Backup and Recovery Methods and Procedures

25
APIIT Sri Lanka Sahan Munasinghe (CB003824) 1 Introduction Data protection is crucial for protecting your business's continuity. If your only data  backup is on a computer, and the hard disk fails or is damaged by a power surge, your business data is gone. And having paper copies of business data isn't adequate data protection; what if your business premises burn to the ground or experience severe flooding? Once again the data you need to carry on your business could be irretrievably lost. According to About (2010) ³for adequate data protection, you need to establish a data backup system that follows these three steps:  archive business data regularly  create data backups on reliable media  keep updated data backups in a secure, off-site location.´ The basic rule for business data protection is that if losing the data will interfere with doing  business, back it up. You can reinstall software programs if you need to, but recovering the details of transactions or business correspondence is impossible if those files are lost or damaged  beyond repair.

Transcript of Backup and Recovery Methods and Procedures

Page 1: Backup and Recovery Methods and Procedures

8/4/2019 Backup and Recovery Methods and Procedures

http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 1/25

APIIT Sri Lanka

Sahan Munasinghe (CB003824)

1  Introduction

Data protection is crucial for protecting your business's continuity. If your only data

 backup is on a computer, and the hard disk fails or is damaged by a power surge, your business

data is gone. And having paper copies of business data isn't adequate data protection; what if 

your business premises burn to the ground or experience severe flooding? Once again the data

you need to carry on your business could be irretrievably lost.

According to About (2010) ³for adequate data protection, you need to establish a data backupsystem that follows these three steps:

  archive business data regularly

  create data backups on reliable media

  keep updated data backups in a secure, off-site location.´

The basic rule for business data protection is that if losing the data will interfere with doing

  business, back it up. You can reinstall software programs if you need to, but recovering the

details of transactions or business correspondence is impossible if those files are lost or damaged

 beyond repair.

Page 2: Backup and Recovery Methods and Procedures

8/4/2019 Backup and Recovery Methods and Procedures

http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 2/25

APIIT Sri Lanka

Sahan Munasinghe (CB003824)

2  Backup and Recovery means

According to Oracle (2010) ³a backup is a copy of data from your database that can be

used to reconstruct that data. Backups can be divided into physical backups and logical backups.

2.1 Physical backups

According to Usenix (2010) Physical backups are backups of the physical files used in

storing and recovering your database, such as datafiles, control files, and archived redo logs.

Ultimately, every physical backup is a copy of files storing database information to some other 

location

2.2 Logical backups 

According to Pcmag (2010) Logical backups contain logical data (for example, tables or 

stored procedures) exported from a database´

Physical backups are the foundation of any sound backup and recovery strategy. Logical

  backups are a useful supplement to physical backups in many circumstances but are not

sufficient protection against data loss without physical backups.

3  Important of Backup

Backup in general provides companies who rely heavily on business critical data the ability

to have multiple copies of their data. The first step of backup is the safeguarding of valuable

 business information by copying that data. But copying pertinent business data is only one part

of this safeguarding process. The following components form a backup strategy with all of them

 playing important roles. After data is copied, it must be safely transported to another location.

  Next, the data must be stored in a secure facility. Finally, the valuable information must be

available to be recovered for use in case of data loss. (Findarticles, 2010)

Page 3: Backup and Recovery Methods and Procedures

8/4/2019 Backup and Recovery Methods and Procedures

http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 3/25

APIIT Sri Lanka

Sahan Munasinghe (CB003824)

Disaster-Resource (2010) states ³Failure in any of these 4 steps of the process can result in

disaster.

  Copying/Replication

  Transportation

  Storage

  Recovery

According to Sigops (2009)software and hardware failurecan be divided into five main groups:

  Program errors

Device drivers can create errors with a computer¶s performance for a number of unrelatedreasons. (Gnu,2010) 

  Administrator (human) errors

Human error is an imbalance between what the situation requires, what the person

intends, and what he/she does. (Ohsah, 2010)

  Computer failures (system crash)

System crash is a condition in which a computer program stops performing as expected

and also stops responding to other parts of the system. Linfom, 2008)

  Disk failures

In computing, a hard disk failureoccurs when a hard disk drive malfunctions and the

stored information cannot be accessed with a properly configured computer. A disk 

failure may occur in the course of normal operation, or due to an external factor such as

exposure to fire or water or high magnetic waves, or suffering a sharp impact, which can

lead to a head crash. (Sensagent, 2010)

  Catastrophes (fire, earthquake) or theft 

Page 4: Backup and Recovery Methods and Procedures

8/4/2019 Backup and Recovery Methods and Procedures

http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 4/25

APIIT Sri Lanka

Sahan Munasinghe (CB003824)

4  The bad side of losing Data 

At present most of business manage their day today business activities through computers.

Guess what how much of your work has been saved in the form of little magnetized bits spread

 pout across a binch of spinning platters.

In the business environment the lost of data is very tangible and quantifiable in monetary terms.

Lost Customers ± Business can lose their customer details.

Orders ±Tracked orders cannot be re-implemented due to lack of data.

Morale ± Employees get feels of helplessness due to lack of inefficient data they got.

5  Backup devices and media 

You need some media to store the backups. It is preferable to use removable media, to

store the backups away from the computer and to get "unlimited" storage for backups.

Matching the capacity of the backup medium to the amount of data you intend to backup is very

important, especially as hard disks capacities grow. The more disk or tape swaps required to

 perform a backup, the less likely it is that you will do it routinely. ideally, the whole backup will

fit on one tape or disk so that you can leave it to run and do something else. You don't need to

 back up the whole hard disk every time, so a backup media that can hold most of it will usually

suffice. (easeus-backup, 2010)

Page 5: Backup and Recovery Methods and Procedures

8/4/2019 Backup and Recovery Methods and Procedures

http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 5/25

APIIT Sri Lanka

Sahan Munasinghe (CB003824)

6  Backup Storage Medias

6.1 Magnetic Tape

According to businessdictionary (2010) ribbon of plastic coated with magnetic material

(such as ferric oxide) and available in several standard widths (half-inch being the most

common) usually in cassettes. Used in audio, video, and datastorage (primarily for backup), it

  provides only sequential (serial) data access unlike magnetic and optical disks which provide

random access

Source: (ziffdavisinternet.com, 2007)

Page 6: Backup and Recovery Methods and Procedures

8/4/2019 Backup and Recovery Methods and Procedures

http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 6/25

APIIT Sri Lanka

Sahan Munasinghe (CB003824)

Advantages Disadvantages

Reliability - Because it's in use only during a 

backup or recovery operation, tape tends to

be f airly reliable compared to hard drives

(which always spin, even when they're not in

use). 

Expense - Although once touted as being the

most economical backup method per gigabyte

of data, tape drives and media are now

considerably more expensive than hard drives

or network backup.

Power savings - For the same reason, tape

drives also use less power. 

Tape degradation - Magnetic media is subject

to degradation due to heat, humidity, dust,

mishandling, electromagnetic forces, and

ordinary wear.

Ease of storage. Tape cartridges typically are

small  and can be easily stored off-site,

allowing data to survive even if the

computer itself is destroyed or stolen. 

Uncertainty of data integrity. Unless a full

verification of each backup is performed

(which takes as long as the backup itself),

there's no way to know for sure whether your 

 backup is reliable.

Ease of use. There's a lot of support for tape

drives, and a lot of good software that make

restoring a computer from tape a 

reasonably painless procedure. 

Cumbersome for non-full restores. Tapes are

sequential-access devices, and are best suited

for full-system restores. Finding and restoring

individual documents can be a long, slow, and

cumbersome process.

Source: (Authors Work based on Backupnut,2010)

Page 7: Backup and Recovery Methods and Procedures

8/4/2019 Backup and Recovery Methods and Procedures

http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 7/25

APIIT Sri Lanka

Sahan Munasinghe (CB003824)

6.2 External hard drives for data backups

Techterms (2010) states The hard disk is a spindle of magnetic disks, called platters, that

record and store information. Because the data is stored magnetically, information recorded to

the hard disk remains intact after you turn your computer off.

Hard drives are getting cheaper and cheaper, making them an attractive option to use as

 backup media. Readily available in very high capacities they are an ideal backup solution for the

home or small office. For smaller backup needs, many users carry a USB flash drive or pen

drive. These are easier to carry around but have more limited storage capacities.

More expensive portable hard drive enclosures include not one but two or more physical hard

drives. The second drive can be configured to automatically copy the contents of the first drive,

meaning that your data is safe even if one of the drives fail. This technology is called RAID and

is very useful for protecting highly important data. However, since any data stored or deleted on

a RAID array will be immediately changed on all disks in the array.

Advantages:- 

  Fast recording times, very large capacities available.

Disadvantages:- 

  More expensive than DVD backups, cannot make multiple backups for off-site storage

without investing in extra drives.

Page 8: Backup and Recovery Methods and Procedures

8/4/2019 Backup and Recovery Methods and Procedures

http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 8/25

APIIT Sri Lanka

Sahan Munasinghe (CB003824)

6.3 Optical storage

According to techtarget (2010) an optical disc is an electronic data storage medium that

can be written to and read using a low-powered laser beam, stored data as micron-wide dots of 

light and dark. A laser read the dots, and the data was converted to an electrical signal, and

finally to audio or visual output.

Advantages Disadvantages

Durability - With proper care, optical media

can last a long time, depending on what kind of 

optical media you choose.

Reusable - The write-once read-many

(WORM) characteristic of some optical media

makes it excellent for archiving, but it also

 prevents you from being able to use that media

again.

Great for archiving - Several forms of optical

media are write-once read-many, which means

that when data is written to them, they cannot

  be reused. This is excellent for archiving

 because data is preserved permanently with no

 possibility of being overwritten.

Writing time -The server uses software

compression to write compressed data to your 

optical media. This process takes considerable

 processing unit resources and may increase the

time needed to write and restore that data.

Transportability - Optical media are widely

used on other platforms, including the PC. For 

example, data written on a DVD-RAM can be

read on a PC or any other system with an

optical device and the same file system.

R andom access - Optical media provide the

capability to pinpoint a particular piece of data

stored on it, independent of the other data on

the volume or the order in which that data was

stored on the volume.

Source: (Authors Work based on Backupnut,2010)

Page 9: Backup and Recovery Methods and Procedures

8/4/2019 Backup and Recovery Methods and Procedures

http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 9/25

APIIT Sri Lanka

Sahan Munasinghe (CB003824)

6.4 Remote backup service/Remote backup

Crcivr (2010) states online backup is the process of backing up computer data to a remote

location via IP-WAN. Online backup, also known as televaulting, is used as part of a disaster 

recovery strategy to protect information system data. In the event of data loss due to natural

disasters, hardware failure or human error, data stored offsite at a remote data center facility can

  be used to restore systems to the most recent working configuration. In online backup, files,

folders, media or disk images are copied directly to disk-based storage at a remote data center 

facility.

Advantages:-

  Virtually unlimited backup capacities available, backup process can be fully automated,

 backup is stored off-site, meaning your data is safe even in the event of theft or fire.

Disadvantages:-

    No way to access your data if your internet connection fails (until connectivity is

restored), can be expensive especially where large amounts of data are stored and

transferred. Creating and restoring backups is very slow compared to other backup media,

even with a very fast internet connection.

Page 10: Backup and Recovery Methods and Procedures

8/4/2019 Backup and Recovery Methods and Procedures

http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 10/25

APIIT Sri Lanka

Sahan Munasinghe (CB003824)

7 Backup Methods

7.1 Full backup 

According to backup4all (2010) full backup is the starting point for all other backups and

contains all the data in the folders and files that are selected to be backed up. Because the full

  backup stores all files and folders, frequent full backups result in faster and simpler restore

operations. Remember that when you choose other backup types, restore jobs may take longer.

It would be ideal to make full backups all the time, because they are the most

comprehensive and are self-contained. However, the amount of time it takes to run full backups

often prevents us from using this backup type. Full backups are often restricted to a weekly or 

monthly schedule, although the increasing speed and capacity of backup media is making

overnight full backups a more realistic proposition.

Advantages:

  Restore is the fastest

  All files from the selected drives and folders are backed up to one backup set.

  In the event you need to restore files, they are easily restored from the single backup set.

Disadvantages:

  Backing up is the slowest

  Full backups require more disk, tape, or network drive space.

Page 11: Backup and Recovery Methods and Procedures

8/4/2019 Backup and Recovery Methods and Procedures

http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 11/25

APIIT Sri Lanka

Sahan Munasinghe (CB003824)

7.2 Differential backup

Backup4all (2010) States there is a significant, but sometimes confusing, distinction

 between differential backupand incremental backup. Whereas incremental backs up all the files

modified since the last full backup, differential or incremental backup, differential backup offers

a middle ground by backing up all the files that have changed since the last full backup . That is

where it gets its name: it backs up everything that's different since the last full backup. 

Advantages:

  Restore is faster than restoring from incremental backup

 Backing up is faster than a full backup

  The storage space requirements are lower than for full backup

Disadvantages:

  Restore is slower than restoring from full backup

  Backing up is slower than incremental backup

  The storage space requirements are higher than for incremental backup

Page 12: Backup and Recovery Methods and Procedures

8/4/2019 Backup and Recovery Methods and Procedures

http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 12/25

APIIT Sri Lanka

Sahan Munasinghe (CB003824)

7.3Incremental backup

Backup4all (2010) States Incremental backup provides a faster method of backing up data than

repeatedly running full backups. During an incremental backup only the files changed since the

most recent backup are included. That is where it gets its name: each backup is anincrement

since the most recent backup.

Advantages:

  Backing up is the fastest

  The storage space requirements are the lowest

Disadvantages:

  Restore is the slowest

7.4 Mirror backup 

According to backup4all (2010) a mirror backup is a straight copy of the selected folders

and files at a given instant in time. Mirror backup is the fastest backup method because it copies

files and folders to the destination without any compression . However, the increased speed has

its drawbacks: it needs larger storage space and it cannot be password protected.

While the other backup types collect all the files and folders being backed up each time into a

single compressed "container file", a mirror backup keeps all the individual files separate in the

destination. That is, the destination becomes a "mirror" of the source.

Page 13: Backup and Recovery Methods and Procedures

8/4/2019 Backup and Recovery Methods and Procedures

http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 13/25

APIIT Sri Lanka

Sahan Munasinghe (CB003824)

Advantages:

1.  The fastest backup type, especially in conjunction with the "Fast mirror" option

2.  It creates a snapshot of selected files and folders in the destination which you can browse

and access later without needing to run Backup4all

Disadvantages:

1.  It needs more storage space than any other backup type

2.  Password protection is not possible

3.  Cannot track different versions of files

7.4 Snapshot Backups 

Techtarget (2010) states a storage snapshot is a set of reference markers, or pointers, to

data stored on a disk drive, on a tape, or in a storage area network (SAN). A snapshot is

something like a detailed table of contents, but it is treated by the computer as a complete data

 backup. Snapshots streamline access to stored data and can speed up the process of data

recovery. There are two main types of storage snapshot, called the copy-on-write (or low-

capacity) snapshot and the split-mirror snapshot. Utilities are available that can automatically

generate either type.

Page 14: Backup and Recovery Methods and Procedures

8/4/2019 Backup and Recovery Methods and Procedures

http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 14/25

APIIT Sri Lanka

Sahan Munasinghe (CB003824)

7.5 Online Versus Off line Backups 

According to brighthub (2010) online data backup is just as the name implies. Data is

 backed up over a networked connection (most likely using the TCP/IP standard protocol of the

Internet to a remote location (ideally). An offline data backup most often refers to data that is

 backed up on-site, rather than to a remote location as mentioned above. The offline method will

require some type of on-site hardware and media such as digital tape drives or CD/DVD burners.

the offline data backup method may be the better option for you if you're concerned about

transmitting sensitive data (albeit, encrypted data) over public internet pathways.

Online backup methods have these characteristics:

y  The backup is less intrusive to other clients, which can connect to the database

management software during the backup and may be able to access data depending on

what operations they need to perform.

y  Care must be taken to impose appropriate locking so that data modifications do not take

 place that would compromise backup integrity.

Offline backup methods have these characteristics:

y  Clients can be affected adversely because the server is unavailable during backup.

y  The backup procedure is simpler because there is no possibility of interference from

client activity.

A similar distinction between online and offline applies for recovery operations, and similar 

characteristics apply. However, it is more likely that clients will be affected for online recoverythan for online backup because recovery requires stronger locking. During backup, clients might

 be able to read data while it is being backed up. Recovery modifies data and does not just read it,

so clients must be prevented from accessing data while it is being restored.

Page 15: Backup and Recovery Methods and Procedures

8/4/2019 Backup and Recovery Methods and Procedures

http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 15/25

APIIT Sri Lanka

Sahan Munasinghe (CB003824)

8 Recovery Models

8.1 Full Recovery 

According to Performance (2010) all operations are written to the transaction log.

Therefore, this model provides complete protection against media failure. This means that you

can restore your database up to the last committed transaction that is stored in the log file.

Additionally, data can be recovered to any point in time (prior to the point of failure). To

guarantee this, such operations as select into and the execution of the utility are fully logged, too.

Besides point-in-time recovery, the full recovery model allows you also to recover to a log mark.

Log marks correspond to a specific transaction and are inserted only if the transaction commits.

8.2 Bulk-Logged Recovery

Performance (2010) states ³Bulk-logged recovery supports log backups by using minimal space

in the transaction log for certain large-scale or bulk operations. The logging of the following

operations is minimal and cannot be controlled on an operation-by-operation basis:

  Select into

  Create index (including indexed views)

  Utility and bulk insert

  Write text and update text

Although bulk operations are not fully logged, you do not have to perform a full database backup

after the completion of such an operation. During bulk-logged recovery, transaction log backups

contain both the log as well as the results of a bulk operation. This simplifies the transition

 between full and bulk-logged recovery models´.

Page 16: Backup and Recovery Methods and Procedures

8/4/2019 Backup and Recovery Methods and Procedures

http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 16/25

APIIT Sri Lanka

Sahan Munasinghe (CB003824)

8.3 Simple Recovery

According to Performance (2010) In the simple recovery model, the transaction log is not

used to protect your database against any media failure. Therefore, you can recover a damaged

database only using full database or differential backup. Backup strategy for this model is very

simple: Restore the database using existing database backups and, if differential backups exist,

apply the most recent one.

The advantages of the simple recovery model are that the performance of all bulk operations is

very high and requirements for the log space very small.

Page 17: Backup and Recovery Methods and Procedures

8/4/2019 Backup and Recovery Methods and Procedures

http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 17/25

APIIT Sri Lanka

Sahan Munasinghe (CB003824)

9 Backup Policy

According to businessdictionary (2010)Planned approach to data protection that assigns the

backup responsibilities to the appropriate personnel or departments, and sets the duplication time

cycles. 

The backup policy can create by stick to the following points,

Backup Procedure

Backup procedure encompasses several main points what data you back up, using what

method(s), how often, and to what media. Each one of these matters involves a number of 

decisions. (Inc, 2010)

What Data Should Back Up?

This is the most important things your backup policy should state. Identify what data you want to

 backup its saves time it takes for each backup to run, as well as the amount of storage space

needed-not to mention network congestion.(Pcnineoneone, 2010)

What Is Your Backup Method?

Author referring to full versus incremental or differential backups. (Although "incremental" and

"differential" mean different things to different people, one common usage is for a differential

  backup to contain all the data that changed since the last full backup, while an incremental

 backup contains only the data that changed since the last update. Incremental backups run faster 

  because they contain less data, but differential backups may be easier and quicker to restore,

especially if you use tape drives.) Your policy should state under which circumstances one

method or another is used. For example, you might specify that a full backup occurs once a

month with incremental backups twice a day and differential backups once a week. If the

method is different for servers than it is for workstations, say what those differences

are.(Backupschedule, 2010)

Page 18: Backup and Recovery Methods and Procedures

8/4/2019 Backup and Recovery Methods and Procedures

http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 18/25

APIIT Sri Lanka

Sahan Munasinghe (CB003824)

How Are Backups Scheduled?

In this schedule state how frequently backups run, whether that's several times a day, a couple of 

times per week, or whatever. This schedule should least impact on users' work.(S pamlaws, 2010)

What Media Do You Use?

In most large organizations, high-capacity tape drives of one sort or another are taken for granted

as a backup medium, often with an automated loading and retrieval system. That may indeed be

the best choice for your business, but it's not the only option. In particular, given the rapidly

rising capacities and falling prices of hard drives, you may find that some sort of hard drive array

is just as economical, while providing much faster performance, especially for restoring files.

Your written backup policy can perhaps be worded in a generic way to accommodate potential

changes in the media you use, but think through the implications carefully. (Hddoctor, 2010)

Media Management

This area state how your physical backup media is handled. This includes rotating among

multiple sets of media, recycling, replacing, or destroying old media, storing backup¶s offsite and

keeping your backup media encrypted.(Symantec, 2010)

Rotating Media 

All backup media is subject to failure-for any number of reasons. A smart backup policy assumes

that a certain percentage of media will fail much sooner than it should. The usual way to deal

with this unfortunate fact of life is with redundancy: have two, three, or more copies of each

 backup and rotate them on a regular basis.(Computerworld, 2010)

Page 19: Backup and Recovery Methods and Procedures

8/4/2019 Backup and Recovery Methods and Procedures

http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 19/25

APIIT Sri Lanka

Sahan Munasinghe (CB003824)

Dealing with Used Media 

Backup data is bound to exceed your media's capacity eventually. In any case, your backup

 policy should specify exactly what happens when a storage device fills up. You have a few main

choices:

  Recycle: Erase the media and record over it.

  Store: Hang onto the full media.

  Destroy: Ditch the old media in a way that prevents anyone else from reading your 

 backups.

If you choose "store" or "destroy," you'll start over with new, blank media. Regardless of your 

choice, list the details. If you recycle media, how many times will you do that before storing or 

destroying it? Do you replace an entire set of media all at once (generally a good idea) or by the

individual piece? How long will you store old media, and where? If and when you destroy old

media, how will you do so securely?(Microsoft, 2010) 

Offsite Storage

It's all well and good to keep backup media in a fireproof safe or other secure location onsite, but

you must also have at least one copy (and preferably more than one) stored in another building.

As unlikely as it may be, something could happen-theft, espionage, earthquake, terrorist attack,

whatever-that destroys all your backups if they're kept in a single location. Don't take any

chances. You already specified that you have more than one set of media in rotation, so designate

a safe offsite location to store media that's not actively in use.(Crcsecure, 2010)

Data Restoration

Backups are of no use whatsoever if you can't restore your data when you need it. Unfortunately,

restoration is usually the part of a backup policy that gets the least attention. Give careful thought

on this.(Emaglink, 2010)

Page 20: Backup and Recovery Methods and Procedures

8/4/2019 Backup and Recovery Methods and Procedures

http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 20/25

APIIT Sri Lanka

Sahan Munasinghe (CB003824)

Who Can Restore Files?

In most business situations, only an IT person can restore backed-up files, since they reside on a

secure server and since it would be all too easy for a user to mistakenly overwrite good files with

 backups.

What Is the Procedure for Restoring Files?

Assuming your users have to go to the IT staff to get files restored, exactly what is the process-

make a phone call? Fill out a form on the intranet? Send an email? What if the user doesn't know

the exact file name, date, or location? Is there a different procedure if a whole drive or user 

folder has to be restored? S pell out, in simple end-user terms, what someone has to do to get

  back data that's in the backup archives somewhere. And, if you have a system that lets users

restore their own files, point them to a step-by-step guide on a Web page somewhere for how to

do this.

How Is Data Integrity Verified?

You can't assume that your backups are perfectly and indefinitely intact, just because your 

 backup software didn't report any errors. Stuff happens. Make it an explicit part of your backup

  policy to test backups on a regular basis. When I say "test," again, I don't merely mean run

through a verification procedure with your backup software. I mean actually restore files. Ideally,

you should at least spot-check a few random files on each piece of physical media once every

month or two.(Handybackup, 2010)

Page 21: Backup and Recovery Methods and Procedures

8/4/2019 Backup and Recovery Methods and Procedures

http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 21/25

APIIT Sri Lanka

Sahan Munasinghe (CB003824)

Responsibility

Even though you've already specified where people go when they need to have files restored,

your policy should also indicate other responsible parties. Who has physical access to the backup

media? Who knows the pass phrase for encrypted backups? Who makes the policy decisions?

These might be titles or positions rather than individual names, but either way, make it clear.

Page 22: Backup and Recovery Methods and Procedures

8/4/2019 Backup and Recovery Methods and Procedures

http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 22/25

APIIT Sri Lanka

Sahan Munasinghe (CB003824)

10 References

Oracle cooperate website, (2010), ³Backup´, [Online] Available from:

http://download.oracle.com/docs/cd/B19306_01/backup.102/b14192/intro001.html[Accessed on1stSeptember 2010]

Disaster-Resource website, (2010), ³Failure´, [Online] Available from: http://www.disaster-

resource.com/articles/05p_094.html[Accessed on 1st September 2010]

Sigops website, (2010), ³Hardware and Software Failure´, [Online] Available from:

http://www.sigops.org/sosp/sosp09/papers/kadav-sosp09.pdf [Accessed on 2nd September 2010]

About website, (2010), ³Databackup´, [Online] Available from:

http://sbinfocanada.about.com/cs/management/a/databackup.htm[Accessed on 1st September 

2010]

Businessdictionary website, (2010), ³Magnetic Tape´, [Online] Available from:

http://www.businessdictionary.com/definition/magnetic-tape.html[Accessed on 2nd September 

2010]

ziffdavisinternet website, (2007), ³Magnetic Tape´, [Online] Available from:

http://common.ziffdavisinternet.com/encyclopedia_images/MAGTAPE.GIF[Accessed on 2nd

September 2010]

Techterms website, (2007), ³Harddisk´, [Online] Available from:

http://www.techterms.com/definition/harddisk [Accessed on 2nd September 2010]

Techtarget website, (2007), ³Optical storage´, [Online] Available from:

http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci811276,00.html[Accessed on 2nd

September 2010]

Crcivr website, (2007), ³Online Backup´, [Online] Available from:

http://www.crcivr.com/online_backup.asp[Accessed on 3rd September 2010]

Backup4all website, (2010), ³Full Backup´, [Online] Available from:

http://www.backup4all.com/kb/full-backup-116.html[Accessed on 3rd September 2010]

Page 23: Backup and Recovery Methods and Procedures

8/4/2019 Backup and Recovery Methods and Procedures

http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 23/25

APIIT Sri Lanka

Sahan Munasinghe (CB003824)

Backup4all website, (2010), ³Incremental Backup´, [Online] Available from:

http://www.backup4all.com/kb/incremental-backup-118.html[Accessed on 3rd September 2010]

Backup4all website, (2010), ³Differential Backup´, [Online] Available from:http://www.backup4all.com/kb/differential-backup-117.html [Accessed on 3rd September 2010]

Techtarget website, (2010), ³Differential Backup´, [Online] Available from:

http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci1008820,00.html [Accessed on 3rd

September 2010]

Performance website, (2010), ³Database Recovery Models´, [Online] Available from:

http://www.sql-server-

 performance.com/articles/dba/Database_Recovery_Models_in_ SQL_ Server_p1.aspx [Accessed

on 3rd September 2010]

Businessdictionary, (2010), ³Backup Strategy´, [Online] Available from:

http://www.businessdictionary.com/definition/backup-strategy.html [Accessed on 4th September 

2010]

Usenix, (2010), ³Physical Backup´, [Online] Available from:

http://www.usenix.org/events/osdi99/full_papers/hutchinson/hutchinson_html/node7.html 

[Accessed on 4th September 2010]

Pcmag, (2010), ³Logical Backup´, [Online] Available from:

http://www.pcmag.com/encyclopedia_term/0,2542,t=logical+backup&i=56801,00.asp [Accessed

on 4th September 2010]

Findarticles, (2010), ³Important of Backup´, [Online] Available from:

http://findarticles.com/p/articles/mi_m0BRZ/is_3_22/ai_11026267[Accessed on 4th September 

2010]

Page 24: Backup and Recovery Methods and Procedures

8/4/2019 Backup and Recovery Methods and Procedures

http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 24/25

APIIT Sri Lanka

Sahan Munasinghe (CB003824)

Findarticles, (2010), ³Copying/Replication´, [Online] Available from:

http://findarticles.com/p/articles/mi_m0BRZ/is_9_23/ai_109082339 [Accessed on 4th September 

2010]

Findarticles, (2010), ³Program Error´, [Online] Available from:

http://www.gnu.org/s/libc/manual/html_node/Program-Error-Signals.html[Accessed on 4thSeptember 2010]

Ohsah, (2010), ³Human Error´, [Online] Available from: http://www.ohsah.bc.ca/media/120-FS-

ToErr.pdf [Accessed on 4th September 2010]

Linfo, (2010), ³System Crash´, [Online] Available from: http://www.linfo.org/crash.html 

[Accessed on 4th September 2010]

Sensagent, (2010), ³Disk Failure´, [Online] Available from:

http://dictionary.sensagent.com/hard+disk+failure/en-en [Accessed on 4th September 2010]

Easeus-backup, (2010), ³Backup Devices and Media´, [Online] Available from:

http://www.easeus-backup.com/index.php/resources/Selecting-Backup-Devices-and-Media.html 

[Accessed on 4th September 2010]

Brighthub, (2010), ³Online Versus Offline Backups´, [Online] Availablefrom:http://www.brighthub.com/computing/smb-security/articles/14800.aspx[Accessed on 4thSeptember 2010] 

Inc, (2010), ³Backup Procedure´, [Online] Available from:

http://www.inc.com/articles/2000/03/18583.html[Accessed on 4th September 2010]

Pcnineoneone, (2010), ³What Data Should Back Up´, [Online] Available from:

http://www.pcnineoneone.com/howto/backup1.html [Accessed on 4th September 2010]

Backupschedule, (2010), ³What Is Your Backup Method´, [Online] Available from:

http://www.backupschedule.net/databackup/databackupmethods.html[Accessed on 4th

September 2010]

S pamlaws, (2010), ³How Are Backups Scheduled´, [Online] Available from:

http://www.spamlaws.com/backup-schedule.html[Accessed on 4th September 2010]

Hddoctor, (2010), ³What Media Do You Use´, [Online] Available from:

http://www.hddoctor.net/which-backup-media-should-you-use[Accessed on 4th September 

2010]

Symantec, (2010), ³Media Management´, [Online] Available from:

http://seer.entsupport.symantec.com/docs/275640.htm[Accessed on 4th September 2010]

Page 25: Backup and Recovery Methods and Procedures

8/4/2019 Backup and Recovery Methods and Procedures

http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 25/25

APIIT Sri Lanka

Sahan Munasinghe (CB003824)

Computerworld, (2010), ³Rotating Media´, [Online] Available from:

http://www.computerworld.com/s/article/266057/Rotate_Your_Backup_Media[Accessed on 4th

September 2010]

Microsoft, (2010), ³Dealing with Used Media´, [Online] Available from:

http://technet.microsoft.com/en-us/library/ms178062.aspx[Accessed on 4th September 2010]

Crcsecure, (2010), ³Offsite Storage´, [Online] Available from:

http://www.crcsecure.com/offsite_data_storage.asp[Accessed on 4th September 2010]

Emaglink, (2010), ³Data Restoration´, [Online] Available from: http://www.emaglink.com/data-

Restoration.htm[Accessed on 4th September 2010]

Handybackup, (2010), ³How Is Data Integrity Verified´, [Online] Available from:

http://www.handybackup.net/backup_articles/verify-backup.shtml[Accessed on 4th September 

2010]