Студопедия

КАТЕГОРИИ:


Архитектура-(3434)Астрономия-(809)Биология-(7483)Биотехнологии-(1457)Военное дело-(14632)Высокие технологии-(1363)География-(913)Геология-(1438)Государство-(451)Демография-(1065)Дом-(47672)Журналистика и СМИ-(912)Изобретательство-(14524)Иностранные языки-(4268)Информатика-(17799)Искусство-(1338)История-(13644)Компьютеры-(11121)Косметика-(55)Кулинария-(373)Культура-(8427)Лингвистика-(374)Литература-(1642)Маркетинг-(23702)Математика-(16968)Машиностроение-(1700)Медицина-(12668)Менеджмент-(24684)Механика-(15423)Науковедение-(506)Образование-(11852)Охрана труда-(3308)Педагогика-(5571)Полиграфия-(1312)Политика-(7869)Право-(5454)Приборостроение-(1369)Программирование-(2801)Производство-(97182)Промышленность-(8706)Психология-(18388)Религия-(3217)Связь-(10668)Сельское хозяйство-(299)Социология-(6455)Спорт-(42831)Строительство-(4793)Торговля-(5050)Транспорт-(2929)Туризм-(1568)Физика-(3942)Философия-(17015)Финансы-(26596)Химия-(22929)Экология-(12095)Экономика-(9961)Электроника-(8441)Электротехника-(4623)Энергетика-(12629)Юриспруденция-(1492)Ядерная техника-(1748)

First: A Back Up Plan




What are the risks?

Storage: Caring for Data

Besides protecting the physical medium you are using to store data, you must also consider what you can do to safeguard the data itself. Even if the disk is kept from physical harm, but the data gets erased, you still have a major problem.

Here are some risks that you need to protect yourself against. We cannot keep these from occurring. We need a good recovery plan!

  • Disk failure/crash
  • File corruption
  • Accidental delete or change
  • Lost/mis-placed removable device
  • Damage/destroyed/lost from:
    • Theft
    • Fire
    • Flood or water damage
    • Tornado/hurricane/earthquake
    • Lightning or power surge

So what can you do to safeguard the data on which you rely??

The backup plan for your computer should emphasize backing up your data files and do so automatically and frequently. Programs can be repurchased if necessary and reinstalled, but data may be impossible to replace.

A plan that you do not actually use is not a plan at all, so make this as automatic as possible. There are a number of free or inexpensive services that automatically synchronize a backup over the Internet.

If you make copies on CD/DVD or tape or an external drive, you must store those backups somewhere besides in the same room as the computer that you are backing up or even the same building. The same event could wipe out the computer and the backup!

Write protect This keeps your files from being overwritten with new ones. Removable media including USB drives: Look for a tiny write-protect switch on the device. Hard disks and devices without a switch:
  • Make files Read-Only and/or Hidden to keep them from being overwritten accidentally. This is done by changing the file attributes using whatever system you have for managing files.
  • Assign a password to each file, which can be done with some programs and some USB drives.
  • Encrypt the files. This will require special software and remembering the decryption key.
Backup Copies Make multiple copies of important data often and store them in different physical locations. How many copies depends on how hard the data will be to replace and how distraught you will be if it is lost. Kinds of copies:
  • on the same drive but in a different folder
  • on a removable drive
  • on a CD or DVD
  • in online storage like Sky Drive or DropBox or Google Drive
  • included in your normal backup plan
For truly important data, you want to store a physical copy in another physical location. Online drives will usually synchronize the files that you save to a local folder for that service. The more important the files are, the more copies in more places you need.
Anti-malware Use a set of programs that continuously look for an attack by a virus, trojan, or worm. Computer viruses/trojans/worms are sneaky computer programs that can erase your data and even your whole system. Many are merely annoying and are created as practical jokes. But there are a number of very damaging malware programs out there, plus others that are out to steal your passwords or use your computer to damage or annoy others. Your computer gets one of these nasties by downloading an infected file from the Internet (sometimes without your knowledge!) or your office network, or by first using a removable disk in an infected computer and then accessing a file on that removable disk with your own computer. This makes it difficult to keep them from spreading. Once you have disinfected your computer, it can get re-infected from a removable disk that was used between the time you were infected with the malware and when you disinfected it. A number of nasty viruses hide for quite a while before doing their nasty things. So you can infect a lot of your own backups and other disks and spread the infection, all unknowingly, to others. Run an anti-malware program that actively looks for infections all the time. Don't wait until you have symptoms. A lot of damage can be done before you figure out that you have a problem.



Поделиться с друзьями:


Дата добавления: 2014-12-23; Просмотров: 474; Нарушение авторских прав?; Мы поможем в написании вашей работы!


Нам важно ваше мнение! Был ли полезен опубликованный материал? Да | Нет



studopedia.su - Студопедия (2013 - 2024) год. Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав! Последнее добавление




Генерация страницы за: 0.011 сек.