Jukeboxes

? Mobile

? Disk


refers to copying physical, virtual or database files to a secondary storage
location, in case of hardware failure or other catastrophes. This, using various
security tools and protocols according to accepted standards. The process of
data retention is essential for a successful disaster recovery plan (DR).

backup procedures is done depending on the business needs and corporate
purpose. Any disaster recovery plan / procedure is not complete unless it is
tested. Backup and recovery testing refers to the practices and technologies of
an organization for data security and data retrieval. The aim is to provide
fast and reliable data retrieval if need arises. The process of obtaining
backup data files is known as file retrieval. Periodically, it should be proven
whether data regulation is working.

support the information they think to be vulnerable to malicious software, data
corruption, hardware failure, malicious attack, user error, or other unforeseen

disaster recovery and recovery is planned, basic rules are how quickly the
system should be rebuilt in the latest state of the job if the entire system is
destroyed and how much data can be recovered to lose.

backup media storage location is important:

• Must
have a physical location that is not affected by anything that can destroy the
main site:

way the physical security requirements are doubled

are usually a good choice for backup tapes.

Magnetic media is sensitive to temperature:

common safaris are not enough to protect the magnetic tape from the fire

• Backup
of entire computer systems can sometimes be used:


the business continue almost immediately


there are two ways to backup: in physical media or in “cloud”.
Physical media include DVD, USB, or external disks. In the use of physical
backups, the copy is not in the same place as the original data. Media labels
are also set so that backups can be distinguished on a given date or time.

advantage of physical media is that backup and recovery of data is done
quickly. The disadvantage is that in the event of a disaster it may lose not
only the computer but also the backup. Therefore, there should be a plan to
save backup copies to a location other than the original. When backups are
saved away, they must also be encrypted- so if they lose backups, at least the
data is protected. When encrypting backups, we need to make sure we keep
passwords securely.

backup solutions are different. This service means that data is stored in
“cloud” (somewhere on the Internet). This works by installing a
computer program, which then automatically backs up the data. The advantage of
this solution is that there is no need for disk space and payment for expensive
servers or software licenses. Cloud shortage in the cloud is that it may be
slow, especially when there is a lot of data.

A backup
process applies to critical databases or related business line applications.
The process is guided by predefined backup policies that specify how often data
is stored and how many copies are required, as well as service level agreements
(SLAs) that determine how quickly the data should be restored.

The most
common backup options are every hour, every day, every week, and so on.
Personal backup applications such as Microsoft Time Machine and Windows Backup
and Restore allow you to create hours when automatic backups are made. These
solutions keep the data quietly while working on the computer, or not. Other
solutions offer “continuous protection”, meaning that all new or
changed documents are backed up when they are shut down by the user.

Best practices
suggest that a full backup of data should be scheduled to occur at least once a
week, often over the weekend or overtime. To complete the full weekly backups,
enterprises usually plan a series of differential backup jobs or data growth
that only store data that has changed since the last full backup was made.

The most
important and most valuable data, whether personal or business, should be
stored in a safe backup location. The security of this backup site is very
important and requires constant monitoring and improvement. Without a Backup
Data Backup Plan, the entire business can be in jeopardy. If possible, the best
solution is to backup in both ways: in the physical medium and in the cloud.
The backup process needs to be automated as much as possible.

administrators need to be more up-to-date with the systems and networks they
manage. There is a greater challenge for them, to preserve them and protect
them from hackers. It also helps any organization to be prepared in the event
of any breach of security or misfortune. If system administrators are more
cautious and follow good practices during routine administrative tasks, there
can be secure systems.