Data Backup, Retention, and Destruction PDF

Summary

This chapter discusses data backup, retention, and destruction, focusing on the advantages of SAN storage, including capacity, easy sharing, fast backup, reliability, and security. It also discusses various backup methods, such as hot backup and cold backup, and their advantages and disadvantages.

Full Transcript

Certified Cybersecurity Technician Exam 212-82 Data Security Advantages of SAN...

Certified Cybersecurity Technician Exam 212-82 Data Security Advantages of SAN LAN-free and server-free data Storage consolidation movement 0O e T o thortie. /;\ ° LAN-free and server-free -. backup & D N Improved backup and @ \ o Highly available server recovery clustering 00 Reliable and Reliable and secure secure centralized centralized ° Data integrity and a decreased data storage l‘m load on the LAN High performance and low ° D ©O Disaster tolerance latency L. All Rights Reserved, Reproduction is Strictly Prohibited Advantages of SAN storage device that can fulfill and handle their needs. The below-mentioned advantages of SAN help in its deployment in an IT infrastructure. Advantages Capacity: SAN performance is directly proportional to the network type. A SAN allows unlimited sharing of data, regardless of the storage capacity. Its capacity can be extended limitlessly to thousands of terabytes. Easy sharing: SAN data is easily shared between systems as it maintains an isolated traffic. The traffic does not interfere with the normal user traffic, thereby increasing data transfer performance. Fast backup: A data mirror copy can be created instantly. These mirror images can be used as a backup whenever required. Reliability and Security: If a SAN is configured correctly, the data is secured. Chances of device intrusion is minimal. Reliable and secure centralized data storage. Productive: A SAN is scalable; adding a new disk to the network does not stop the SAN’s productivity. When adding a new hard disk, a reboot or shut down is not required. Availability of applications: The algorithms in a SAN storage array offer data protection. This results in the availability of applications at all times. Bootable: A SAN can run a server without a physical disk, and it can be booted by the SAN. This feature permits access to all page files and applications. Module 15 Page 1880 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Data Security Distance connectivity: For better security, storage devices can be kept at an isolated location. One of the features of a SAN is that it can connect with devices up to a distance of ten kilometers. Recovery: A SAN is the most reliable data recovery option. Even when the servers are offline a SAN remains available. Effective utilization: A SAN is an appropriate option for storage space than local disks. If a system requires more storage, a SAN dynamically allocates the required space. This process is similar to virtual machines. Integrity: Increased data integrity and a decreased load on the LAN. LAN-free and server-free data movement and backup Effective disaster tolerance The implementation of a SAN is beneficial to an organization, especially when considering budget constraints, availability, and employee expertise. Disadvantage Very costly: The implementation cost of a SAN can significantly exceed the available budget. A SAN is an investment and should only be implemented if it meets the goals of the organization. Module 15 Page 1881 Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Data Security Network Attached Storage (NAS) ® NAS is a file-based data storage service and a dedicated computer appliance shared over the network @ ¢® NAS is a high-performance file server optimized for storing, retrieving, and serving files.,» NAS servers contain proprietary or open-source operating systems optimized for file serving Advantages Disadvantages » Users with different operating systems can share files with no compatibility issues » A NAS can be connected to a LAN using the plug and play feature » Minimal administration required, unlike Unix or NT file servers Copyright Copyright ©© by by £ All Rights All Rights Reserved. Reserved. Reproduction Reproduction IsIs Strictly Strictly Prohibited. Prohibited. Network Attached Storage (NAS) NAS is a storage device connected to a network. It stores and retrieves data from a centralized location. NAS provides a dedicated shared storage space for a local area network. Implementing a NAS eradicates the server file sharing process on the network. The NAS contains one or more logically arranged storage devices. NAS offers file storage through a standard Ethernet connection. NAS devices do not use an external device management, and they are operated through a web- based utility. Since it resides on every node on the LAN, it has its own IP address. NAS is similar to a file server. NAS devices are scalable, vertically as well as horizontally. A NAS implementation is accomplished using large and clustered disks. NAS has evolved from supporting virtualization to data replication and multiprotocol access. A clustered NAS is one such example of the NAS evolution. In a clustered NAS infrastructure, access is provided to all files, irrespective of their physical location. It does not require a closed- source operating system such as Windows. Certain devices run on a stripped down OS such as FreeNAS, or any other open-source solutions. NAS devices are in high demand in small enterprises because of their effectiveness, low cost, and scalable storage capacity. They are classified into three types based on the number of drives, drive capacity, and scalability. Advantages = Accessibility: A NAS system stores data as files and is compatible with CIFS and NFS protocols. Multiple users can access the files simultaneously using an Ethernet network. Computers in a shared network can access the data either through a wireless or a wired connection. Module 15 Page 1882 Certified Cybersecurity Technician Copyright © by EG-Gouncil EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Data Security Storage: NAS deployment in a network increases the amount of storage available to the other systems. A NAS system can store up to 8 TB data. A NAS is most appropriate for storing large applications or video files. Efficient and Reliable: NAS assures an efficient transfer of data and reliable network access. If a system in a network fails, the functioning of other systems is not affected. A NAS server can also be created to give users the ability to access large files or applications. Automatic backup: Certain NAS devices are configured with an automatic backup feature. The data is available on the user system as well as on the server hard drive. Changes made on the user system are reflected on the server hard drive as well. Automatic backup is not time consuming and assures the security of data. Compatibility: Users with different operating systems can share files with no compatibility issues. A NAS can be connected to a LAN using the plug and play feature. Minimal administration required, unlike Unix or NT file servers. Centralized usage, and reduced cost of backup and maintenance than a SAN. Faster response than direct attached storage (DAS). Disadvantages Consumption: NAS shares the network with other host machines, and this tends to consume a larger amount of network bandwidth. For remote NAS systems, the data transfer performance will depend on the available bandwidth. It is advisable to avoid storing databases on a NAS, as the server response time fluctuates depending on the bandwidth. Applications that use most of the data transfer bandwidth will significantly reduce network performance. Network congestion: A large backup process can affect the function of an IP network and may lead to network congestion. Data transfer is inefficient as it uses TCP/IP instead of a specialized data transfer protocol. The storage service cannot be trusted for mission-critical operations. Administrators must set user quotas for storage space. Module 15 Page 1883 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Data Security Selecting an Appropriate Backup Method O Select a backup method based on its cost and ability according the organization’s requirements > o Hot Backup (Online) Cold Backup (Offline) Warm Backup (Nearline) Q Backup the data when the application, QO Backup the data when the application, 0O QQO A combination of both hot and cold database, or system is running and database, or system is not running backups available to users (shutdown) and is not available to users Q Used when a service level down time is uUsed Q used when a service level down time is Used Advantages: not allowed allowed and a full backup is required v Less expensive than a hot backup Advantage: Advantage: v Switching over the data backup takes less time than a cold backup v Immediate data backup switch over is v Least expensive expensive but more time than a hot backup possible Disadvantage: Disadvantage: Disadvantage: v’ Very expensive v' v" Switching over the data backup v v’ Itis less accessible than hot backup requires additional time Copyright © by EC cll. All Rights Reserved, Reproduction Iss Strictly Prohibited Selecting an Appropriate Backup Method Organizations can choose any backup method depending on their budget and IT infrastructure. The different types of data backup methods are: * Hot Backup A hot backup is a popular backup method. It is also called as dynamic backup or active backup. In a hot backup, the system continues to perform the backup even when the user is accessing the system. Implementation of a hot backup in an organization avoids downtime. However, changes made to the data during the backup process is not reflected in the final backup file. In addition, while the backup is in process, the users may find the system to be slow. A hot backup is an expensive process. It is used when a service level down time is not allowed. Advantage: o Immediate data backup switch over is possible Disadvantage: o Very expensive = Cold Backup A cold backup is also called an offline backup. A cold backup can take place when the system is not working or is not accessible by users. A cold backup is the safest backup method as it avoids the risk of copying the data. A cold backup involves downtime as the users cannot use the machine until the process is back online. A cold backup is not as expensive as a hot backup. It is used when a service level down time is allowed and a full backup is required. Module 15 Page 1884 Certified Cybersecurity Technician Copyright © by EG-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Data Security Advantage: o Least expensive Disadvantage: o Switching over the data backup requires additional time = Warm Backup A warm backup is also called a nearline backup. It will have a connectivity to the network. In a warm backup, the system updates are turned on to receive periodic updates. It is beneficial when mirroring or duplicating the data. The warm backup process can take a long time and can be conducted in intervals that can last from days to weeks. It is a combination of both hot and cold backups. Advantage: o Less expensive than a hot backup o Switching over the data backup takes less time than a cold backup but more time than a hot backup Disadvantage: o ltisless accessible than hot backup Module 15 Page 1885 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Use Quizgecko on...
Browser
Browser