{"id":298,"date":"2022-11-29T21:42:05","date_gmt":"2022-11-29T21:42:05","guid":{"rendered":"http:\/\/learnlearn.uk\/ibcs\/?page_id=298"},"modified":"2023-02-27T13:00:32","modified_gmt":"2023-02-27T13:00:32","slug":"preventing-data-loss","status":"publish","type":"page","link":"https:\/\/learnlearn.uk\/ibcs\/preventing-data-loss\/","title":{"rendered":"Preventing Data Loss"},"content":{"rendered":"<div class=\"responsive-tabs\">\n<h2 class=\"tabtitle\">Protection<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Data Protection<\/h3>\n<p><strong>Physical protection<\/strong><\/p>\n<ul>\n<li>Ensuring that servers and critical hardware are contained within a locked room.<\/li>\n<\/ul>\n<p><strong>Protection against accidental physical damage<\/strong><\/p>\n<ul>\n<li>Ensure that hardware is protected against flooding, fires and acts of nature such as hurricanes<\/li>\n<\/ul>\n<p><strong>Security Policies<\/strong><\/p>\n<ul>\n<li>Ensuring that staff are vetted as necessary<\/li>\n<li>Ensuring that security policies are properly communicated and enforced<\/li>\n<\/ul>\n<p><strong>Network policies<\/strong><\/p>\n<ul>\n<li>Ensuring that network User Access Levels are in place so that people can only view\/edit\/delete files that they should have access to.<\/li>\n<li>Ensuring data is automatically backed up to onsite\/offsite and online\/offline locations as necessary.<\/li>\n<li>Ensuring that software systems are regularly updated with the most secure versions.<\/li>\n<\/ul>\n\n<\/div><h2 class=\"tabtitle\">Backup Factors<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Backup Factors to consider<\/h3>\n<p>It is important that organizations have a plan in place for if their data gets deleted.<\/p>\n<p>When creating a backup plan there are a number of factor to consider:<\/p>\n<p><strong>Where is the data going to be backed up to?<\/strong><\/p>\n<ul>\n<li>Are you going to back the data up onsite, offsite or in the cloud?<\/li>\n<li>Are you going to back up the data to multiple locations?<\/li>\n<\/ul>\n<p><strong>What medium(s) are you going to back up the data to?<\/strong><\/p>\n<ul>\n<li>Are you going to back up to&#8230;.?\n<ul>\n<li>DVD &#8211; to post to an offsite location and to redistribute<\/li>\n<li>HDD &#8211; fast and reliable with a fairly high capacity<\/li>\n<li>SSD &#8211; very fast but low capacity<\/li>\n<li>Tape Drive &#8211; Very high capacity but very slow to backup \/ restore<\/li>\n<li>Cloud &#8211; Multiple locations makes it reliable but not as secure<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>When are you going to perform backups?<\/strong><\/p>\n<ul>\n<li>The backup might tie up network bandwidth so may be best to do in the evening<\/li>\n<li>Is there a specific event that the data should be backed up before (such as server upgrades)<\/li>\n<\/ul>\n<p><strong>How often will the data be backed up?<\/strong><\/p>\n<ul>\n<li>Higher frequency means the backups are more current but it also increases storage requirements and network traffic usage<\/li>\n<\/ul>\n<p><strong>What data are you going to backup?<\/strong><\/p>\n<ul>\n<li>Does all the data need backed up or are there certain files that are more important than others?<\/li>\n<\/ul>\n<p><strong>How is the backup going to happen?<\/strong><\/p>\n<ul>\n<li>Is the process going to manual, semi automated or fully automated?<\/li>\n<li>How will you check if the backup is successful?<\/li>\n<\/ul>\n<p><strong>Who is responsible?<\/strong><\/p>\n<ul>\n<li>Who is responsible for making sure the backups happen \/ are successful?<\/li>\n<\/ul>\n<p><strong>What is the procedure?<\/strong><\/p>\n<ul>\n<li>What is the backup procedure?<\/li>\n<li>Where is it written down?<\/li>\n<li>What happens if somebody leaves the organization or is ill?<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">Backup Types<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Backup Types &#8211; Full, Incremental &amp; Differential<\/h3>\n<p><strong>Full Backups<\/strong><\/p>\n<p>A full backup is where all the data contained on a drive \/ location is backed up every single time. This has the advantage that if there is a problem then any of the backup images can be used to restore the lost data. If there was a hack within the last few days then an older backup image can be used that is hack-free.<\/p>\n<p>A big disadvantage of full backups are the storage size of the backups, which will increase in size by the entire contents of the drive every single time you do a backup. Also if the data is being backed up off-site then the backup will be a huge drain on network resources.<\/p>\n<p><strong>Incremental Backups<\/strong><\/p>\n<p>Full backups are quite wasteful, especially if most of the data doesn&#8217;t change on a daily basis (as is the case with most websites or office server data)<\/p>\n<p>A more sensible solution is to perform a full backup on a monthly basis and then in between each full backup perform an incremental backup daily. An incremental backup only backs up data that has either been added or changed since the last full backup. This compromise allows the advantages of daily backups but without the massive storage requirements issue.<\/p>\n<div class=\"nv-iframe-embed\">\n<div class=\"container-lazyload preview-lazyload container-youtube js-lazyload--not-loaded\"><a href=\"https:\/\/www.youtube.com\/watch?v=o-83E6levzM\" class=\"lazy-load-youtube preview-lazyload preview-youtube\" data-video-title=\"Incremental vs Differential Backup, &amp; Full - Explained\" title=\"Play video &quot;Incremental vs Differential Backup, &amp; Full - Explained&quot;\">https:\/\/www.youtube.com\/watch?v=o-83E6levzM<\/a><noscript>Video can&#8217;t be loaded because JavaScript is disabled: <a href=\"https:\/\/www.youtube.com\/watch?v=o-83E6levzM\" title=\"Incremental vs Differential Backup, &amp; Full - Explained\">Incremental vs Differential Backup, &amp; Full &#8211; Explained (https:\/\/www.youtube.com\/watch?v=o-83E6levzM)<\/a><\/noscript><\/div>\n<\/div>\n<p>&nbsp;<\/p>\n\n<\/div><h2 class=\"tabtitle\">RAID<\/h2>\n<div class=\"tabcontent\">\n\n<h3>RAID Types<br \/>\n<iframe loading=\"lazy\" title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/nSbOPbtU60w\" width=\"900\" height=\"600\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/h3>\n\n<\/div><h2 class=\"tabtitle\">Onsite\/Offsite<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Onsite vs Offsite Backups<\/h3>\n<p><strong>Onsite Backup<\/strong><\/p>\n<p>This is where the backups are stored in the same building as the source storage device, but on a separate storage device<\/p>\n<ul>\n<li>Easy, quick and cheap to restore if you have a hardware fault<\/li>\n<li>Vulnerable to physical attacks and natural disasters<\/li>\n<\/ul>\n<p><strong>Offsite Backup<\/strong><\/p>\n<p>This is where the backup data is stored in a different geographical location to the original data. This could be in a different location owned by the organisation or hosted and managed by a third party backup specialist.<\/p>\n<ul>\n<li>Reduced vulnerability to physical security issues.<\/li>\n<li>Slower to restore than an onsite backup<\/li>\n<li>Can be more expensive<\/li>\n<li>Increased vulnerability to online security issues due to the increased number of attack vectors.<\/li>\n<\/ul>\n\n<\/div><h2 class=\"tabtitle\">Online\/Offline<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Online vs Offline Backups<\/h3>\n<p><strong>Online backups<\/strong><\/p>\n<ul>\n<li>Quick and easy to backup, manage and restore<\/li>\n<li>Vulnerable to web-based attacks and accidently deletion<\/li>\n<\/ul>\n<p><strong>Offline backups<\/strong><\/p>\n<ul>\n<li>slower to backup and restore<\/li>\n<li>less vulnerable to remote attacks and accidental deletion<\/li>\n<\/ul>\n\n<\/div><h2 class=\"tabtitle\">Cloud<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Cloud Backups<\/h3>\n<p>Cloud storage is a type of offsite storage. Data is stored and duplicated across multiple servers world-wide, which in theory adds a significant amount of redundancy.<\/p>\n<ul>\n<li>Data can be accessed quickly and easily from multiple locations world-wide.<\/li>\n<li>Cloud storage is usually cheaper (especially in terms of up-front costs)<\/li>\n<li>The client doesn&#8217;t know where or how their data is stored<\/li>\n<li>Highly vulnerable to online attack, due to the large number of attack vectors.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Data Protection Physical protection Ensuring that servers and critical hardware are contained within a locked room. Protection against accidental physical damage Ensure that hardware is protected against flooding, fires and acts of nature such as hurricanes Security Policies Ensuring that staff are vetted as necessary Ensuring that security policies are properly communicated and enforced Network&hellip;&nbsp;<a href=\"https:\/\/learnlearn.uk\/ibcs\/preventing-data-loss\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Preventing Data Loss<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"on","neve_meta_content_width":84,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Preventing Data Loss - IB Computer Science<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/learnlearn.uk\/ibcs\/preventing-data-loss\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Preventing Data Loss - IB Computer Science\" \/>\n<meta property=\"og:description\" content=\"Data Protection Physical protection Ensuring that servers and critical hardware are contained within a locked room. Protection against accidental physical damage Ensure that hardware is protected against flooding, fires and acts of nature such as hurricanes Security Policies Ensuring that staff are vetted as necessary Ensuring that security policies are properly communicated and enforced Network&hellip;&nbsp;Read More &raquo;Preventing Data Loss\" \/>\n<meta property=\"og:url\" content=\"https:\/\/learnlearn.uk\/ibcs\/preventing-data-loss\/\" \/>\n<meta property=\"og:site_name\" content=\"IB Computer Science\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-27T13:00:32+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/preventing-data-loss\/\",\"url\":\"https:\/\/learnlearn.uk\/ibcs\/preventing-data-loss\/\",\"name\":\"Preventing Data Loss - IB Computer Science\",\"isPartOf\":{\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#website\"},\"datePublished\":\"2022-11-29T21:42:05+00:00\",\"dateModified\":\"2023-02-27T13:00:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/preventing-data-loss\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/learnlearn.uk\/ibcs\/preventing-data-loss\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/preventing-data-loss\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"IB Computer Science\",\"item\":\"https:\/\/learnlearn.uk\/ibcs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Preventing Data Loss\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#website\",\"url\":\"https:\/\/learnlearn.uk\/ibcs\/\",\"name\":\"IB Computer Science\",\"description\":\"- learnlearn..uk\",\"publisher\":{\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/learnlearn.uk\/ibcs\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#organization\",\"name\":\"IB Computer Science\",\"url\":\"https:\/\/learnlearn.uk\/ibcs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2022\/09\/LearnLearnLogowhite-300x41.png\",\"contentUrl\":\"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2022\/09\/LearnLearnLogowhite-300x41.png\",\"width\":300,\"height\":41,\"caption\":\"IB Computer Science\"},\"image\":{\"@id\":\"https:\/\/learnlearn.uk\/ibcs\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Preventing Data Loss - IB Computer Science","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/learnlearn.uk\/ibcs\/preventing-data-loss\/","og_locale":"en_GB","og_type":"article","og_title":"Preventing Data Loss - IB Computer Science","og_description":"Data Protection Physical protection Ensuring that servers and critical hardware are contained within a locked room. Protection against accidental physical damage Ensure that hardware is protected against flooding, fires and acts of nature such as hurricanes Security Policies Ensuring that staff are vetted as necessary Ensuring that security policies are properly communicated and enforced Network&hellip;&nbsp;Read More &raquo;Preventing Data Loss","og_url":"https:\/\/learnlearn.uk\/ibcs\/preventing-data-loss\/","og_site_name":"IB Computer Science","article_modified_time":"2023-02-27T13:00:32+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/learnlearn.uk\/ibcs\/preventing-data-loss\/","url":"https:\/\/learnlearn.uk\/ibcs\/preventing-data-loss\/","name":"Preventing Data Loss - IB Computer Science","isPartOf":{"@id":"https:\/\/learnlearn.uk\/ibcs\/#website"},"datePublished":"2022-11-29T21:42:05+00:00","dateModified":"2023-02-27T13:00:32+00:00","breadcrumb":{"@id":"https:\/\/learnlearn.uk\/ibcs\/preventing-data-loss\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/learnlearn.uk\/ibcs\/preventing-data-loss\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/learnlearn.uk\/ibcs\/preventing-data-loss\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"IB Computer Science","item":"https:\/\/learnlearn.uk\/ibcs\/"},{"@type":"ListItem","position":2,"name":"Preventing Data Loss"}]},{"@type":"WebSite","@id":"https:\/\/learnlearn.uk\/ibcs\/#website","url":"https:\/\/learnlearn.uk\/ibcs\/","name":"IB Computer Science","description":"- learnlearn..uk","publisher":{"@id":"https:\/\/learnlearn.uk\/ibcs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/learnlearn.uk\/ibcs\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/learnlearn.uk\/ibcs\/#organization","name":"IB Computer Science","url":"https:\/\/learnlearn.uk\/ibcs\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/learnlearn.uk\/ibcs\/#\/schema\/logo\/image\/","url":"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2022\/09\/LearnLearnLogowhite-300x41.png","contentUrl":"https:\/\/learnlearn.uk\/ibcs\/wp-content\/uploads\/sites\/25\/2022\/09\/LearnLearnLogowhite-300x41.png","width":300,"height":41,"caption":"IB Computer Science"},"image":{"@id":"https:\/\/learnlearn.uk\/ibcs\/#\/schema\/logo\/image\/"}}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"learnlearnadmin","author_link":"https:\/\/learnlearn.uk\/ibcs\/author\/learnlearnadmin\/"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"Data Protection Physical protection Ensuring that servers and critical hardware are contained within a locked room. Protection against accidental physical damage Ensure that hardware is protected against flooding, fires and acts of nature such as hurricanes Security Policies Ensuring that staff are vetted as necessary Ensuring that security policies are properly communicated and enforced Network&hellip;&nbsp;Read&hellip;","_links":{"self":[{"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/pages\/298"}],"collection":[{"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/comments?post=298"}],"version-history":[{"count":13,"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/pages\/298\/revisions"}],"predecessor-version":[{"id":527,"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/pages\/298\/revisions\/527"}],"wp:attachment":[{"href":"https:\/\/learnlearn.uk\/ibcs\/wp-json\/wp\/v2\/media?parent=298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}