大象传媒

Cyberspace, network security and data transfer - CCEABackups

Networks make computers more powerful, but also more vulnerable to attack. In the era of the internet and cloud computing, what are the threats to data security?

Part of Digital Technology (CCEA)Digital technology (compulsory)

Backups

Backup software will backup files on a network server at regular set intervals. This can be backups to other hard disks () or, increasingly, servers on the internet (cloud backup).

RAID (Redundant Array of Inexpensive Disks)

When RAID is employed as a backup strategy, several exact copies of the data transactions (known as mirror images) are created on different disks. All data transactions are recorded on all copies simultaneously.

The mirror images are stored in secure and separate locations. If the system fails, there can be an instant switchover to one of the backup copies.

Grandfather, Father, Son

Data transactions are backed up daily (son), weekly (father) and monthly (grandfather), with the oldest from each set aside.

The daily (or son), backups are saved every night for a week until there are seven 'sons'. At the end of the week, the oldest 'son' will be set aside and known as a 'father'.

Every week a new 'father' is created. At the end of the month when there are four 'fathers', the oldest 'father' is set aside as a 'grandfather' backup.

12 'grandfather' backups will be stored each year.

Further copies should be kept off site, in a secure fireproof location.

Cloud backup

Companies are increasingly using cloud services to backup data. Infrastructure as a Service (IaaS) companies provide online data storage for businesses. IaaS removes the need for organisations to have their own backups 鈥 they can simply download their data when required. Companies generally lease these services from providers of Infrastructure as a Service.

Restoring backups

Backup software also needs to be able to restore the information. When everything on a hard disk is backed up this is known as a . This takes a long time, so it is possible to back up only data which has changed since the previous backup. This is known as an .

After a system failure, data must be restored from a backup, copying it back onto the computer system. Network managers can use auditing software to determine the exact time of the loss and use the backup files to restore the system to that point in time.

If hardware has been destroyed or has stopped working, then data must be restored onto new hardware.

Firewalls

A protects a network from intruders by controlling what data can and cannot pass through. A firewall can be hardware or software.

A firewall can use packet inspection to open each network packet and read the data inside. If it finds the signature of a virus inside, then it can remove or prevent the packet entering the network. This is known as packet filtering.

It is possible to filter packets using a particular and port, for example the protocol used to transfer web pages works on port 80. Firewalls can be used to block particular , in this case to prevent users downloading web pages.