Data - These are raw facts which must be protected
Information - These are the processed and organized data that presented in a meaningful context.
Data Protection - Attack against data can happen when it is being stored, transmitted, or processed.
Backup - Ensuring that copies of data files are stored safely and securely and will survive even if the data on the host are lost, stolen, or damaged.
Scope of Backup - Fraction of information on the hard drive that is backed up
File/Directory Data Backup - Select data files and directories to be backed up.
Image backup - It backup evertyhing , including programs and setting can be restored to a different computer if necessary.
Shadowing - It is a backup copy of each file being worked on is written every few minutes to the hard drive or to another location such as a USB drive.
Full backups - Record all the data on the computer and slow so it is typically done weekly
Incremental backups - Only records changes since the last backup and fast so usually done daily.
Restoration Order - Restore the full backup first and restore incremental backups in the order created.
Generation - Save several genrations of full backups and usually do not save incremental backups after the next full backup.
Local Backup - Individual computer and difficult to audit backup compliance and incremental backup.
Centralized backup - It collects data from each device over the network and stores on console's backup.
Continuous Data Protection - It used when a firm has two server locations and each location backs up the other in real time.
Internet Backup Services - Back up to a commercial backup service's site over the internet.
Mesh Backup - Peer-to-peer backup onto other client computers.
Backup Creation Policies - It understand the current system and future needs and it ask what should be backed up and how frequently.
Restoration Policies - Do restoration tests frequently
Strong access control policies for backup media - Check outs are rare and therefore suspicious.
Media Storage Location Policies - It store media at a different site and store backup media in a fireproof and waterproof safe until it can be moved off-site.
Encryption Policies - Encrypt backup media before moving them so that confidential information will not be exposed if the tape is stolen or lost
Data Retention Policies - There are strong legal requirements for how long certain types of data must be kept.
Data Retention - It is the action of storing for a specific period of time.
Data Retention Policy - It is a set of rules governing how long an organization stores different types of data and how it will dispose it.
Data Retention Period - It is when an organization keeps data retained governed by its specific data retention policy.
Legal and Compliance - Contracts, compliance records, audit records, and reports
Customer - names, addresses, communication records, and purchase history.
Employee - HR Records, payroll records, and personal information.
Operational - Supply chain, network and server activity, administration.
Email Retention - Many mail servers store messages on their disk drives for some time, and then archive message onto tape.
Database security - The protection of databases and their content from unauthorize access, misuse, or malicious activities.
Database Security - It encompasses various measures and practices to ensure confidentiality, integirty, and availability of the data stored within databases.
Databases - Often used in mission-critical applications and use relational databases with tables and rows