Vinay disas replies -- I need to reply to 2 of my classmates

User Generated

Znqqlcnjne

Writing

Description

Unformatted Attachment Preview

Raja Adarsh Asepu - Thursday, 5 September 2019, 1:51 AM Backup Procedures: The issues of securing backups are based on many factors. A major issue is the damage of the target media like the tapes which require time-consuming data recovery and costly services. Also, the backup data could be corrupted making it difficult to retrieve. Besides, there can be cases of human error to properly format the overwriting backup data or backup medium. Importantly, there can be concerns due to accidental deletion of a software bug or file replicated in the backup process (Herrmann, D. S. (2007)). Therefore, there are important ways of securing backup media. The first step is to allow audit abilities. These ensure that one has confidence that their data is securely stored and restricted from unauthorized access, and the auditors can report and track any data access needs from the backup area. Also, backing up data should involve military-grade encryption, as well as guarantee that data is stored in highly secured data centers. This ensures that there are reduced risks of leakage of data. Significantly, the backups need to be uniquely labeled. These labels should not just define the contents but also the data classification levels. Besides, media from top classification level must never be re-used to store lower classification level data (Rounsavall, R. (2013)). On the other hand, in offsite data storage, organizations should always consider physical storage or the cloud. In the cloud backup storage, a company will need to send it data over a network to the cloud service provider. As a result, it will be required to regularly run backup and schedules from its web. References: Herrmann, D. S. (2007). Complete guide to security and privacy metrics: measuring regulatory compliance, operational resilience, and ROI. Auerbach Publications. Rounsavall, R. (2013). Storage Area Networking Security Devices. In Computer and Information Security Handbook (pp. 891-904). Morgan Kaufmann. Shivkumar Patel - Wednesday, 4 September 2019, 4:44 PM Cases of cyber threats are evident, and all types of organizations should be ready to secure their backups (Lehto, 2013). I have seen instances whereby attackers sneak into the systems or storage devices and end up getting some sensitive information. The attackers will use this to acquire money illegally or bring down the organization. There are lots of backup devices, and an organization can choose the ones that suit their mode of operation. We have floppy disks, hard drives, magnetic tapes, and floptical disks. The security of the backups should be included in the organization’s security policy (Santos & Bernardino, 2014). The type of security mechanisms used will depend on whether the organization is going to have onsite storage of backups or off-site storage of backups. Some organizations store the backups on floppy disks, hard disks and magnetic disks then keep them in a safe place within the organization. This idea is good since the organization can recover the data within the shortest time possible. However, there are some cases whereby an attack destroys everything within the organization. So, if the organization didn't have offsite storage for the backups, it will lose all the files. If possible, an organization should have off-site storage for the backups (Stone, 2016). By having off-site storage means that the organization will have its backups stored in a separate location. The storage sites are mostly far away from the organization's area. There are some organizations which can manage to have their off-site storage, but there are others which can only acquire the service from other organizations. The organization offering storage services should always ensure that authorized people access the data. Their security mechanisms should be strong to prevent any leakage. References Lehto, M. (2013). The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies. International Journal Of Cyber Warfare And Terrorism, 3(3), 1-18. doi: 10.4018/ijcwt.2013070101 Santos, A., & Bernardino, J. (2014). Open Source Tools for Incremental Remote Backups on Linux: An Experimental Evaluation. Journal Of Systems Integration, 3-13. doi: 10.20470/jsi.v5i3.205 Stone, W. (2016). Solving E-mail and Access Problems While Traveling; \"Off-site \" Backup Onsite [From the Screen of Stone]. IEEE Antennas And Propagation Magazine, 58(1), 114-117. doi: 10.1109/map.2015.2501229
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Here you go!! I will be available in case you have more work. Thank you and goodbye

Running Head: DISCUSSION REPLIES

1

Discussion Replies
Name
Institutional Affiliation

DISCUSSION REPLIES

2

Raja Adarsh Asepu
I agree that the issues of securing backups rely on many factors. The damage of target media can
result in the loss of data which in many cases is expensive to recover. Corrupting of stored data
can become hard to retrieve it. To prevent any unnecessary expenses when trying to r...


Anonymous
Just what I was looking for! Super helpful.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags