Week 10-11

Cards (34)

  • Data - These are raw facts which must be protected
  • Information - These are the processed and organized data that presented in a meaningful context.
  • Data Protection - Attack against data can happen when it is being stored, transmitted, or processed.
  • Backup - Ensuring that copies of data files are stored safely and securely and will survive even if the data on the host are lost, stolen, or damaged.
  • Scope of Backup - Fraction of information on the hard drive that is backed up
  • File/Directory Data Backup - Select data files and directories to be backed up.
  • Image backup - It backup evertyhing , including programs and setting can be restored to a different computer if necessary.
  • Shadowing - It is a backup copy of each file being worked on is written every few minutes to the hard drive or to another location such as a USB drive.
  • Full backups - Record all the data on the computer and slow so it is typically done weekly
  • Incremental backups - Only records changes since the last backup and fast so usually done daily.
  • Restoration Order - Restore the full backup first and restore incremental backups in the order created.
  • Generation - Save several genrations of full backups and usually do not save incremental backups after the next full backup.
  • Local Backup - Individual computer and difficult to audit backup compliance and incremental backup.
  • Centralized backup - It collects data from each device over the network and stores on console's backup.
  • Continuous Data Protection - It used when a firm has two server locations and each location backs up the other in real time.
  • Internet Backup Services - Back up to a commercial backup service's site over the internet.
  • Mesh Backup - Peer-to-peer backup onto other client computers.
  • Backup Creation Policies - It understand the current system and future needs and it ask what should be backed up and how frequently.
  • Restoration Policies - Do restoration tests frequently
  • Strong access control policies for backup media - Check outs are rare and therefore suspicious.
  • Media Storage Location Policies - It store media at a different site and store backup media in a fireproof and waterproof safe until it can be moved off-site.
  • Encryption Policies - Encrypt backup media before moving them so that confidential information will not be exposed if the tape is stolen or lost
  • Data Retention Policies - There are strong legal requirements for how long certain types of data must be kept.
  • Data Retention - It is the action of storing for a specific period of time.
  • Data Retention Policy - It is a set of rules governing how long an organization stores different types of data and how it will dispose it.
  • Data Retention Period - It is when an organization keeps data retained governed by its specific data retention policy.
  • Legal and Compliance - Contracts, compliance records, audit records, and reports
  • Customer - names, addresses, communication records, and purchase history.
  • Employee - HR Records, payroll records, and personal information.
  • Operational - Supply chain, network and server activity, administration.
  • Email Retention - Many mail servers store messages on their disk drives for some time, and then archive message onto tape.
  • Database security - The protection of databases and their content from unauthorize access, misuse, or malicious activities.
  • Database Security - It encompasses various measures and practices to ensure confidentiality, integirty, and availability of the data stored within databases.
  • Databases - Often used in mission-critical applications and use relational databases with tables and rows