Business Continuity and Disaster Recovery: Data Backup Importance

Verified

Added on  2020/04/21

|5
|881
|137
Report
AI Summary
This report delves into the critical importance of data backup and security within the context of business continuity and disaster recovery. It emphasizes the need for securing backup files and media, highlighting various methods to protect data from unauthorized access, use, disclosure, and destruction. The report underscores the significance of off-site storage for backups, ensuring accessibility and preservation of data. It discusses the steps required to enhance security and operational efficiency, including securing storage devices, labeling backup media, and implementing robust data access and recovery strategies. The conclusion reinforces the necessity of addressing secure media management within security policies and adhering to established procedures for data protection.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: BUSINESS CONTINUITY AND DISASTER RECOVERY
Business Continuity and Disaster Recovery
Name of the Student:
Name of the University:
Author Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
2BUSINESS CONTINUITY AND DISASTER RECOVERY
Table of Contents
Introduction......................................................................................................................................2
Importance of storing backup files and media.................................................................................2
Conclusion.......................................................................................................................................3
Reference List..................................................................................................................................4
Document Page
3BUSINESS CONTINUITY AND DISASTER RECOVERY
Introduction
This study deals with understanding the importance of securing backups and importance
of storing the same. Secondary data had been used in the study from reliable sources like peer-
reviewed journals, books and websites. It is essential to secure the backup media files and using
variety of options explained in this segment (Kumar et al., 2017). The off-site storage of backups
is even explained in the study to make the study easier to understand.
Importance of storing backup files and media
Data security means effective ways to protect data from any of the unauthorized access,
use as well as disclosure and destruction that takes into account network security, file security
and physical security. Storage of backup files and media is extremely important in secured
location that can be easily being accessible (Hassan, Michael & Mrutu, 2015). Data backup
means saving of additional copies in separate locations from data files in storage places.
Here, backup media refers to specialized as well as focused security controls. In order to
achieve the goals, business enterprise needs to build a practice around different areas such as
assigning accountability, authority and responsibility. It even assesses risk as well as develop a
data protection process and communication the process or executing the process in the most
effective way (Allu et al., 2017).
There are various steps that need to be taken for enhancing the level of security and
operation to the back-up and restored files and the steps required to be followed for securing the
backup media (Cahyani et al., 2017). In order to form the backup plan, it is needed to implement
the methods such as securing storage device as well as backup media. In addition, data from the
Document Page
4BUSINESS CONTINUITY AND DISASTER RECOVERY
stolen media need to be accessed as well as restored to other server. Furthermore, it is important
for restoring the entire volume of one operation.
As far as offsite storage of backup is concerned, it needs proper data access from any
location either through internet or FTP. In addition, the storage data need to be preserved for an
event within the business operations. By this, the backup data can be easily shared from various
remote locations.
Backup media need to be distinctly labeled as it helps in defining the content stored in an
effective way. Once the backup media is labeled properly, it will be useful for lifetime and stored
data at a lower classification level (Allu et al., 2017). It is mostly possible always to recover the
data even if the files are deleted with the help of magnetic devices as well as media. Therefore,
the media need to be treated as same ways or greater when it comes to security protection
warranted by the types of data it actually holds.
Conclusion
At the end of the study, it is concluded that securing the data at locations are important so
that none of the saved information are stolen in worst cases. In addition, secure media
management need to be addressed or mentioned in the security policy as well as exact
procedures need to be followed in the defined standards, documentation and guidelines.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
5BUSINESS CONTINUITY AND DISASTER RECOVERY
Reference List
Allu, Y., Douglis, F., Kamat, M., Shilane, P., Patterson, H., & Zhu, B. (2017). Backup to the
Future: How Workload and Hardware Changes Continually Redefine Data Domain File
Systems. Computer, 50(7), 64-72. (Accessed from:
http://ieeexplore.ieee.org/abstract/document/7971884/)
Cahyani, N. D. W., Ab Rahman, N. H., Glisson, W. B., & Choo, K. K. R. (2017). The role of
mobile forensics in terrorism investigations involving the use of cloud storage service and
communication apps. Mobile Networks and Applications, 22(2), 240-254. (Accessed
from: https://link.springer.com/article/10.1007/s11036-016-0791-8)
Hassan, K., Michael, K., & Mrutu, S. I. (2015). Forward Error Correction for Storage Media: An
Overview. International Journal of Computer Science and Information Security, 13(12),
32. (Accessed from:
https://search.proquest.com/info/openurldocerror;jsessionid=6B1F353C98E9A9D382428
B96204812C0.i-03e6a9200156884f3)
Kumar, V. A., Kumar, V. A., Divakar, H., & Gokul, R. (2017, August). Cloud enabled media
streaming using Amazon Web Services. In Smart Technologies and Management for
Computing, Communication, Controls, Energy and Materials (ICSTM), 2017 IEEE
International Conference on (pp. 195-198). IEEE. (Accessed from:
http://ieeexplore.ieee.org/abstract/document/8089150/)
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]