Security Architecture: Backups Flashcards

1
Q

Onsite and offsite?

A

Onsite backups involve storing copies of critical data within the same physical location as the primary systems, offering quick accessibility and restoration. These backups are ideal for recovering from minor data losses or system crashes. However, they are susceptible to on-site disasters such as fires, floods, or hardware failures, which could lead to the loss of both primary data and backups.

Conversely, offsite backups provide an additional layer of security by storing data in a remote location, helping to safeguard against local disasters and ensuring business continuity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Frequency

A

In a modern enterprise, the frequency of backups is determined by the how critical data is and the organization’s tolerance for data loss. Typically, businesses implement a tiered backup strategy, where data is categorized based on its importance:

High-priority and frequently changing data, such as transaction records and customer information, may require frequent backups, sometimes as often as every few hours.

Less critical data might be backed up daily or even weekly.

Additionally, continuous data protection solutions, which capture changes in real-time, have gained popularity to minimize data loss windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encryption

A

Encryption

Encryption is crucial for backups as it safeguards sensitive data during storage and transmission, thereby helping to prevent unauthorized access and ensure the confidentiality and integrity of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Snapshot

A

Snapshots

Snapshots play a vital role in modern backup solutions by providing point-in-time copies of data, which allows for efficient and rapid recovery while minimizing the impact on production systems. - Heavily used in virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Recovery

A

Recovery

Recover testing is essential within a backup strategy as it verifies the effectiveness of the backup process and ensures the ability to restore systems and data accurately in real-world scenarios. This helps minimize downtime and potential data loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Replication

A

Replication serves as a backup strategy by creating real-time duplicates of data and applications across separate systems or locations. This enhances both data availability and disaster-recovery readiness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Journaling

A

In backup designs, journaling involves recording and tracking changes to data over time, thereby allowing for efficient incremental backups and streamlined data-restoration processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cloud back up

A

Cloud backup is a service that allows users to store their data and applications on remote servers managed by a cloud service provider. This process ensures that data is securely backed up, easily accessible, and protected against loss or damage. Here’s an overview of cloud backup:

Key Concepts of Cloud Backup
Data Storage:

Data is stored on remote servers in data centers operated by cloud service providers. These data centers have robust security measures and redundant storage to ensure data safety and availability.
Automatic Backups:

Cloud backup services can be scheduled to automatically back up data at regular intervals, ensuring that the latest data is always protected without manual intervention.
Accessibility:

Backed-up data can be accessed from anywhere with an internet connection, making it easy to recover data in case of loss or failure.
Scalability:

Cloud backup solutions can scale to accommodate growing data volumes, providing additional storage as needed without requiring significant infrastructure changes.
Security:

Data is typically encrypted during transfer and while stored in the cloud, ensuring that it remains secure and protected from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly