CHAPTER 57

DATA BACKUPS AND ARCHIVES

M. E. Kabay and Don Holden

57.1 INTRODUCTION

57.1.1 Definitions

57.1.2 Need

57.2 MAKING BACKUPS

57.2.1 Parallel Processing

57.2.2 Hierarchical Storage Systems

57.2.3 Disk Mirroring

57.2.4 Logging and Recovery

57.2.5 Backup Software

57.2.6 Removable Media

57.2.7 Labeling

57.2.8 Indexing and Archives

57.3 BACKUP STRATEGIES

57.3.1 Selecting the Backup Technology

57.3.2 Exclusive Access

57.3.3 Types of Backups

57.3.4 Computer Systems

57.3.5 Testing

57.4 DATA LIFE CYCLE MANAGEMENT

57.4.1 Retention Policies

57.4.2 Rotation

57.4.3 Media Longevity and Technology Changes

57.5 SAFEGUARDING BACKUPS

57.5.1 Environmental Protection

57.5.2 On-Site Protection

57.5.3 Off-Site Protection

57.6 DISPOSAL

57.6.1 Scavenging

57.6.2 Data and Media Destruction

57.7 COSTS

57.8 OPTIMIZING FREQUENCY OF BACKUPS

57.9 CONCLUDING REMARKS

57.10 FURTHER READING

57.11 NOTES

57.1 INTRODUCTION.

Nothing is perfect. Equipment breaks, people make mistakes, and data files become corrupted or disappear. Everyone, and every system, needs a well-thought-out backup and retrieval policy. In addition to making backups, data processing personnel also must consider requirements for archival storage and for retrieval of data copies. Backups also apply to personnel, equipment, and electrical power; for other applications of redundancy, see Chapters 23 and 45 in this Handbook.

57.1.1 Definitions.

Backups are copies of data files or records, made at a moment in time, and primarily used in the ...

Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.