SlideShare une entreprise Scribd logo
1  sur  51
Télécharger pour lire hors ligne
1 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Data Backup and Disaster
Recovery
Simplifying Security.
Module 5
Alireza Ghahrood
Security Solution Provider :
Cyber Space |BigData |Cloud |Virtualization
www.about.me/alirezaghahrood
| Cell :+98 (912) 1964383 |
Monday, May 23, 2011
3
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
CA Technologies Survey Reveals IT Systems Failures Cost Businesses 127 Million Lost Person‐
Hours
ISLANDIA, N.Y. ‐ Businesses collectively lose more than 127 million person‐hours annually—or
an average of 545 person‐hours per company—in employee productivity due to IT downtime,
according to a survey sponsored by CA Technologies (NASDAQ: CA). This loss is equivalent to
63,500 people being unable to work for an entire year.
The survey of 2,000 organizations in North America and Europe also found that IT outages are
frequent and lengthy—substantially damaging companies’ reputations, staff morale and
customer loyalty. Despite this, 56% of organizations in North America and 30% in Europe don’t
have a formal and comprehensive disaster recovery policy.
http://www.ca.com
4
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
MODULE
OBJECTIVESData Backup
What Files to Backup and How Often?
Online Data Backup
Online Backup Service Providers
Types of Backup
Windows 7: Backup and Restore
Data Encryption
MAC OS X: Backup and Restore
Data Backup Tools
Data Recovery Tools
Physical Security
Physical Security Measures
Laptop Theft
Physical Security Checklist
U
L
E
F
L
O
W
5
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
Data Backup Introduction
Windows 7 Backup
and Restore
Data Encryption
MAC OS X Backup and Restore
Data Backup Tools
Data Recovery Tools
Physical Security
6
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
DATA BACKUP
Backup is the process of
making duplicate copies of
critical data on backup
media such as CD/DVD, USB,
external hard disks, etc.
The main purpose of backups
is to restore the critical data
or files when they are
accidentally deleted or
corrupted
Data backup should be the
top priority in computer
maintenance along with
virus protection because it
ensures that the data is
secure in case of disaster
It is easy and cost effective
to back up data in
comparison to recovering
data after a disaster or
system crash
Copyright © by EC-Council
served. Reproduction is Strictly Prohibited.All Rights Re
6
TYPES OF DATA
LOSS Human Error
Accidental deletion or
overwriting of a file or program
Software Corruption
Software configuration
complexity
Computer Virus
Attack of malicious programs such
as virus, worms, and Trojans
Hardware Malfunction
Hard disk failure, CPU failure,
storage device failure, power failure
Natural Disaster
Fire, flood, storm, and
earthquake
Corrupt File System
Operating system crash
and data corruption
8
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
WHAT FILES TO
BACKUP AND HOW
OFTEN?
What Files to Backup?
First decide what data present on the
system is critical and needs a backup
such as:
The operating system files purchased with
the computer, CDs, software, etc.
Important office documents
Software downloaded (purchased) from
the Internet
Contact Information (email address book)
Personal photos, music, and videos
Any other file that is critical
How Often?
It is always recommended that the
user files are backed up regularly
Backup whenever there are changes
to important files, so that the latest
copy would be available even if the
original one is lost/damaged
Back up on a predetermined day (for
example, every Monday) using the
backup software
Back up only the modified files on a
daily basis
ONLINE DATA
BACKUP
9
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
Online backup or remote backup is the method of offsite data
storage where contents of the hard drive are regularly backed up
to another computer on the Internet (remote server)
It eliminates the risk of data loss due to natural disaster
It is an expensive procedure but prevents loss of data in
case of disasters due to theft, file corruption, etc.
You can securely restore any lost data by using an Internet
connection and a Web browser interface
Maintain an online backup only for the important files in case
the user cannot afford much online backup
ONLINE BACKUP
SERVICE
PROVIDERS
10
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
http://www.backblaze.com http://www.carbonite.com
https://spideroak.com https://www.idrive.com
Acronis
http://www.acronis.com
SugarSync
http://www.sugarsync.com
Mozy
https://mozy.com
Memopal
http://memopal.com
SafeCopy
http://www.safecopybackup.com
ElephantDrive
http://www.elephantdrive.com
Jungledisk
http://www.paragon‐software.com
SOS Online Backup
http://www.sosonlinebackup.com
11
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
ONLINE BACKUP
SERVICE
PROVIDERS
Abacus Online Backups
http://www.abacusbackups.com
IBackup
http://www.ibackup.com
Box.net
http://www.box.net
Memeo Backup
http://www.memeo.com
ADrive
http://www.adrive.com
CrashPlan
http://www.crashplan.com
Dropbox
https://www.dropbox.com
Dr. Backup
http://www.drbackup.net
12
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
ONLINE BACKUP
SERVICE
PROVIDERS
Copyright © by EC-Counci
eserved. Reproduction is Strictly Prohibited.
l
s RAll Right
12
Full/Normal Data
Backup
Incremental Data
Backups
Differential Data
Backup
TYPES OF
BACKUP
It copies all the files,
including system files,
application files, user
files, and operating
system
The complete set of
data is copied to the
chosen place or
backup media
It copies only the files
changed or created
after the last backup
Takes less time and
space but makes the job
of restoring files difficult
It copies only the files
changed or created
that have been
changed from the last
incremental or normal
backup
Takes less time and
space and restores data
quickly
U
L
E
F
L
O
W
14
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
Data Backup Introduction
Windows 7 Backup
and Restore
MAC OS X Backup and Restore
Data Backup Tools
Data Recovery Tools
Physical Security
Data Encryption
Windows Backup allows for creating a duplicate copy of
the files and folder on the hard disk and then archiving
them to an external storage device
If the original hard disk data is erased accidentally or if the
hard disk becomes inaccessible, then the user can restore
the archived copy of data
The files are restored to their previous positions after
restoring the backup data
Back Up the Data Using
Windows Backup
15
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
STEPS TO
BACKUP DATA
16
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
Click Start  Control Panel  type Backup in the search  click Restore data,
Files, or Computer click Backup now
Select the drive to save the backup and then click Next
STEPS TO
BACKUP DATA
17
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
In the What do you want to back up? screen, check the option Let Windows
choose and click Next
Backup in progress appears, which completes the backup process
RESTORING
DATA
18
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
Go to Control Panel  Backup and
Restore  Restore my files
In Browse or search your backup for
files and folders to restore screen,
click Browse for folders to restore a
folder, and then click Next
In the Where do you want to restore
your file? screen, check In the
original location or In the following
location to browse the desired
location and then click Restore
In the your files have been restored
screen, click Finish to complete the
restoration process
U
L
E
F
L
O
W
19
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
Data Backup Introduction
Windows 7 Backup
and Restore
Data Encryption
MAC OS X Backup and Restore
Data Backup Tools
Data Recovery Tools
Physical Security
SECURING BACKUP
ON STORAGE
DEVICES WITH
ENCRYPTION
20
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
Encryption is converting the backup data to a format that is not recognizable
Though making backups on external storage media is safe and reliable, the external
media may still be stolen or corrupted, making it impossible to restore the data
Encrypt the data on the storage devices, such as an USB drive, in order to
protect it
This makes the data present in the storage device unusable for anyone
that is not authorized to use the device
Make use of the encryption tools such as TrueCrypt to encrypt the backup
data
DATA
ENCRYPTION
TOOL:TRUECRYPT
21
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
TrueCrypt uses various
encryption techniques and
automatically encrypts the data
without any user intervention
Encryption Process
 Install and launch the Truecrypt
program
 Create a volume
 Select the backup files to encrypt
 Select the Encryption Algorithm
to be used for encrypting data;
click Next to encrypt
http://www.truecrypt.org
U
L
E
F
L
O
W
22
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
Data Backup Introduction
Windows 7 Backup
and Restore
MAC OS X Backup and Restore
Data Backup Tools
Data Recovery Tools
Physical Security
Data Encryption
Time Machine lets you automatically back
up your entire system in Mac OS X v10.5
and Mac OS X 10.6 or later
Time Machine keeps an up‐to‐date copy
of everything on your Mac – system files,
digital photos, music, movies, TV shows,
documents, and so forth
To launch the Time Machine, navigate to
Apple Menu  System Preferences
window  click Time Machine icon
TIME MACHINE
(APPLE
SOFTWARE)
23
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
Time Machine asks the user when any
hard drive is connected to it for the first
time to use it as a backup drive
Click Use as Backup Disk to open
Preferences window to configure the disk
as a backup disk
In the Time Machine preferences window,
check Show Time Machine status in the
menu bar to see the status of backup
Click Lock to secure the data present in
the backup
SETTING UP
TIME MACHINE
24
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
RESTORING FILES
FROM TIME
MACHINE
BACKUPS
25
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
Click the Time Machine icon in the
Dock
Use the timeline on the right side of the
window to browse and backup files of a
certain date and time
Select the file/folder and click the Restore
button
Connect backup disk
U
L
E
F
L
O
W
26
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
Data Backup Introduction
Windows 7 Backup
and Restore
MAC OS X Backup and Restore
Data Backup Tools
Data Recovery Tools
Physical Security
Data Encryption
Windows Data Backup Tool: Acronis
True Image Home 2011
http://www.acronis.com
Acronis True Image Home 2011 provides
home users with reliable and timeless
backup and recovery of their home PC's
operating system, applications, settings,
and personal files
It automatically creates incremental
backups once every five minutes allowing
users to roll back their system, files, and
folders to any point in the past
It has online storage services to
automatically back up valuable data or
files over the Internet to a secure location
27
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
Windows Data Backup Tool:
NovaBACKUP Home Protection
NovaBACKUP® Home Protection automatically backs up and protects important files on
all of your computers from one easy to use control panel
Features:
Automatic processes continually
update your protection – no need
to remember to run backups
Central Management makes it
easy to stay on top of all of the
data in your home
Disaster recovery and full disk
imaging options allow you to
restore your entire system
Fast Bit Technology updates your
backups with bit level incremental
changes
28
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
http://www.novastor.com
29
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
DATA BACKUP
TOOLS FOR
WINDOWSGenie Backup Manager Home
http://www.genie9.com
NTI Backup Now
http://www.ntibackupnow.com
Norton Ghost
http://www.symantec.com
PowerBackup
http://www.cyberlink.com
R‐Drive Image
http://www.drive‐image.com
Backup4all
http://www.backup4all.com
TurboBackup
http://www.filestream.com
BounceBack Ultimate
http://www.cmsproducts.com
30
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
DATA BACKUP
TOOLS FOR
WINDOWSOopsBackup
http://www.altaro.com
Fbackup
http://www.backup4all.com
SyncBackPro
http://www.2brightsparks.com
Active@ Disk Image
http://www.disk‐image.net
Macrium Reflect Free
http://www.macrium.com
Easeus Todo Backup Home
http://www.todo‐backup.com
GoodSync
http://www.goodsync.com
DoubleSafety
http://www.doublesafety.com
MAC OS X Data Backup Tool:
Data Backup
Data Backup is a utility that allows
you to backup, restore, and
synchronize your valuable data
with minimal effort
Features:
 Backup your iTunes or iPhoto files,
other important data, or your entire
system
 Schedule your backups to
automatically run at a specific time
 Backup to any mounted drive
including FireWire, USB, ATA, or
networked drives
 Creates an exact copy of a folder or
a drive, including bootable OS X
backups
http://www.prosofteng.com
31
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
MAC OS X Data Backup Tool:
SmartBackup
SmartBackup is a backup utility that creates fast and efficient backups of your
data, or a full bootable clone of your system
It can backup to anything that is mountable on your desktop, to external
harddisks, flashdrives, iPods, and any kind of network shares
http://freeridecoding.com
32
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
33
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
DATA BACKUP
TOOLS FOR MAC
OS XSynchronize! Pro X
http://www.qdea.com
Tri‐BACKUP
http://www.tri‐edre.com
iBackup
http://www.grapefruit.ch
MimMac
http://www.ascendantsoft.com
Roxio Retrospect
http://www.retrospect.com
SilverKeeper
http://www.lacie.com
SuperDuper
http://www.shirt‐pocket.com
Carbon Copy Cloner
http://www.bombich.com
U
L
E
F
L
O
W
34
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
Data Backup Introduction
Windows 7 Backup
and Restore
MAC OS X Backup and Restore
Data Backup Tools
Data Recovery Tools
Physical Security
Data Encryption
Windows Data Recovery Tool:
Recover My Files
Recover My Files data recovery software recovers deleted files emptied from the Windows
Recycle Bin, or lost due to the format or corruption of a hard drive, virus or Trojan infection,
unexpected system shutdown, or software failure
35
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
http://www.recovermyfiles.com
Windows Data Recovery Tool:EASEUS
DATA
RECOVERY
WIZARD
36
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
EASEUS Data Recovery Wizard provides a comprehensive data recovery solution for
computer users to recover lost data due to partition loss or damage, software crash,
virus infection, and unexpected shutdown
Recover deleted or lost files emptied
from the Recycle Bin
File recovery after accidental format,
even if you have reinstalled Windows
Disk recovery after a hard disk crash
Recover office documents, photos,
images, videos, music, email, etc.
Recover from hard drive, USB drive,
memory card, memory stick, camera
card, zip, floppy disk, or other storage
media
http://www.easeus.com
37
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
DATA RECOVERY
TOOLS FOR
WINDOWSAdvanced Disk Recovery
http://www.systweak.com
File Scavenger Data Recovery
http://www.quetek.com
Handy Recovery
http://www.handyrecovery.com
Windows Data Recovery
Software
http://www.diskdoctors.net
R‐Studio
http://www.data‐recovery‐software.net
Quick Recovery for Windows
http://www.recoveryourdata.com
VirtualLab Data Recovery
http://www.binarybiz.com
GetDataBack
http://www.runtime.org
38
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
DATA RECOVERY
TOOLS FOR
WINDOWS
Stellar Phoenix Windows
Data Recovery
http://www.stellarinfo.com
Recuva
http://www.piriform.com
MiniTool Power Data Recovery
http://www.powerdatarecovery.com
Partition Wizard Home Edition
http://www.minitool‐partitionrecovery.com
SoftPerfect File Recovery
http://www.softperfect.com
Undelete Plus
http://undeleteplus.com
FreeUndelete
http://www.officerecovery.com
RecoverPlus Photo
Recovery
http://www.arcksoft.com
MAC OS X Data Recovery Tool:
BOOMERANG DATA
RECOVERY
SOFTWARE
39
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
Boomerang Data Recovery
Software for MacOS X recovers
accidently deleted files, folder,
document, lost or damaged
partitions, RAID volumes,
camera/flash cards, etc.
Features:
 Recover a complete disk that no
longer mounts or is formatted
 Re‐assemble RAID volumes and
help recover your mission critical
data
 Scans the entire disk and recover
deleted files and documents
http://www.boomdrs.com
MAC OS X Data Recovery Tool:VirtualLab
VirtualLab is non‐destructive data recovery software that recovers deleted files,
damaged or missing volumes, formatted disks, iPods, and even photos
It performs an exhaustive scan of the drive to locate lost partitions and files
http://www.binarybiz.com
40
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
41
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
DATA RECOVERY
TOOLS FOR MAC
OS XDiskWarrior
http://alsoft.com
Data Rescue
http://www.prosofteng.com
AppleXsoft File Recovery
for Mac
http://www.applexsoft.com
Disk Doctors Mac Data
Recovery
http://www.diskdoctors.net
Stellar Phoenix Mac Data
Recovery
http://www.stellarinfo.com
FileSalvage
http://subrosasoft.com
R‐Studio for Mac
http://www.r‐tt.com
TechTool Pro
http://www.micromat.com
U
L
E
F
L
O
W
42
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
Data Backup Introduction
Windows 7 Backup
and Restore
MAC OS X Backup and Restore
Data Backup Tools
Data Recovery Tools
Physical Security
Data Encryption
Physical Security
Physical security is the first layer of protection for computers and data
It involves the protection of assets such as hardware, networks, and data from attacks that cause
loss or damage
There are various factors that affect the physical security such as damage, theft, dust, fire, water,
flood, earthquakes, etc.
Physical Security
Prevent any
unauthorized
access to the
computer systems
Prevent tampering
/stealing of data
from the
computer systems
Protect the integrity
of the data stored
in the computer
Prevent the loss of
data/damage to
systems against any
natural calamities
43
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
PHYSICAL
SECURITY
MEASURES: LOCKS
44
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
Locks act as the primary method of
controlling the physical access of the
information, information systems, and
removable storage devices
Locks provide different levels of security
depending on their design and
implementation
Locks are used to:
 Restrict others from using a computer
room
 Protect the computer from
unauthorized access by locking the
doors and windows on the computer
premises
 Lock the CPU and monitor in order to
prevent them from being stolen
Copyright © by EC-Council
served. Reproduction is Strictly Prohibited.All Rights Re
44
Physical Security Measures: Biometrics
Biometrics refers to the identification or identity verification of individuals based on their
characteristics
Biometric Identification Techniques
Fingerprinting
Retinal
Scanning
Iris
Scanning
Voice
Recognition
Face
Recognition
Vein
Structure
Recognition
ight © by EC-Council45 Copyr
All Rights Reserved. Reproduction
Physical Security Measures:
FIRE PREVENTIONFire accidents may occur because of a short circuit, which may cause heavy loss
and destruction
Fire Preventive Measures
Make sure all
the emergency
doors and
corridors are
kept clear
Use good
quality wiring,
tools, and
equipment
Avoid using
equipment
that gives a
mild electrical
shock
Keep the room
dust‐free and
remove all the
scraps as soon
as possible
Ensure the
trash is
emptied
regularly
At the end of
the day,
always unplug
the appliances
Make sure the
user knows
who to call in
an emergency
Know how to
use a fire
extinguisher
is Strictly Prohibited.
Physical Security Measures:
HVAC Considerations
HVAC (Heating, Ventilating, and Air
Conditioning) is the technology
developed for indoor environmental
comfort
HVAC is used for:
 Controlling the temperature
 Adequate ventilation
 Indoor air quality
47
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
Securing Laptops from Theft
Laptop theft leads to the disclosure of information such as
usernames, passwords, confidential data, and other networking
details related to connecting the laptop to the corporate or
Internet environment
Laptop
Security
Do’s
Note the laptop serial number
and keep it safe
Choose a laptop skin in order to
recognize it easily
Report laptop theft immediately
Don’ts
Do not leave the laptop
unattended (in the car or out in
the office/home)
Do not forget the password and
avoid sharing it with others
48
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
Copyright © by EC-Council
served. Reproduction is Strictly Prohibited.All Rights Re
48
Add third‐party privacy protection
for highly sensitive data
Consider purchasing
laptop’s PC insurance
Use strong hardware‐based
security
Encrypt sensitive data and back
up everything on the laptop
Set BIOS’s password
on the laptop
LAPTOP THEFT
COUNTERMEASU
RES
Install tracking tools on the laptop
that help trace the location of the
stolen laptop
MODULE
SUMMARY
50
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
 Backup is required in situations such as hardware failure, theft, system crash, and natural
disaster
 Users need to back up whenever there are changes to important files, so that a latest copy
would be available even if the original one is lost/damaged
 Online backup or remote backup is the method of offsite data storage where hard drive
contents are regularly backed up to another computer on the Internet (remote server)
 Normal, Incremental, and Differential are the types of backups in Windows
 Physical security involves the protection of assets such as hardware, networks, and data
from attacks that cause loss or damage
 Laptop theft leads to the disclosure of information such as usernames, passwords,
confidential data, and other networking details related to connecting the laptop to the
corporate or Internet environment
Back up important documents, photos, favorites, email, etc. to CD, DVD, tape or
another disk at regular intervals
Keep backup data in a safe place
Keep multiple backup copies of important data Use encryption
techniques to protect backup data
Check for automated backup and scheduling features when selecting a backup tool
or service as manual backups are vulnerable to human error
If you are using an online data backup and recovery service, check service
provider’s stability and track record
DATA BACKUP
CHECKLIST
51
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .

Contenu connexe

Tendances

SITCON2021 Web Security 領航之路
SITCON2021  Web Security 領航之路SITCON2021  Web Security 領航之路
SITCON2021 Web Security 領航之路Tzu-Ting(Fei) Lin
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyTehmina Gulfam
 
Fun with the Hak5 Rubber Ducky
Fun with the Hak5 Rubber DuckyFun with the Hak5 Rubber Ducky
Fun with the Hak5 Rubber Duckykieranjacobsen
 
Linux Memory Management
Linux Memory ManagementLinux Memory Management
Linux Memory ManagementNi Zo-Ma
 
Module 4 Enumeration
Module 4   EnumerationModule 4   Enumeration
Module 4 Enumerationleminhvuong
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - NotesKranthi
 
Data Backup and Recovery.pdf
Data Backup and Recovery.pdfData Backup and Recovery.pdf
Data Backup and Recovery.pdfAshraf Hossain
 
Block I/O Layer Tracing: blktrace
Block I/O Layer Tracing: blktraceBlock I/O Layer Tracing: blktrace
Block I/O Layer Tracing: blktraceBabak Farrokhi
 
The Importance Of Computer System Backup Today
The Importance Of Computer System Backup TodayThe Importance Of Computer System Backup Today
The Importance Of Computer System Backup TodayDaniel Nilles
 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - NotesKranthi
 
Corso di informatica di base lezione 1 - conoscere il pc
Corso di informatica di base   lezione 1 - conoscere il pcCorso di informatica di base   lezione 1 - conoscere il pc
Corso di informatica di base lezione 1 - conoscere il pcEnrico Mori
 
Forensic artifacts in modern linux systems
Forensic artifacts in modern linux systemsForensic artifacts in modern linux systems
Forensic artifacts in modern linux systemsGol D Roger
 

Tendances (20)

Linux forensics
Linux forensicsLinux forensics
Linux forensics
 
tmux
tmuxtmux
tmux
 
SITCON2021 Web Security 領航之路
SITCON2021  Web Security 領航之路SITCON2021  Web Security 領航之路
SITCON2021 Web Security 領航之路
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
 
Fun with the Hak5 Rubber Ducky
Fun with the Hak5 Rubber DuckyFun with the Hak5 Rubber Ducky
Fun with the Hak5 Rubber Ducky
 
Linux kernel
Linux kernelLinux kernel
Linux kernel
 
Linux Memory Management
Linux Memory ManagementLinux Memory Management
Linux Memory Management
 
Module 4 Enumeration
Module 4   EnumerationModule 4   Enumeration
Module 4 Enumeration
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
 
Android Audio System
Android Audio SystemAndroid Audio System
Android Audio System
 
Data Backup and Recovery.pdf
Data Backup and Recovery.pdfData Backup and Recovery.pdf
Data Backup and Recovery.pdf
 
Block I/O Layer Tracing: blktrace
Block I/O Layer Tracing: blktraceBlock I/O Layer Tracing: blktrace
Block I/O Layer Tracing: blktrace
 
Android Things : Building Embedded Devices
Android Things : Building Embedded DevicesAndroid Things : Building Embedded Devices
Android Things : Building Embedded Devices
 
Registry forensics
Registry forensicsRegistry forensics
Registry forensics
 
The Importance Of Computer System Backup Today
The Importance Of Computer System Backup TodayThe Importance Of Computer System Backup Today
The Importance Of Computer System Backup Today
 
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes
 
Bypass pfsense
Bypass pfsenseBypass pfsense
Bypass pfsense
 
Backup
BackupBackup
Backup
 
Corso di informatica di base lezione 1 - conoscere il pc
Corso di informatica di base   lezione 1 - conoscere il pcCorso di informatica di base   lezione 1 - conoscere il pc
Corso di informatica di base lezione 1 - conoscere il pc
 
Forensic artifacts in modern linux systems
Forensic artifacts in modern linux systemsForensic artifacts in modern linux systems
Forensic artifacts in modern linux systems
 

Similaire à Cscu module 05 data backup and disaster recovery

Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoverySejahtera Affif
 
Data loss and data recovery
Data loss and data recoveryData loss and data recovery
Data loss and data recoveryHTS Hosting
 
Backing up your digital life - PC, Mac or Android
Backing up your digital life - PC, Mac or AndroidBacking up your digital life - PC, Mac or Android
Backing up your digital life - PC, Mac or Androidclcewing
 
Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16Ken Tucker
 
Portable Data Recovery
Portable Data RecoveryPortable Data Recovery
Portable Data Recoveryiloraiava
 
Data recovery
Data recoveryData recovery
Data recoverybhaumik_c
 
Data Recovered Archives
Data Recovered ArchivesData Recovered Archives
Data Recovered Archiveseldige19g0
 
Power Point example for module 3 assignment
Power Point example for module 3 assignmentPower Point example for module 3 assignment
Power Point example for module 3 assignmentnaterator
 
Data recovery power point
Data recovery power pointData recovery power point
Data recovery power pointtutannandi
 
Stellar phoenix dvd data recovery
Stellar phoenix dvd data recoveryStellar phoenix dvd data recovery
Stellar phoenix dvd data recoverysmith bush
 
A Backup and Restore Software for Android System
A Backup and Restore Software for Android SystemA Backup and Restore Software for Android System
A Backup and Restore Software for Android SystemIRJET Journal
 
Backing up your data
Backing up your dataBacking up your data
Backing up your dataaaberra
 
How to Recover Deleted Files on Windows 10/11?
How to Recover Deleted Files on Windows 10/11?How to Recover Deleted Files on Windows 10/11?
How to Recover Deleted Files on Windows 10/11?AffanIT1
 
How to clean windows 8 or 8.1 hard drive
How to clean windows 8 or 8.1 hard driveHow to clean windows 8 or 8.1 hard drive
How to clean windows 8 or 8.1 hard drivescarlet christer
 
2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recoverymrmwood
 
Data backup and recovery process
Data backup and recovery processData backup and recovery process
Data backup and recovery processJitendraKumarKar2
 

Similaire à Cscu module 05 data backup and disaster recovery (20)

Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recovery
 
Data loss and data recovery
Data loss and data recoveryData loss and data recovery
Data loss and data recovery
 
3170725_Unit-4.pptx
3170725_Unit-4.pptx3170725_Unit-4.pptx
3170725_Unit-4.pptx
 
Backing up your digital life - PC, Mac or Android
Backing up your digital life - PC, Mac or AndroidBacking up your digital life - PC, Mac or Android
Backing up your digital life - PC, Mac or Android
 
Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16
 
Portable Data Recovery
Portable Data RecoveryPortable Data Recovery
Portable Data Recovery
 
Data recovery
Data recoveryData recovery
Data recovery
 
Backup data
Backup data Backup data
Backup data
 
Data Recovered Archives
Data Recovered ArchivesData Recovered Archives
Data Recovered Archives
 
Power Point example for module 3 assignment
Power Point example for module 3 assignmentPower Point example for module 3 assignment
Power Point example for module 3 assignment
 
UNIT 2 P8
UNIT 2 P8UNIT 2 P8
UNIT 2 P8
 
Data recovery power point
Data recovery power pointData recovery power point
Data recovery power point
 
Ch 16 system security
Ch 16 system securityCh 16 system security
Ch 16 system security
 
Stellar phoenix dvd data recovery
Stellar phoenix dvd data recoveryStellar phoenix dvd data recovery
Stellar phoenix dvd data recovery
 
A Backup and Restore Software for Android System
A Backup and Restore Software for Android SystemA Backup and Restore Software for Android System
A Backup and Restore Software for Android System
 
Backing up your data
Backing up your dataBacking up your data
Backing up your data
 
How to Recover Deleted Files on Windows 10/11?
How to Recover Deleted Files on Windows 10/11?How to Recover Deleted Files on Windows 10/11?
How to Recover Deleted Files on Windows 10/11?
 
How to clean windows 8 or 8.1 hard drive
How to clean windows 8 or 8.1 hard driveHow to clean windows 8 or 8.1 hard drive
How to clean windows 8 or 8.1 hard drive
 
2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recovery
 
Data backup and recovery process
Data backup and recovery processData backup and recovery process
Data backup and recovery process
 

Plus de Alireza Ghahrood

Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Alireza Ghahrood
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Alireza Ghahrood
 
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...Alireza Ghahrood
 
NATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of ExcellenceNATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of ExcellenceAlireza Ghahrood
 
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINEDIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINEAlireza Ghahrood
 
Optional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet DossierOptional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet DossierAlireza Ghahrood
 
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...Alireza Ghahrood
 
http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/Alireza Ghahrood
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisionsAlireza Ghahrood
 
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceEffectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceAlireza Ghahrood
 
participatea in the identity management lifecycle
participatea in the identity management lifecycleparticipatea in the identity management lifecycle
participatea in the identity management lifecycleAlireza Ghahrood
 
implement authentication mechanisms
implement authentication mechanismsimplement authentication mechanisms
implement authentication mechanismsAlireza Ghahrood
 
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...Alireza Ghahrood
 
Identity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial InstitutionsIdentity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial InstitutionsAlireza Ghahrood
 
Cscu module 12 information security and legal compliance
Cscu module 12 information security and legal complianceCscu module 12 information security and legal compliance
Cscu module 12 information security and legal complianceAlireza Ghahrood
 
Cscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theftCscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theftAlireza Ghahrood
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet securityAlireza Ghahrood
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactionsAlireza Ghahrood
 

Plus de Alireza Ghahrood (20)

Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
 
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
 
NATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of ExcellenceNATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
 
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINEDIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
 
ANT Catalog
ANT CatalogANT Catalog
ANT Catalog
 
Optional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet DossierOptional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet Dossier
 
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
 
http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisions
 
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceEffectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
 
participatea in the identity management lifecycle
participatea in the identity management lifecycleparticipatea in the identity management lifecycle
participatea in the identity management lifecycle
 
implement access controls
implement access controlsimplement access controls
implement access controls
 
implement authentication mechanisms
implement authentication mechanismsimplement authentication mechanisms
implement authentication mechanisms
 
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
 
Identity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial InstitutionsIdentity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial Institutions
 
Cscu module 12 information security and legal compliance
Cscu module 12 information security and legal complianceCscu module 12 information security and legal compliance
Cscu module 12 information security and legal compliance
 
Cscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theftCscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theft
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet security
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactions
 

Dernier

Trusted Call~Girls In Rohini Delhi꧁❤ 9667422720 ❤꧂Escorts
Trusted Call~Girls In Rohini Delhi꧁❤ 9667422720 ❤꧂EscortsTrusted Call~Girls In Rohini Delhi꧁❤ 9667422720 ❤꧂Escorts
Trusted Call~Girls In Rohini Delhi꧁❤ 9667422720 ❤꧂EscortsLipikasharma29
 
Trusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂Escorts
Trusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂EscortsTrusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂Escorts
Trusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂EscortsLipikasharma29
 
9911558886 Cash on Hand Low Costly Russian Call Girls In Naraina Vihar
9911558886 Cash on Hand Low Costly Russian Call Girls In Naraina Vihar9911558886 Cash on Hand Low Costly Russian Call Girls In Naraina Vihar
9911558886 Cash on Hand Low Costly Russian Call Girls In Naraina Viharmalikasharmakk1
 
Call Us ≽ 9643900018 ≼ Call Girls In Dwarka Sector 7 (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Dwarka Sector 7 (Delhi)Call Us ≽ 9643900018 ≼ Call Girls In Dwarka Sector 7 (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Dwarka Sector 7 (Delhi)ayushiverma1100
 
Book Call Girls in Anand Vihar Delhi 8800357707 Escorts Service
Book Call Girls in Anand Vihar Delhi 8800357707 Escorts ServiceBook Call Girls in Anand Vihar Delhi 8800357707 Escorts Service
Book Call Girls in Anand Vihar Delhi 8800357707 Escorts Servicemonikaservice1
 
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncrthapariya601
 
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝thapagita
 
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCRthapariya601
 
Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)ayushiverma1100
 
8800357707, Munirka Metro Good Looking For Call Girls And Escort Service Delhi
8800357707, Munirka Metro Good Looking For Call Girls And Escort Service Delhi8800357707, Munirka Metro Good Looking For Call Girls And Escort Service Delhi
8800357707, Munirka Metro Good Looking For Call Girls And Escort Service Delhimonikaservice1
 
Genuine Call Girls In {Mahipalpur Delhi} 9667938988 Indian Russian High Profi...
Genuine Call Girls In {Mahipalpur Delhi} 9667938988 Indian Russian High Profi...Genuine Call Girls In {Mahipalpur Delhi} 9667938988 Indian Russian High Profi...
Genuine Call Girls In {Mahipalpur Delhi} 9667938988 Indian Russian High Profi...aakahthapa70
 
9643097474 Full Enjoy @24/7 Call Girls in Hauz Khas Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Hauz Khas Delhi NCR9643097474 Full Enjoy @24/7 Call Girls in Hauz Khas Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Hauz Khas Delhi NCRthapariya601
 
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncrthapariya601
 
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝thapagita
 
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe NoidaCall Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe NoidaDelhi Escorts Service
 
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncrthapariya601
 
Book Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts Service
Book Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts ServiceBook Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts Service
Book Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts Servicemonikaservice1
 
(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)
(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)
(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)riyaescorts54
 
Call Girls In Karnal 8860008073 Doorstep Sector 6 7 8 9 Karnal Escorts Service
Call Girls In Karnal 8860008073 Doorstep Sector 6 7 8 9 Karnal Escorts ServiceCall Girls In Karnal 8860008073 Doorstep Sector 6 7 8 9 Karnal Escorts Service
Call Girls In Karnal 8860008073 Doorstep Sector 6 7 8 9 Karnal Escorts ServiceApsara Of India
 

Dernier (20)

Trusted Call~Girls In Rohini Delhi꧁❤ 9667422720 ❤꧂Escorts
Trusted Call~Girls In Rohini Delhi꧁❤ 9667422720 ❤꧂EscortsTrusted Call~Girls In Rohini Delhi꧁❤ 9667422720 ❤꧂Escorts
Trusted Call~Girls In Rohini Delhi꧁❤ 9667422720 ❤꧂Escorts
 
Trusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂Escorts
Trusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂EscortsTrusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂Escorts
Trusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂Escorts
 
9911558886 Cash on Hand Low Costly Russian Call Girls In Naraina Vihar
9911558886 Cash on Hand Low Costly Russian Call Girls In Naraina Vihar9911558886 Cash on Hand Low Costly Russian Call Girls In Naraina Vihar
9911558886 Cash on Hand Low Costly Russian Call Girls In Naraina Vihar
 
Call Us ≽ 9643900018 ≼ Call Girls In Dwarka Sector 7 (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Dwarka Sector 7 (Delhi)Call Us ≽ 9643900018 ≼ Call Girls In Dwarka Sector 7 (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Dwarka Sector 7 (Delhi)
 
Book Call Girls in Anand Vihar Delhi 8800357707 Escorts Service
Book Call Girls in Anand Vihar Delhi 8800357707 Escorts ServiceBook Call Girls in Anand Vihar Delhi 8800357707 Escorts Service
Book Call Girls in Anand Vihar Delhi 8800357707 Escorts Service
 
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
 
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝
 
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR
 
Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)
 
8800357707, Munirka Metro Good Looking For Call Girls And Escort Service Delhi
8800357707, Munirka Metro Good Looking For Call Girls And Escort Service Delhi8800357707, Munirka Metro Good Looking For Call Girls And Escort Service Delhi
8800357707, Munirka Metro Good Looking For Call Girls And Escort Service Delhi
 
Genuine Call Girls In {Mahipalpur Delhi} 9667938988 Indian Russian High Profi...
Genuine Call Girls In {Mahipalpur Delhi} 9667938988 Indian Russian High Profi...Genuine Call Girls In {Mahipalpur Delhi} 9667938988 Indian Russian High Profi...
Genuine Call Girls In {Mahipalpur Delhi} 9667938988 Indian Russian High Profi...
 
9643097474 Full Enjoy @24/7 Call Girls in Hauz Khas Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Hauz Khas Delhi NCR9643097474 Full Enjoy @24/7 Call Girls in Hauz Khas Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Hauz Khas Delhi NCR
 
9953056974 Low Rate Call Girls In Badarpur Delhi NCR
9953056974 Low Rate Call Girls In  Badarpur Delhi NCR9953056974 Low Rate Call Girls In  Badarpur Delhi NCR
9953056974 Low Rate Call Girls In Badarpur Delhi NCR
 
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
 
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝
 
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe NoidaCall Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
 
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
 
Book Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts Service
Book Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts ServiceBook Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts Service
Book Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts Service
 
(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)
(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)
(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)
 
Call Girls In Karnal 8860008073 Doorstep Sector 6 7 8 9 Karnal Escorts Service
Call Girls In Karnal 8860008073 Doorstep Sector 6 7 8 9 Karnal Escorts ServiceCall Girls In Karnal 8860008073 Doorstep Sector 6 7 8 9 Karnal Escorts Service
Call Girls In Karnal 8860008073 Doorstep Sector 6 7 8 9 Karnal Escorts Service
 

Cscu module 05 data backup and disaster recovery

  • 1. 1 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Data Backup and Disaster Recovery Simplifying Security. Module 5
  • 2. Alireza Ghahrood Security Solution Provider : Cyber Space |BigData |Cloud |Virtualization www.about.me/alirezaghahrood | Cell :+98 (912) 1964383 |
  • 3. Monday, May 23, 2011 3 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . CA Technologies Survey Reveals IT Systems Failures Cost Businesses 127 Million Lost Person‐ Hours ISLANDIA, N.Y. ‐ Businesses collectively lose more than 127 million person‐hours annually—or an average of 545 person‐hours per company—in employee productivity due to IT downtime, according to a survey sponsored by CA Technologies (NASDAQ: CA). This loss is equivalent to 63,500 people being unable to work for an entire year. The survey of 2,000 organizations in North America and Europe also found that IT outages are frequent and lengthy—substantially damaging companies’ reputations, staff morale and customer loyalty. Despite this, 56% of organizations in North America and 30% in Europe don’t have a formal and comprehensive disaster recovery policy. http://www.ca.com
  • 4. 4 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . MODULE OBJECTIVESData Backup What Files to Backup and How Often? Online Data Backup Online Backup Service Providers Types of Backup Windows 7: Backup and Restore Data Encryption MAC OS X: Backup and Restore Data Backup Tools Data Recovery Tools Physical Security Physical Security Measures Laptop Theft Physical Security Checklist
  • 5. U L E F L O W 5 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Data Backup Introduction Windows 7 Backup and Restore Data Encryption MAC OS X Backup and Restore Data Backup Tools Data Recovery Tools Physical Security
  • 6. 6 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . DATA BACKUP Backup is the process of making duplicate copies of critical data on backup media such as CD/DVD, USB, external hard disks, etc. The main purpose of backups is to restore the critical data or files when they are accidentally deleted or corrupted Data backup should be the top priority in computer maintenance along with virus protection because it ensures that the data is secure in case of disaster It is easy and cost effective to back up data in comparison to recovering data after a disaster or system crash
  • 7. Copyright © by EC-Council served. Reproduction is Strictly Prohibited.All Rights Re 6 TYPES OF DATA LOSS Human Error Accidental deletion or overwriting of a file or program Software Corruption Software configuration complexity Computer Virus Attack of malicious programs such as virus, worms, and Trojans Hardware Malfunction Hard disk failure, CPU failure, storage device failure, power failure Natural Disaster Fire, flood, storm, and earthquake Corrupt File System Operating system crash and data corruption
  • 8. 8 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . WHAT FILES TO BACKUP AND HOW OFTEN? What Files to Backup? First decide what data present on the system is critical and needs a backup such as: The operating system files purchased with the computer, CDs, software, etc. Important office documents Software downloaded (purchased) from the Internet Contact Information (email address book) Personal photos, music, and videos Any other file that is critical How Often? It is always recommended that the user files are backed up regularly Backup whenever there are changes to important files, so that the latest copy would be available even if the original one is lost/damaged Back up on a predetermined day (for example, every Monday) using the backup software Back up only the modified files on a daily basis
  • 9. ONLINE DATA BACKUP 9 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Online backup or remote backup is the method of offsite data storage where contents of the hard drive are regularly backed up to another computer on the Internet (remote server) It eliminates the risk of data loss due to natural disaster It is an expensive procedure but prevents loss of data in case of disasters due to theft, file corruption, etc. You can securely restore any lost data by using an Internet connection and a Web browser interface Maintain an online backup only for the important files in case the user cannot afford much online backup
  • 10. ONLINE BACKUP SERVICE PROVIDERS 10 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . http://www.backblaze.com http://www.carbonite.com https://spideroak.com https://www.idrive.com
  • 12. Abacus Online Backups http://www.abacusbackups.com IBackup http://www.ibackup.com Box.net http://www.box.net Memeo Backup http://www.memeo.com ADrive http://www.adrive.com CrashPlan http://www.crashplan.com Dropbox https://www.dropbox.com Dr. Backup http://www.drbackup.net 12 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . ONLINE BACKUP SERVICE PROVIDERS
  • 13. Copyright © by EC-Counci eserved. Reproduction is Strictly Prohibited. l s RAll Right 12 Full/Normal Data Backup Incremental Data Backups Differential Data Backup TYPES OF BACKUP It copies all the files, including system files, application files, user files, and operating system The complete set of data is copied to the chosen place or backup media It copies only the files changed or created after the last backup Takes less time and space but makes the job of restoring files difficult It copies only the files changed or created that have been changed from the last incremental or normal backup Takes less time and space and restores data quickly
  • 14. U L E F L O W 14 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Data Backup Introduction Windows 7 Backup and Restore MAC OS X Backup and Restore Data Backup Tools Data Recovery Tools Physical Security Data Encryption
  • 15. Windows Backup allows for creating a duplicate copy of the files and folder on the hard disk and then archiving them to an external storage device If the original hard disk data is erased accidentally or if the hard disk becomes inaccessible, then the user can restore the archived copy of data The files are restored to their previous positions after restoring the backup data Back Up the Data Using Windows Backup 15 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
  • 16. STEPS TO BACKUP DATA 16 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Click Start  Control Panel  type Backup in the search  click Restore data, Files, or Computer click Backup now Select the drive to save the backup and then click Next
  • 17. STEPS TO BACKUP DATA 17 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . In the What do you want to back up? screen, check the option Let Windows choose and click Next Backup in progress appears, which completes the backup process
  • 18. RESTORING DATA 18 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Go to Control Panel  Backup and Restore  Restore my files In Browse or search your backup for files and folders to restore screen, click Browse for folders to restore a folder, and then click Next In the Where do you want to restore your file? screen, check In the original location or In the following location to browse the desired location and then click Restore In the your files have been restored screen, click Finish to complete the restoration process
  • 19. U L E F L O W 19 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Data Backup Introduction Windows 7 Backup and Restore Data Encryption MAC OS X Backup and Restore Data Backup Tools Data Recovery Tools Physical Security
  • 20. SECURING BACKUP ON STORAGE DEVICES WITH ENCRYPTION 20 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Encryption is converting the backup data to a format that is not recognizable Though making backups on external storage media is safe and reliable, the external media may still be stolen or corrupted, making it impossible to restore the data Encrypt the data on the storage devices, such as an USB drive, in order to protect it This makes the data present in the storage device unusable for anyone that is not authorized to use the device Make use of the encryption tools such as TrueCrypt to encrypt the backup data
  • 21. DATA ENCRYPTION TOOL:TRUECRYPT 21 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . TrueCrypt uses various encryption techniques and automatically encrypts the data without any user intervention Encryption Process  Install and launch the Truecrypt program  Create a volume  Select the backup files to encrypt  Select the Encryption Algorithm to be used for encrypting data; click Next to encrypt http://www.truecrypt.org
  • 22. U L E F L O W 22 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Data Backup Introduction Windows 7 Backup and Restore MAC OS X Backup and Restore Data Backup Tools Data Recovery Tools Physical Security Data Encryption
  • 23. Time Machine lets you automatically back up your entire system in Mac OS X v10.5 and Mac OS X 10.6 or later Time Machine keeps an up‐to‐date copy of everything on your Mac – system files, digital photos, music, movies, TV shows, documents, and so forth To launch the Time Machine, navigate to Apple Menu  System Preferences window  click Time Machine icon TIME MACHINE (APPLE SOFTWARE) 23 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
  • 24. Time Machine asks the user when any hard drive is connected to it for the first time to use it as a backup drive Click Use as Backup Disk to open Preferences window to configure the disk as a backup disk In the Time Machine preferences window, check Show Time Machine status in the menu bar to see the status of backup Click Lock to secure the data present in the backup SETTING UP TIME MACHINE 24 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
  • 25. RESTORING FILES FROM TIME MACHINE BACKUPS 25 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Click the Time Machine icon in the Dock Use the timeline on the right side of the window to browse and backup files of a certain date and time Select the file/folder and click the Restore button Connect backup disk
  • 26. U L E F L O W 26 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Data Backup Introduction Windows 7 Backup and Restore MAC OS X Backup and Restore Data Backup Tools Data Recovery Tools Physical Security Data Encryption
  • 27. Windows Data Backup Tool: Acronis True Image Home 2011 http://www.acronis.com Acronis True Image Home 2011 provides home users with reliable and timeless backup and recovery of their home PC's operating system, applications, settings, and personal files It automatically creates incremental backups once every five minutes allowing users to roll back their system, files, and folders to any point in the past It has online storage services to automatically back up valuable data or files over the Internet to a secure location 27 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
  • 28. Windows Data Backup Tool: NovaBACKUP Home Protection NovaBACKUP® Home Protection automatically backs up and protects important files on all of your computers from one easy to use control panel Features: Automatic processes continually update your protection – no need to remember to run backups Central Management makes it easy to stay on top of all of the data in your home Disaster recovery and full disk imaging options allow you to restore your entire system Fast Bit Technology updates your backups with bit level incremental changes 28 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . http://www.novastor.com
  • 29. 29 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . DATA BACKUP TOOLS FOR WINDOWSGenie Backup Manager Home http://www.genie9.com NTI Backup Now http://www.ntibackupnow.com Norton Ghost http://www.symantec.com PowerBackup http://www.cyberlink.com R‐Drive Image http://www.drive‐image.com Backup4all http://www.backup4all.com TurboBackup http://www.filestream.com BounceBack Ultimate http://www.cmsproducts.com
  • 30. 30 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . DATA BACKUP TOOLS FOR WINDOWSOopsBackup http://www.altaro.com Fbackup http://www.backup4all.com SyncBackPro http://www.2brightsparks.com Active@ Disk Image http://www.disk‐image.net Macrium Reflect Free http://www.macrium.com Easeus Todo Backup Home http://www.todo‐backup.com GoodSync http://www.goodsync.com DoubleSafety http://www.doublesafety.com
  • 31. MAC OS X Data Backup Tool: Data Backup Data Backup is a utility that allows you to backup, restore, and synchronize your valuable data with minimal effort Features:  Backup your iTunes or iPhoto files, other important data, or your entire system  Schedule your backups to automatically run at a specific time  Backup to any mounted drive including FireWire, USB, ATA, or networked drives  Creates an exact copy of a folder or a drive, including bootable OS X backups http://www.prosofteng.com 31 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
  • 32. MAC OS X Data Backup Tool: SmartBackup SmartBackup is a backup utility that creates fast and efficient backups of your data, or a full bootable clone of your system It can backup to anything that is mountable on your desktop, to external harddisks, flashdrives, iPods, and any kind of network shares http://freeridecoding.com 32 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
  • 33. 33 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . DATA BACKUP TOOLS FOR MAC OS XSynchronize! Pro X http://www.qdea.com Tri‐BACKUP http://www.tri‐edre.com iBackup http://www.grapefruit.ch MimMac http://www.ascendantsoft.com Roxio Retrospect http://www.retrospect.com SilverKeeper http://www.lacie.com SuperDuper http://www.shirt‐pocket.com Carbon Copy Cloner http://www.bombich.com
  • 34. U L E F L O W 34 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Data Backup Introduction Windows 7 Backup and Restore MAC OS X Backup and Restore Data Backup Tools Data Recovery Tools Physical Security Data Encryption
  • 35. Windows Data Recovery Tool: Recover My Files Recover My Files data recovery software recovers deleted files emptied from the Windows Recycle Bin, or lost due to the format or corruption of a hard drive, virus or Trojan infection, unexpected system shutdown, or software failure 35 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . http://www.recovermyfiles.com
  • 36. Windows Data Recovery Tool:EASEUS DATA RECOVERY WIZARD 36 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . EASEUS Data Recovery Wizard provides a comprehensive data recovery solution for computer users to recover lost data due to partition loss or damage, software crash, virus infection, and unexpected shutdown Recover deleted or lost files emptied from the Recycle Bin File recovery after accidental format, even if you have reinstalled Windows Disk recovery after a hard disk crash Recover office documents, photos, images, videos, music, email, etc. Recover from hard drive, USB drive, memory card, memory stick, camera card, zip, floppy disk, or other storage media http://www.easeus.com
  • 37. 37 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . DATA RECOVERY TOOLS FOR WINDOWSAdvanced Disk Recovery http://www.systweak.com File Scavenger Data Recovery http://www.quetek.com Handy Recovery http://www.handyrecovery.com Windows Data Recovery Software http://www.diskdoctors.net R‐Studio http://www.data‐recovery‐software.net Quick Recovery for Windows http://www.recoveryourdata.com VirtualLab Data Recovery http://www.binarybiz.com GetDataBack http://www.runtime.org
  • 38. 38 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . DATA RECOVERY TOOLS FOR WINDOWS Stellar Phoenix Windows Data Recovery http://www.stellarinfo.com Recuva http://www.piriform.com MiniTool Power Data Recovery http://www.powerdatarecovery.com Partition Wizard Home Edition http://www.minitool‐partitionrecovery.com SoftPerfect File Recovery http://www.softperfect.com Undelete Plus http://undeleteplus.com FreeUndelete http://www.officerecovery.com RecoverPlus Photo Recovery http://www.arcksoft.com
  • 39. MAC OS X Data Recovery Tool: BOOMERANG DATA RECOVERY SOFTWARE 39 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Boomerang Data Recovery Software for MacOS X recovers accidently deleted files, folder, document, lost or damaged partitions, RAID volumes, camera/flash cards, etc. Features:  Recover a complete disk that no longer mounts or is formatted  Re‐assemble RAID volumes and help recover your mission critical data  Scans the entire disk and recover deleted files and documents http://www.boomdrs.com
  • 40. MAC OS X Data Recovery Tool:VirtualLab VirtualLab is non‐destructive data recovery software that recovers deleted files, damaged or missing volumes, formatted disks, iPods, and even photos It performs an exhaustive scan of the drive to locate lost partitions and files http://www.binarybiz.com 40 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
  • 41. 41 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . DATA RECOVERY TOOLS FOR MAC OS XDiskWarrior http://alsoft.com Data Rescue http://www.prosofteng.com AppleXsoft File Recovery for Mac http://www.applexsoft.com Disk Doctors Mac Data Recovery http://www.diskdoctors.net Stellar Phoenix Mac Data Recovery http://www.stellarinfo.com FileSalvage http://subrosasoft.com R‐Studio for Mac http://www.r‐tt.com TechTool Pro http://www.micromat.com
  • 42. U L E F L O W 42 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Data Backup Introduction Windows 7 Backup and Restore MAC OS X Backup and Restore Data Backup Tools Data Recovery Tools Physical Security Data Encryption
  • 43. Physical Security Physical security is the first layer of protection for computers and data It involves the protection of assets such as hardware, networks, and data from attacks that cause loss or damage There are various factors that affect the physical security such as damage, theft, dust, fire, water, flood, earthquakes, etc. Physical Security Prevent any unauthorized access to the computer systems Prevent tampering /stealing of data from the computer systems Protect the integrity of the data stored in the computer Prevent the loss of data/damage to systems against any natural calamities 43 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
  • 44. PHYSICAL SECURITY MEASURES: LOCKS 44 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Locks act as the primary method of controlling the physical access of the information, information systems, and removable storage devices Locks provide different levels of security depending on their design and implementation Locks are used to:  Restrict others from using a computer room  Protect the computer from unauthorized access by locking the doors and windows on the computer premises  Lock the CPU and monitor in order to prevent them from being stolen
  • 45. Copyright © by EC-Council served. Reproduction is Strictly Prohibited.All Rights Re 44 Physical Security Measures: Biometrics Biometrics refers to the identification or identity verification of individuals based on their characteristics Biometric Identification Techniques Fingerprinting Retinal Scanning Iris Scanning Voice Recognition Face Recognition Vein Structure Recognition
  • 46. ight © by EC-Council45 Copyr All Rights Reserved. Reproduction Physical Security Measures: FIRE PREVENTIONFire accidents may occur because of a short circuit, which may cause heavy loss and destruction Fire Preventive Measures Make sure all the emergency doors and corridors are kept clear Use good quality wiring, tools, and equipment Avoid using equipment that gives a mild electrical shock Keep the room dust‐free and remove all the scraps as soon as possible Ensure the trash is emptied regularly At the end of the day, always unplug the appliances Make sure the user knows who to call in an emergency Know how to use a fire extinguisher is Strictly Prohibited.
  • 47. Physical Security Measures: HVAC Considerations HVAC (Heating, Ventilating, and Air Conditioning) is the technology developed for indoor environmental comfort HVAC is used for:  Controlling the temperature  Adequate ventilation  Indoor air quality 47 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
  • 48. Securing Laptops from Theft Laptop theft leads to the disclosure of information such as usernames, passwords, confidential data, and other networking details related to connecting the laptop to the corporate or Internet environment Laptop Security Do’s Note the laptop serial number and keep it safe Choose a laptop skin in order to recognize it easily Report laptop theft immediately Don’ts Do not leave the laptop unattended (in the car or out in the office/home) Do not forget the password and avoid sharing it with others 48 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
  • 49. Copyright © by EC-Council served. Reproduction is Strictly Prohibited.All Rights Re 48 Add third‐party privacy protection for highly sensitive data Consider purchasing laptop’s PC insurance Use strong hardware‐based security Encrypt sensitive data and back up everything on the laptop Set BIOS’s password on the laptop LAPTOP THEFT COUNTERMEASU RES Install tracking tools on the laptop that help trace the location of the stolen laptop
  • 50. MODULE SUMMARY 50 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .  Backup is required in situations such as hardware failure, theft, system crash, and natural disaster  Users need to back up whenever there are changes to important files, so that a latest copy would be available even if the original one is lost/damaged  Online backup or remote backup is the method of offsite data storage where hard drive contents are regularly backed up to another computer on the Internet (remote server)  Normal, Incremental, and Differential are the types of backups in Windows  Physical security involves the protection of assets such as hardware, networks, and data from attacks that cause loss or damage  Laptop theft leads to the disclosure of information such as usernames, passwords, confidential data, and other networking details related to connecting the laptop to the corporate or Internet environment
  • 51. Back up important documents, photos, favorites, email, etc. to CD, DVD, tape or another disk at regular intervals Keep backup data in a safe place Keep multiple backup copies of important data Use encryption techniques to protect backup data Check for automated backup and scheduling features when selecting a backup tool or service as manual backups are vulnerable to human error If you are using an online data backup and recovery service, check service provider’s stability and track record DATA BACKUP CHECKLIST 51 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .