Soumettre la recherche
Mettre en ligne
Cscu module 05 data backup and disaster recovery
•
1 j'aime
•
62 vues
Alireza Ghahrood
Suivre
آگاهی رسانی امنیت اطلاعات 2020-1399
Lire moins
Lire la suite
Services
Signaler
Partager
Signaler
Partager
1 sur 51
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
Backup strategy
Backup strategy
mrscjrobertson
Anti forensic
Anti forensic
Milap Oza
CHROME OS.pptx
CHROME OS.pptx
PREMPRASAD34
Bypass_AV-EDR.pdf
Bypass_AV-EDR.pdf
Farouk2nd
Unix/Linux Basic Commands and Shell Script
Unix/Linux Basic Commands and Shell Script
sbmguys
Data recovery
Data recovery
Ravi Malik
Linux Memory Management
Linux Memory Management
Suvendu Kumar Dash
Linux privilege escalation
Linux privilege escalation
SongchaiDuangpan
Recommandé
Backup strategy
Backup strategy
mrscjrobertson
Anti forensic
Anti forensic
Milap Oza
CHROME OS.pptx
CHROME OS.pptx
PREMPRASAD34
Bypass_AV-EDR.pdf
Bypass_AV-EDR.pdf
Farouk2nd
Unix/Linux Basic Commands and Shell Script
Unix/Linux Basic Commands and Shell Script
sbmguys
Data recovery
Data recovery
Ravi Malik
Linux Memory Management
Linux Memory Management
Suvendu Kumar Dash
Linux privilege escalation
Linux privilege escalation
SongchaiDuangpan
Linux forensics
Linux forensics
Santosh Khadsare
tmux
tmux
Jason Lotito
SITCON2021 Web Security 領航之路
SITCON2021 Web Security 領航之路
Tzu-Ting(Fei) Lin
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
Tehmina Gulfam
Fun with the Hak5 Rubber Ducky
Fun with the Hak5 Rubber Ducky
kieranjacobsen
Linux kernel
Linux kernel
Goutam Sahoo
Linux Memory Management
Linux Memory Management
Ni Zo-Ma
Module 4 Enumeration
Module 4 Enumeration
leminhvuong
03 Data Recovery - Notes
03 Data Recovery - Notes
Kranthi
Android Audio System
Android Audio System
Yi-Hsiang Huang
Data Backup and Recovery.pdf
Data Backup and Recovery.pdf
Ashraf Hossain
Block I/O Layer Tracing: blktrace
Block I/O Layer Tracing: blktrace
Babak Farrokhi
Android Things : Building Embedded Devices
Android Things : Building Embedded Devices
Emertxe Information Technologies Pvt Ltd
Registry forensics
Registry forensics
Prince Boonlia
The Importance Of Computer System Backup Today
The Importance Of Computer System Backup Today
Daniel Nilles
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes
Kranthi
Bypass pfsense
Bypass pfsense
SalmenHAJJI1
Backup
Backup
AboubacarAhamadaRouf
Corso di informatica di base lezione 1 - conoscere il pc
Corso di informatica di base lezione 1 - conoscere il pc
Enrico Mori
Forensic artifacts in modern linux systems
Forensic artifacts in modern linux systems
Gol D Roger
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recovery
Sejahtera Affif
Data loss and data recovery
Data loss and data recovery
HTS Hosting
Contenu connexe
Tendances
Linux forensics
Linux forensics
Santosh Khadsare
tmux
tmux
Jason Lotito
SITCON2021 Web Security 領航之路
SITCON2021 Web Security 領航之路
Tzu-Ting(Fei) Lin
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
Tehmina Gulfam
Fun with the Hak5 Rubber Ducky
Fun with the Hak5 Rubber Ducky
kieranjacobsen
Linux kernel
Linux kernel
Goutam Sahoo
Linux Memory Management
Linux Memory Management
Ni Zo-Ma
Module 4 Enumeration
Module 4 Enumeration
leminhvuong
03 Data Recovery - Notes
03 Data Recovery - Notes
Kranthi
Android Audio System
Android Audio System
Yi-Hsiang Huang
Data Backup and Recovery.pdf
Data Backup and Recovery.pdf
Ashraf Hossain
Block I/O Layer Tracing: blktrace
Block I/O Layer Tracing: blktrace
Babak Farrokhi
Android Things : Building Embedded Devices
Android Things : Building Embedded Devices
Emertxe Information Technologies Pvt Ltd
Registry forensics
Registry forensics
Prince Boonlia
The Importance Of Computer System Backup Today
The Importance Of Computer System Backup Today
Daniel Nilles
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes
Kranthi
Bypass pfsense
Bypass pfsense
SalmenHAJJI1
Backup
Backup
AboubacarAhamadaRouf
Corso di informatica di base lezione 1 - conoscere il pc
Corso di informatica di base lezione 1 - conoscere il pc
Enrico Mori
Forensic artifacts in modern linux systems
Forensic artifacts in modern linux systems
Gol D Roger
Tendances
(20)
Linux forensics
Linux forensics
tmux
tmux
SITCON2021 Web Security 領航之路
SITCON2021 Web Security 領航之路
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
Fun with the Hak5 Rubber Ducky
Fun with the Hak5 Rubber Ducky
Linux kernel
Linux kernel
Linux Memory Management
Linux Memory Management
Module 4 Enumeration
Module 4 Enumeration
03 Data Recovery - Notes
03 Data Recovery - Notes
Android Audio System
Android Audio System
Data Backup and Recovery.pdf
Data Backup and Recovery.pdf
Block I/O Layer Tracing: blktrace
Block I/O Layer Tracing: blktrace
Android Things : Building Embedded Devices
Android Things : Building Embedded Devices
Registry forensics
Registry forensics
The Importance Of Computer System Backup Today
The Importance Of Computer System Backup Today
05 Duplication and Preservation of Digital evidence - Notes
05 Duplication and Preservation of Digital evidence - Notes
Bypass pfsense
Bypass pfsense
Backup
Backup
Corso di informatica di base lezione 1 - conoscere il pc
Corso di informatica di base lezione 1 - conoscere il pc
Forensic artifacts in modern linux systems
Forensic artifacts in modern linux systems
Similaire à Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recovery
Sejahtera Affif
Data loss and data recovery
Data loss and data recovery
HTS Hosting
3170725_Unit-4.pptx
3170725_Unit-4.pptx
YashPatel132112
Backing up your digital life - PC, Mac or Android
Backing up your digital life - PC, Mac or Android
clcewing
Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16
Ken Tucker
Portable Data Recovery
Portable Data Recovery
iloraiava
Data recovery
Data recovery
bhaumik_c
Backup data
Backup data
Zaibi Gondal
Data Recovered Archives
Data Recovered Archives
eldige19g0
Power Point example for module 3 assignment
Power Point example for module 3 assignment
naterator
UNIT 2 P8
UNIT 2 P8
OriginalGSM
Data recovery power point
Data recovery power point
tutannandi
Ch 16 system security
Ch 16 system security
Khan Yousafzai
Stellar phoenix dvd data recovery
Stellar phoenix dvd data recovery
smith bush
A Backup and Restore Software for Android System
A Backup and Restore Software for Android System
IRJET Journal
Backing up your data
Backing up your data
aaberra
How to Recover Deleted Files on Windows 10/11?
How to Recover Deleted Files on Windows 10/11?
AffanIT1
How to clean windows 8 or 8.1 hard drive
How to clean windows 8 or 8.1 hard drive
scarlet christer
2.6 backup and recovery
2.6 backup and recovery
mrmwood
Data backup and recovery process
Data backup and recovery process
JitendraKumarKar2
Similaire à Cscu module 05 data backup and disaster recovery
(20)
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recovery
Data loss and data recovery
Data loss and data recovery
3170725_Unit-4.pptx
3170725_Unit-4.pptx
Backing up your digital life - PC, Mac or Android
Backing up your digital life - PC, Mac or Android
Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16
Portable Data Recovery
Portable Data Recovery
Data recovery
Data recovery
Backup data
Backup data
Data Recovered Archives
Data Recovered Archives
Power Point example for module 3 assignment
Power Point example for module 3 assignment
UNIT 2 P8
UNIT 2 P8
Data recovery power point
Data recovery power point
Ch 16 system security
Ch 16 system security
Stellar phoenix dvd data recovery
Stellar phoenix dvd data recovery
A Backup and Restore Software for Android System
A Backup and Restore Software for Android System
Backing up your data
Backing up your data
How to Recover Deleted Files on Windows 10/11?
How to Recover Deleted Files on Windows 10/11?
How to clean windows 8 or 8.1 hard drive
How to clean windows 8 or 8.1 hard drive
2.6 backup and recovery
2.6 backup and recovery
Data backup and recovery process
Data backup and recovery process
Plus de Alireza Ghahrood
Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final
Alireza Ghahrood
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Alireza Ghahrood
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Alireza Ghahrood
NATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
Alireza Ghahrood
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
Alireza Ghahrood
ANT Catalog
ANT Catalog
Alireza Ghahrood
Optional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet Dossier
Alireza Ghahrood
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
Alireza Ghahrood
http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/
Alireza Ghahrood
Power your businesswith risk informed decisions
Power your businesswith risk informed decisions
Alireza Ghahrood
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Alireza Ghahrood
participatea in the identity management lifecycle
participatea in the identity management lifecycle
Alireza Ghahrood
implement access controls
implement access controls
Alireza Ghahrood
implement authentication mechanisms
implement authentication mechanisms
Alireza Ghahrood
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
Alireza Ghahrood
Identity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial Institutions
Alireza Ghahrood
Cscu module 12 information security and legal compliance
Cscu module 12 information security and legal compliance
Alireza Ghahrood
Cscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theft
Alireza Ghahrood
Cscu module 06 internet security
Cscu module 06 internet security
Alireza Ghahrood
Cscu module 08 securing online transactions
Cscu module 08 securing online transactions
Alireza Ghahrood
Plus de Alireza Ghahrood
(20)
Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
NATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
ANT Catalog
ANT Catalog
Optional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet Dossier
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/
Power your businesswith risk informed decisions
Power your businesswith risk informed decisions
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
participatea in the identity management lifecycle
participatea in the identity management lifecycle
implement access controls
implement access controls
implement authentication mechanisms
implement authentication mechanisms
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
Identity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial Institutions
Cscu module 12 information security and legal compliance
Cscu module 12 information security and legal compliance
Cscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theft
Cscu module 06 internet security
Cscu module 06 internet security
Cscu module 08 securing online transactions
Cscu module 08 securing online transactions
Dernier
Trusted Call~Girls In Rohini Delhi꧁❤ 9667422720 ❤꧂Escorts
Trusted Call~Girls In Rohini Delhi꧁❤ 9667422720 ❤꧂Escorts
Lipikasharma29
Trusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂Escorts
Trusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂Escorts
Lipikasharma29
9911558886 Cash on Hand Low Costly Russian Call Girls In Naraina Vihar
9911558886 Cash on Hand Low Costly Russian Call Girls In Naraina Vihar
malikasharmakk1
Call Us ≽ 9643900018 ≼ Call Girls In Dwarka Sector 7 (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Dwarka Sector 7 (Delhi)
ayushiverma1100
Book Call Girls in Anand Vihar Delhi 8800357707 Escorts Service
Book Call Girls in Anand Vihar Delhi 8800357707 Escorts Service
monikaservice1
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
thapariya601
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝
thapagita
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR
thapariya601
Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)
ayushiverma1100
8800357707, Munirka Metro Good Looking For Call Girls And Escort Service Delhi
8800357707, Munirka Metro Good Looking For Call Girls And Escort Service Delhi
monikaservice1
Genuine Call Girls In {Mahipalpur Delhi} 9667938988 Indian Russian High Profi...
Genuine Call Girls In {Mahipalpur Delhi} 9667938988 Indian Russian High Profi...
aakahthapa70
9643097474 Full Enjoy @24/7 Call Girls in Hauz Khas Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Hauz Khas Delhi NCR
thapariya601
9953056974 Low Rate Call Girls In Badarpur Delhi NCR
9953056974 Low Rate Call Girls In Badarpur Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
thapariya601
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝
thapagita
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
Delhi Escorts Service
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
thapariya601
Book Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts Service
Book Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts Service
monikaservice1
(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)
(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)
riyaescorts54
Call Girls In Karnal 8860008073 Doorstep Sector 6 7 8 9 Karnal Escorts Service
Call Girls In Karnal 8860008073 Doorstep Sector 6 7 8 9 Karnal Escorts Service
Apsara Of India
Dernier
(20)
Trusted Call~Girls In Rohini Delhi꧁❤ 9667422720 ❤꧂Escorts
Trusted Call~Girls In Rohini Delhi꧁❤ 9667422720 ❤꧂Escorts
Trusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂Escorts
Trusted Call~Girls In Shahdara Delhi ꧁❤ 9667422720 ❤꧂Escorts
9911558886 Cash on Hand Low Costly Russian Call Girls In Naraina Vihar
9911558886 Cash on Hand Low Costly Russian Call Girls In Naraina Vihar
Call Us ≽ 9643900018 ≼ Call Girls In Dwarka Sector 7 (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Dwarka Sector 7 (Delhi)
Book Call Girls in Anand Vihar Delhi 8800357707 Escorts Service
Book Call Girls in Anand Vihar Delhi 8800357707 Escorts Service
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝
Call Girls in Majnu ka Tilla Delhi 💯 Call Us 🔝9711014705🔝
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Paschim Vihar Delhi NCR
Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)
Call Us ≽ 9643900018 ≼ Call Girls In Lado Sarai (Delhi)
8800357707, Munirka Metro Good Looking For Call Girls And Escort Service Delhi
8800357707, Munirka Metro Good Looking For Call Girls And Escort Service Delhi
Genuine Call Girls In {Mahipalpur Delhi} 9667938988 Indian Russian High Profi...
Genuine Call Girls In {Mahipalpur Delhi} 9667938988 Indian Russian High Profi...
9643097474 Full Enjoy @24/7 Call Girls in Hauz Khas Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls in Hauz Khas Delhi NCR
9953056974 Low Rate Call Girls In Badarpur Delhi NCR
9953056974 Low Rate Call Girls In Badarpur Delhi NCR
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Laxmi Nagar Delhi Ncr
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝
Call Girls In Dwarka Delhi 💯Call Us 🔝9711014705🔝
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
9643097474 Full Enjoy @24/7 Call Girls In Munirka Delhi Ncr
Book Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts Service
Book Call Girls In Gurgaon Sector 29 Call 8800357707 Escorts Service
(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)
(9818099198) Noida Escorts Service Sector 60 (NOIDA CALL GIRLS)
Call Girls In Karnal 8860008073 Doorstep Sector 6 7 8 9 Karnal Escorts Service
Call Girls In Karnal 8860008073 Doorstep Sector 6 7 8 9 Karnal Escorts Service
Cscu module 05 data backup and disaster recovery
1.
1 Copyright ©
by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Data Backup and Disaster Recovery Simplifying Security. Module 5
2.
Alireza Ghahrood Security Solution
Provider : Cyber Space |BigData |Cloud |Virtualization www.about.me/alirezaghahrood | Cell :+98 (912) 1964383 |
3.
Monday, May 23,
2011 3 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . CA Technologies Survey Reveals IT Systems Failures Cost Businesses 127 Million Lost Person‐ Hours ISLANDIA, N.Y. ‐ Businesses collectively lose more than 127 million person‐hours annually—or an average of 545 person‐hours per company—in employee productivity due to IT downtime, according to a survey sponsored by CA Technologies (NASDAQ: CA). This loss is equivalent to 63,500 people being unable to work for an entire year. The survey of 2,000 organizations in North America and Europe also found that IT outages are frequent and lengthy—substantially damaging companies’ reputations, staff morale and customer loyalty. Despite this, 56% of organizations in North America and 30% in Europe don’t have a formal and comprehensive disaster recovery policy. http://www.ca.com
4.
4 C O P
Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . MODULE OBJECTIVESData Backup What Files to Backup and How Often? Online Data Backup Online Backup Service Providers Types of Backup Windows 7: Backup and Restore Data Encryption MAC OS X: Backup and Restore Data Backup Tools Data Recovery Tools Physical Security Physical Security Measures Laptop Theft Physical Security Checklist
5.
U L E F L O W 5 C O P
Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Data Backup Introduction Windows 7 Backup and Restore Data Encryption MAC OS X Backup and Restore Data Backup Tools Data Recovery Tools Physical Security
6.
6 C O P
Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . DATA BACKUP Backup is the process of making duplicate copies of critical data on backup media such as CD/DVD, USB, external hard disks, etc. The main purpose of backups is to restore the critical data or files when they are accidentally deleted or corrupted Data backup should be the top priority in computer maintenance along with virus protection because it ensures that the data is secure in case of disaster It is easy and cost effective to back up data in comparison to recovering data after a disaster or system crash
7.
Copyright © by
EC-Council served. Reproduction is Strictly Prohibited.All Rights Re 6 TYPES OF DATA LOSS Human Error Accidental deletion or overwriting of a file or program Software Corruption Software configuration complexity Computer Virus Attack of malicious programs such as virus, worms, and Trojans Hardware Malfunction Hard disk failure, CPU failure, storage device failure, power failure Natural Disaster Fire, flood, storm, and earthquake Corrupt File System Operating system crash and data corruption
8.
8 C O P
Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . WHAT FILES TO BACKUP AND HOW OFTEN? What Files to Backup? First decide what data present on the system is critical and needs a backup such as: The operating system files purchased with the computer, CDs, software, etc. Important office documents Software downloaded (purchased) from the Internet Contact Information (email address book) Personal photos, music, and videos Any other file that is critical How Often? It is always recommended that the user files are backed up regularly Backup whenever there are changes to important files, so that the latest copy would be available even if the original one is lost/damaged Back up on a predetermined day (for example, every Monday) using the backup software Back up only the modified files on a daily basis
9.
ONLINE DATA BACKUP 9 C O
P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Online backup or remote backup is the method of offsite data storage where contents of the hard drive are regularly backed up to another computer on the Internet (remote server) It eliminates the risk of data loss due to natural disaster It is an expensive procedure but prevents loss of data in case of disasters due to theft, file corruption, etc. You can securely restore any lost data by using an Internet connection and a Web browser interface Maintain an online backup only for the important files in case the user cannot afford much online backup
10.
ONLINE BACKUP SERVICE PROVIDERS 10 C O
P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . http://www.backblaze.com http://www.carbonite.com https://spideroak.com https://www.idrive.com
11.
Acronis http://www.acronis.com SugarSync http://www.sugarsync.com Mozy https://mozy.com Memopal http://memopal.com SafeCopy http://www.safecopybackup.com ElephantDrive http://www.elephantdrive.com Jungledisk http://www.paragon‐software.com SOS Online Backup http://www.sosonlinebackup.com 11 C
O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . ONLINE BACKUP SERVICE PROVIDERS
12.
Abacus Online Backups http://www.abacusbackups.com IBackup http://www.ibackup.com Box.net http://www.box.net Memeo
Backup http://www.memeo.com ADrive http://www.adrive.com CrashPlan http://www.crashplan.com Dropbox https://www.dropbox.com Dr. Backup http://www.drbackup.net 12 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . ONLINE BACKUP SERVICE PROVIDERS
13.
Copyright © by
EC-Counci eserved. Reproduction is Strictly Prohibited. l s RAll Right 12 Full/Normal Data Backup Incremental Data Backups Differential Data Backup TYPES OF BACKUP It copies all the files, including system files, application files, user files, and operating system The complete set of data is copied to the chosen place or backup media It copies only the files changed or created after the last backup Takes less time and space but makes the job of restoring files difficult It copies only the files changed or created that have been changed from the last incremental or normal backup Takes less time and space and restores data quickly
14.
U L E F L O W 14 C O P
Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Data Backup Introduction Windows 7 Backup and Restore MAC OS X Backup and Restore Data Backup Tools Data Recovery Tools Physical Security Data Encryption
15.
Windows Backup allows
for creating a duplicate copy of the files and folder on the hard disk and then archiving them to an external storage device If the original hard disk data is erased accidentally or if the hard disk becomes inaccessible, then the user can restore the archived copy of data The files are restored to their previous positions after restoring the backup data Back Up the Data Using Windows Backup 15 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
16.
STEPS TO BACKUP DATA 16 C
O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Click Start Control Panel type Backup in the search click Restore data, Files, or Computer click Backup now Select the drive to save the backup and then click Next
17.
STEPS TO BACKUP DATA 17 C
O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . In the What do you want to back up? screen, check the option Let Windows choose and click Next Backup in progress appears, which completes the backup process
18.
RESTORING DATA 18 C O P
Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Go to Control Panel Backup and Restore Restore my files In Browse or search your backup for files and folders to restore screen, click Browse for folders to restore a folder, and then click Next In the Where do you want to restore your file? screen, check In the original location or In the following location to browse the desired location and then click Restore In the your files have been restored screen, click Finish to complete the restoration process
19.
U L E F L O W 19 C O P
Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Data Backup Introduction Windows 7 Backup and Restore Data Encryption MAC OS X Backup and Restore Data Backup Tools Data Recovery Tools Physical Security
20.
SECURING BACKUP ON STORAGE DEVICES
WITH ENCRYPTION 20 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Encryption is converting the backup data to a format that is not recognizable Though making backups on external storage media is safe and reliable, the external media may still be stolen or corrupted, making it impossible to restore the data Encrypt the data on the storage devices, such as an USB drive, in order to protect it This makes the data present in the storage device unusable for anyone that is not authorized to use the device Make use of the encryption tools such as TrueCrypt to encrypt the backup data
21.
DATA ENCRYPTION TOOL:TRUECRYPT 21 C O P
Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . TrueCrypt uses various encryption techniques and automatically encrypts the data without any user intervention Encryption Process Install and launch the Truecrypt program Create a volume Select the backup files to encrypt Select the Encryption Algorithm to be used for encrypting data; click Next to encrypt http://www.truecrypt.org
22.
U L E F L O W 22 C O P
Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Data Backup Introduction Windows 7 Backup and Restore MAC OS X Backup and Restore Data Backup Tools Data Recovery Tools Physical Security Data Encryption
23.
Time Machine lets
you automatically back up your entire system in Mac OS X v10.5 and Mac OS X 10.6 or later Time Machine keeps an up‐to‐date copy of everything on your Mac – system files, digital photos, music, movies, TV shows, documents, and so forth To launch the Time Machine, navigate to Apple Menu System Preferences window click Time Machine icon TIME MACHINE (APPLE SOFTWARE) 23 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
24.
Time Machine asks
the user when any hard drive is connected to it for the first time to use it as a backup drive Click Use as Backup Disk to open Preferences window to configure the disk as a backup disk In the Time Machine preferences window, check Show Time Machine status in the menu bar to see the status of backup Click Lock to secure the data present in the backup SETTING UP TIME MACHINE 24 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
25.
RESTORING FILES FROM TIME MACHINE BACKUPS 25 C
O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Click the Time Machine icon in the Dock Use the timeline on the right side of the window to browse and backup files of a certain date and time Select the file/folder and click the Restore button Connect backup disk
26.
U L E F L O W 26 C O P
Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Data Backup Introduction Windows 7 Backup and Restore MAC OS X Backup and Restore Data Backup Tools Data Recovery Tools Physical Security Data Encryption
27.
Windows Data Backup
Tool: Acronis True Image Home 2011 http://www.acronis.com Acronis True Image Home 2011 provides home users with reliable and timeless backup and recovery of their home PC's operating system, applications, settings, and personal files It automatically creates incremental backups once every five minutes allowing users to roll back their system, files, and folders to any point in the past It has online storage services to automatically back up valuable data or files over the Internet to a secure location 27 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
28.
Windows Data Backup
Tool: NovaBACKUP Home Protection NovaBACKUP® Home Protection automatically backs up and protects important files on all of your computers from one easy to use control panel Features: Automatic processes continually update your protection – no need to remember to run backups Central Management makes it easy to stay on top of all of the data in your home Disaster recovery and full disk imaging options allow you to restore your entire system Fast Bit Technology updates your backups with bit level incremental changes 28 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . http://www.novastor.com
29.
29 C O P
Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . DATA BACKUP TOOLS FOR WINDOWSGenie Backup Manager Home http://www.genie9.com NTI Backup Now http://www.ntibackupnow.com Norton Ghost http://www.symantec.com PowerBackup http://www.cyberlink.com R‐Drive Image http://www.drive‐image.com Backup4all http://www.backup4all.com TurboBackup http://www.filestream.com BounceBack Ultimate http://www.cmsproducts.com
30.
30 C O P
Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . DATA BACKUP TOOLS FOR WINDOWSOopsBackup http://www.altaro.com Fbackup http://www.backup4all.com SyncBackPro http://www.2brightsparks.com Active@ Disk Image http://www.disk‐image.net Macrium Reflect Free http://www.macrium.com Easeus Todo Backup Home http://www.todo‐backup.com GoodSync http://www.goodsync.com DoubleSafety http://www.doublesafety.com
31.
MAC OS X
Data Backup Tool: Data Backup Data Backup is a utility that allows you to backup, restore, and synchronize your valuable data with minimal effort Features: Backup your iTunes or iPhoto files, other important data, or your entire system Schedule your backups to automatically run at a specific time Backup to any mounted drive including FireWire, USB, ATA, or networked drives Creates an exact copy of a folder or a drive, including bootable OS X backups http://www.prosofteng.com 31 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
32.
MAC OS X
Data Backup Tool: SmartBackup SmartBackup is a backup utility that creates fast and efficient backups of your data, or a full bootable clone of your system It can backup to anything that is mountable on your desktop, to external harddisks, flashdrives, iPods, and any kind of network shares http://freeridecoding.com 32 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
33.
33 C O P
Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . DATA BACKUP TOOLS FOR MAC OS XSynchronize! Pro X http://www.qdea.com Tri‐BACKUP http://www.tri‐edre.com iBackup http://www.grapefruit.ch MimMac http://www.ascendantsoft.com Roxio Retrospect http://www.retrospect.com SilverKeeper http://www.lacie.com SuperDuper http://www.shirt‐pocket.com Carbon Copy Cloner http://www.bombich.com
34.
U L E F L O W 34 C O P
Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Data Backup Introduction Windows 7 Backup and Restore MAC OS X Backup and Restore Data Backup Tools Data Recovery Tools Physical Security Data Encryption
35.
Windows Data Recovery
Tool: Recover My Files Recover My Files data recovery software recovers deleted files emptied from the Windows Recycle Bin, or lost due to the format or corruption of a hard drive, virus or Trojan infection, unexpected system shutdown, or software failure 35 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . http://www.recovermyfiles.com
36.
Windows Data Recovery
Tool:EASEUS DATA RECOVERY WIZARD 36 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . EASEUS Data Recovery Wizard provides a comprehensive data recovery solution for computer users to recover lost data due to partition loss or damage, software crash, virus infection, and unexpected shutdown Recover deleted or lost files emptied from the Recycle Bin File recovery after accidental format, even if you have reinstalled Windows Disk recovery after a hard disk crash Recover office documents, photos, images, videos, music, email, etc. Recover from hard drive, USB drive, memory card, memory stick, camera card, zip, floppy disk, or other storage media http://www.easeus.com
37.
37 C O P
Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . DATA RECOVERY TOOLS FOR WINDOWSAdvanced Disk Recovery http://www.systweak.com File Scavenger Data Recovery http://www.quetek.com Handy Recovery http://www.handyrecovery.com Windows Data Recovery Software http://www.diskdoctors.net R‐Studio http://www.data‐recovery‐software.net Quick Recovery for Windows http://www.recoveryourdata.com VirtualLab Data Recovery http://www.binarybiz.com GetDataBack http://www.runtime.org
38.
38 C O P
Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . DATA RECOVERY TOOLS FOR WINDOWS Stellar Phoenix Windows Data Recovery http://www.stellarinfo.com Recuva http://www.piriform.com MiniTool Power Data Recovery http://www.powerdatarecovery.com Partition Wizard Home Edition http://www.minitool‐partitionrecovery.com SoftPerfect File Recovery http://www.softperfect.com Undelete Plus http://undeleteplus.com FreeUndelete http://www.officerecovery.com RecoverPlus Photo Recovery http://www.arcksoft.com
39.
MAC OS X
Data Recovery Tool: BOOMERANG DATA RECOVERY SOFTWARE 39 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Boomerang Data Recovery Software for MacOS X recovers accidently deleted files, folder, document, lost or damaged partitions, RAID volumes, camera/flash cards, etc. Features: Recover a complete disk that no longer mounts or is formatted Re‐assemble RAID volumes and help recover your mission critical data Scans the entire disk and recover deleted files and documents http://www.boomdrs.com
40.
MAC OS X
Data Recovery Tool:VirtualLab VirtualLab is non‐destructive data recovery software that recovers deleted files, damaged or missing volumes, formatted disks, iPods, and even photos It performs an exhaustive scan of the drive to locate lost partitions and files http://www.binarybiz.com 40 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
41.
41 C O P
Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . DATA RECOVERY TOOLS FOR MAC OS XDiskWarrior http://alsoft.com Data Rescue http://www.prosofteng.com AppleXsoft File Recovery for Mac http://www.applexsoft.com Disk Doctors Mac Data Recovery http://www.diskdoctors.net Stellar Phoenix Mac Data Recovery http://www.stellarinfo.com FileSalvage http://subrosasoft.com R‐Studio for Mac http://www.r‐tt.com TechTool Pro http://www.micromat.com
42.
U L E F L O W 42 C O P
Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Data Backup Introduction Windows 7 Backup and Restore MAC OS X Backup and Restore Data Backup Tools Data Recovery Tools Physical Security Data Encryption
43.
Physical Security Physical security
is the first layer of protection for computers and data It involves the protection of assets such as hardware, networks, and data from attacks that cause loss or damage There are various factors that affect the physical security such as damage, theft, dust, fire, water, flood, earthquakes, etc. Physical Security Prevent any unauthorized access to the computer systems Prevent tampering /stealing of data from the computer systems Protect the integrity of the data stored in the computer Prevent the loss of data/damage to systems against any natural calamities 43 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
44.
PHYSICAL SECURITY MEASURES: LOCKS 44 C O
P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Locks act as the primary method of controlling the physical access of the information, information systems, and removable storage devices Locks provide different levels of security depending on their design and implementation Locks are used to: Restrict others from using a computer room Protect the computer from unauthorized access by locking the doors and windows on the computer premises Lock the CPU and monitor in order to prevent them from being stolen
45.
Copyright © by
EC-Council served. Reproduction is Strictly Prohibited.All Rights Re 44 Physical Security Measures: Biometrics Biometrics refers to the identification or identity verification of individuals based on their characteristics Biometric Identification Techniques Fingerprinting Retinal Scanning Iris Scanning Voice Recognition Face Recognition Vein Structure Recognition
46.
ight © by
EC-Council45 Copyr All Rights Reserved. Reproduction Physical Security Measures: FIRE PREVENTIONFire accidents may occur because of a short circuit, which may cause heavy loss and destruction Fire Preventive Measures Make sure all the emergency doors and corridors are kept clear Use good quality wiring, tools, and equipment Avoid using equipment that gives a mild electrical shock Keep the room dust‐free and remove all the scraps as soon as possible Ensure the trash is emptied regularly At the end of the day, always unplug the appliances Make sure the user knows who to call in an emergency Know how to use a fire extinguisher is Strictly Prohibited.
47.
Physical Security Measures: HVAC
Considerations HVAC (Heating, Ventilating, and Air Conditioning) is the technology developed for indoor environmental comfort HVAC is used for: Controlling the temperature Adequate ventilation Indoor air quality 47 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
48.
Securing Laptops from
Theft Laptop theft leads to the disclosure of information such as usernames, passwords, confidential data, and other networking details related to connecting the laptop to the corporate or Internet environment Laptop Security Do’s Note the laptop serial number and keep it safe Choose a laptop skin in order to recognize it easily Report laptop theft immediately Don’ts Do not leave the laptop unattended (in the car or out in the office/home) Do not forget the password and avoid sharing it with others 48 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
49.
Copyright © by
EC-Council served. Reproduction is Strictly Prohibited.All Rights Re 48 Add third‐party privacy protection for highly sensitive data Consider purchasing laptop’s PC insurance Use strong hardware‐based security Encrypt sensitive data and back up everything on the laptop Set BIOS’s password on the laptop LAPTOP THEFT COUNTERMEASU RES Install tracking tools on the laptop that help trace the location of the stolen laptop
50.
MODULE SUMMARY 50 C O P
Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Backup is required in situations such as hardware failure, theft, system crash, and natural disaster Users need to back up whenever there are changes to important files, so that a latest copy would be available even if the original one is lost/damaged Online backup or remote backup is the method of offsite data storage where hard drive contents are regularly backed up to another computer on the Internet (remote server) Normal, Incremental, and Differential are the types of backups in Windows Physical security involves the protection of assets such as hardware, networks, and data from attacks that cause loss or damage Laptop theft leads to the disclosure of information such as usernames, passwords, confidential data, and other networking details related to connecting the laptop to the corporate or Internet environment
51.
Back up important
documents, photos, favorites, email, etc. to CD, DVD, tape or another disk at regular intervals Keep backup data in a safe place Keep multiple backup copies of important data Use encryption techniques to protect backup data Check for automated backup and scheduling features when selecting a backup tool or service as manual backups are vulnerable to human error If you are using an online data backup and recovery service, check service provider’s stability and track record DATA BACKUP CHECKLIST 51 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
Télécharger maintenant