O'Reilly logo

Security Strategies in Windows Platforms and Applications by Michael G. Solomon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Microsoft Windows Backup and Recovery Tools

THE FIRST PROPERTY, or pillar, in the Availability, Integrity, Confidentiality (A-I-C) Triad is Availability. That means secure information is available to authorized users when they request it. Ensuring information availability requires planning and preparation to confront issues that threaten to make your information unavailable. Issues include attacks to deny service, degraded performance, and failures or disasters that limit or terminate access to your information. A solid security plan includes both components to avoid situations that threaten information availability and procedures to deal with problems if they do occur.

In this chapter you'll learn about the basics of creating backup ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required