Data Backup and Off-Site Storage: Security Procedures Analysis Report

Verified

Added on  2021/04/17

|5
|672
|160
Report
AI Summary
This report delves into the critical aspects of data backup and off-site storage, highlighting the importance of robust security procedures. It emphasizes the need for a comprehensive security policy that integrates storage security into the overall system, ensuring efficient data management. The report underscores the significance of identifying sensitive data and maintaining multiple copies for data protection. Furthermore, it explores the advantages of off-site storage over standard backup processes, including enhanced security and remote accessibility. The analysis covers various data security measures, including encryption, and discusses the benefits of cloud storage while acknowledging potential security flaws. Overall, the report emphasizes the necessity of data security for businesses and outlines streamlined backup processes to ensure effective data recovery and system resilience. This document provides valuable insights into best practices for safeguarding valuable data assets.
Document Page
Running head: DATA BACKUP AND OFF-SITE STORAGE
DATA BACKUP AND OFF-SITE STORAGE
Name of the student:
Name of the university:
Author note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
DATA BACKUP AND OFF-SITE STORAGE
1. Procedure to secure backup media:
The practice of data backup plays an important role in making a good security statement
for the media storage. However, they often leads to the security issues. A major portion of of the
security attacks take place due to improper data management and data handling (VonSolms and
Von Solms 2018). In order to make a strong security feature, following are some well recognized
practices:
1.1 Making storage security as a function of overall security policy:
It is important that the process of storage security applies to the overall security system to
ensure better result in terms of efficiency and security. It is not sufficient to held the storage team
responsible completely to maintain storage security, any methods applicable to storage or data
security must be integrated properly ( VonSolms and Von Solms 2018).
1.2 Identification of sensitive data:
Without proper understanding of the nature of the data it is not possible to draft effective
security plan. In the context of organizational uses , data gets duplicated throughout the network
over the thousands of connected devices and to protect sensitive data it is necessary to keep
track of the path through which data travels throughout the network (Sarhan 2015).
1.3 Multiple copy of important data:
No matter how efficient the data backup technology is, it is never possible to predict the
strength and nature of the attack intended to carry out data breaches. To manage data efficiently
Document Page
2
DATA BACKUP AND OFF-SITE STORAGE
it is recommended to keep multiple backup of data to be on the safer side (Terzi ,Terzi and
Sagiroglu 2015).
Off-site storage of data:
The process of off-site storage plays an important role in making strong data backup. It is
more secured than the standard backup process as it cannot be located physically within the
organizational network infrastructure (Azimet al. 2016). Off-site data storage has some
advantages over online data storage like:
Data access from remote place
Secure encryption algorithm
Multiple data sharing with remote storage
Feedback
Madhur’ writing
Why data security is important has been discussed along with basic approaches of data
security. How malwares can affect the data and how it can be recovered is discussed. The types
of data and which can be the potential threats has been discussed. The ways how data can be
protected by encryption has been discussed. The usefulness of cloud storage for data backup is
written but the potential security flaws has not been mentioned. Why data security is essential for
business has been mentioned. . The backup process stream lined on the specific data and the
Document Page
3
DATA BACKUP AND OFF-SITE STORAGE
second approach is the simplest and trusted to recover from failure in system has been discussed
well.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
DATA BACKUP AND OFF-SITE STORAGE
References:
Azim, N., Qureshi, Y., Khan, F., Tahir, M., Jan, S.R. and Majid, A., 2016. Offsite One Way Data
Replication towards Improving Data Refresh Performance. International Journal of Computer
Science Trends and Technology, ISSN, pp.2347-8578.
Sarhan, A., 2015. Protection of Sensitive Data in Clouds Using Active Privacy Bundles and
Agent-based Multi-Party Computation
Terzi, D.S., Terzi, R. and Sagiroglu, S., 2015, December. A survey on security and privacy
issues in big data. In Internet Technology and Secured Transactions (ICITST), 2015 10th
International Conference for (pp. 202-207). IEEE
Von Solms, B. and von Solms, R., 2018. Cyber security and information security–what goes
where?.Information & Computer Security, (just-accepted), pp.00-00.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]