Topic 7 - Recovery Strategies and Tool
Topic 7 - Recovery Strategies and Tool
Topic 7 - Recovery Strategies and Tool
1
Contents
2
Preventing Data Loss
• What is meant by Data Loss Prevention?
“Data loss/leak prevention solution is a system that is designed to
detect potential data breach / data ex-filtration transmissions and
prevent them by monitoring, detecting and blocking sensitive data
while in-use (endpoint actions), in-motion (network traffic), and at-
rest (data storage).“[1]
Good definition
http://csrc.nist.gov/groups/SNS/rbac/documents/data-loss.pdf
[1] http://en.wikipedia.org/wiki/Data_loss_prevention_software
3
Preventing Data Loss-continue
• Organizations should take the following steps to protect data
against loss:
5
Preventing Data Loss-continue
The up-front cost may be a bit more, but in the long run, the time,
money, and effort spent on a custom solution will be far greater.
6
Preventing Data Loss-continue
• Identify where holes or exit points where leaks may occur:
7
Developing an Effective
Data Backup Strategy
• Three different levels of solution
▪ Data in Motion
Data which uses HTTP, FTP, IM,
P2P and SMTP protocols are
mirrored in the DLP server for
inspection where visibility is
enhanced.
▪ Data at Rest
Data in file servers, databases,
hosts computers set for file
sharing, etc.
8
Developing an Effective
Data Backup Strategy
9
Developing an Effective
Data Backup Strategy-continue
10
Developing an Effective
Data Backup Strategy-continue
• Incremental
▪ An incremental backups take backup from more points in
time and organize the data into increments of change
between points in time.
▪ A full backup is made on specific timeframe i.e. weekly or
monthly and incremental backups are made after successive
time periods i.e. daily.
▪ Restore will from the last full backup taken before the data
loss, and then applying in turn each of the incremental
backups since then.
11
Developing an Effective
Data Backup Strategy-continue
• Differential
▪ Backup the data that has changed since the last full backup.
▪ Advantage - only a maximum of two data sets are needed to
restore the data.
▪ Disadvantage - the time to perform the differential backup
increases when the last full backup was done, i.e.
accumulated changes in data
▪ Restoring an entire system would require starting from the
most recent full backup and then applying just the last
differential backup since the last full backup.
12
Developing an Effective
Data Backup Strategy-continue
13
Difference Between Full, Differential and
Incremental Backups
14
Backup Techniques
• Disk Mirroring
▪ Disk mirroring involves creating an exact bit-by-bit copy of all
data on a physical disk drive.
▪ The mirrored disks are stored off-site and kept synchronized.
This way, if the primary disk fails, important data can be
accessed from the other disk.
▪ Disk mirroring can be done in two ways:
• Synchronous mirroring: The disk is updated on every write
request, which can affect application performance.
• Asynchronous mirroring: Multiple changes to the primary disks
are reflected in the secondary mirrored disk at predetermined
intervals, which does not require an uninterrupted high-
bandwidth connection.
15
Backup Techniques-continue
▪ Disk mirroring has a few
drawbacks.
▪ If a file is deleted from the
primary disk, it is also deleted
from the secondary disk.
▪ Also, any effects from viruses
or data theft will be
synchronized.
▪ Establishing a disk mirroring
infrastructure may require
additional resources and
continuous maintenance. Disk Mirroring
Source:https://software.fujitsu.com/jp/manual/manualfiles/
16
Backup Techniques-continue
Source:https://software.fujitsu.com/jp/manual/manualfiles/
17
Backup Techniques-continue
Source:https://software.fujitsu.com/jp/manual/manualfiles/
18
Backup Techniques-continue
• Snapshots
▪ A storage snapshot contains a set of reference markers that
point to data stored on a disk drive, on a tape, or in a storage
area network (SAN). It streamlines access to stored data and
hastens the data recovery process.
19
Backup Techniques-continue
20
Backup Techniques-continue
• Continuous Data Protection (CDP)
▪ CDP, also known as continuous backup or synchronous
mirroring, involves backing up data by automatically saving a
copy of every change made to those data.
21
Backup Techniques-continue
22
Backup Techniques-continue
• Parity Protection
▪ Parity protection involves creating a parity disk from all the
available disks in the array.
▪ If any disk in the array fails, the parity disk can be used to
recover the data from the failed disk.
▪ Also, any threat that affects one disk could also affect the
parity disk.
23
Backup Techniques-continue
Parity Protection
Source: https://www.fujitsu.com/global/about/resources/news/press-releases/
24
Backup and Recovery Checklist
• Backup Checklist
25
Backup and Recovery Checklist-continue
26
Backup and Recovery Checklist-continue
27
Backup and Recovery Checklist-continue
28
Backup and Recovery Checklist-continue
29
Backup and Recovery Checklist-continue
30
Backup and Recovery Checklist-continue
31
Backup and Recovery Checklist-continue
• Storage & Recovery Checklist
32
Backup and Recovery Checklist-continue
33
Backup and Recovery Checklist-continue
34
Backup and Recovery Checklist-continue
35
Backup and Recovery Checklist-continue
36
Data Backup and Recovery Tools
• Open Source VMware Backup Solution
▪ Keeping several copies of VM data;
▪ Storing VMware backups in multiple locations;
▪ Providing complete copies of systems, down to every last
document;
▪ Being independent and not relying on any single part of
internal infrastructure;
▪ Having the ability to backup applications inside VM as well,
such as databases, ERP, CRM ‘s, etc.
37
Data Backup and Recovery Tools-continue
• Symantec NetBackup PureDisk
▪ NetBackup PureDisk is the deduplication engine for
NetBackup, enabling efficient, storage-optimized data
protection for the data center, remote office and virtual
environments.
38
Summary
• Have considered
▪ Preventing Data Loss
▪ Developing an Effective Data Backup Strategy
▪ Backup Techniques
▪ Backup and Recovery Checklist
▪ Data Backup and Recovery Tools
39
Recommended Textbooks and References
Recommended textbooks:
[1] Corey Schou, Steven Hernandez (2014). Information Assurance Handbook:
Effective Computer Security and Risk Management Strategies, ISBN-13:
978- 0071821650, McGraw Hill.
[2] Disaster Recovery (2011). EC-Council | Press. ISBN-13: 9781435488700,
Cengage Learning.
Recommended reference:
[1] Kim, Michael G.Solomon (2013). Fundamentals of Information Systems
Security (Jones & Bartlett Learning Information Systems Security &
Assurance), 2nd Edition, ISBN-13: 978-1284031621, Jones & Bartlett
Learning.
40