Backup and Recovery Techniques PDF
Document Details
Uploaded by Deleted User
Tags
Summary
This document provides an introduction to backup and recovery techniques. It covers different types of backups, architectural components, backup and restore operations, and various backup and recovery topologies. It also explores the various methods of data recovery and types of data disasters.
Full Transcript
LESSON 5: BACKUP & RECOVERY Assessment 18 1. Why is data backup essential for individuals and organizations in the digital age? 2. Explain the different types of data backups. 3. Discuss the role of backup and recovery in cybersecurity and how it helps Introduction to Backup and Recov...
LESSON 5: BACKUP & RECOVERY Assessment 18 1. Why is data backup essential for individuals and organizations in the digital age? 2. Explain the different types of data backups. 3. Discuss the role of backup and recovery in cybersecurity and how it helps Introduction to Backup and Recovery What is backup and recovery? - Backup and recovery is the process of duplicating data and storing it in a secure place in case of loss or damage. - Restoring the data to a location – the original one or a safe alternative. Backup and Recovery - categorized as onsite and cloud-based technology solutions that automate and support this process, enabling organizations to protect and retain their data for business and compliance reasons What is a Backup? - Backup is an additional copy of data that can be used for restore and recovery purposes What is a Backup? This backup can be created by: - Simply coping data (there can be one or more copies) - Mirroring data (the copy is always updated with whatever is written to the primary. Backup strategy - A backup is put in place to avoid permanent data loss to ensure the integrity of stored i.e. can get back to a previous version and build up the data correctly if current data found to be in error. Recovery procedures - A backup strategy needs a well documented and tested recovery procedure ensure backup data is restored properly. Factors in recovery procedures A well documented procedure that allocates roles and responsibilities to staff. Availability of alternative hardware and accommodation if the originals have been destroyed. Availability of original software Up to date backup data is readily Backup purposes Disaster Recovery - Restores production data to an operational state after disaster Operational - restore data in the event of the data loss or logical corruptions that may occur during routine processing Backup purposes Archival - preserve transaction records, email, and other business work products for regulatory compliance Types of Backups - Three basic types of backups: Full backups Differential backups Incremental backups Full Backups - Full and complete backup of entire system Differential Backup - storage of files that have change or been added since last full backup Key features of Differential backup - More files to be backed up, therefore it takes more time to backup and uses more storage space. - Much faster restore because only the last full and the last cumulative backup must be applied. Incremental backups - Only archives data that have been modified that day. Key features of Incremental backups - Files that have changed since the last backup are backed up. - Fewest number of files to be backed up, therefore faster backup and less Backup Architecture and Process Backup client - a software application installed on a user’s computer or server that communicates with a central backup server - Sends backup data to backup server storage node Backup Architecture and Process Backup server - Manages backup operations and maintains backup catalog - a computer that manages the backup of data, files, databases, and applications for connected devices, servers, and computers Backup Architecture and Process Backup Architecture and Process Storage node - Responsible for writing data to backup device - a dedicated server or machine that is specially designed to store backup data Backup Architecture and Process Backup Operations 1. Start the scheduled backup process 2. Backup data retrieves backup related information from backup catalog 3. Backup server instructs storage node to local backup media in backup device. Backup Operations 4. Backup server instruct backup clients to send its metadata to the backup server and data to be backup to storage mode. 5. Backup clients send data to storage node 6. Storage node sends data to backup Backup Operations 7. Storage node sends media information to backup servers 8. Backup server update and records the status Restore Operations 1. Backup server scans backup catalog to identify the data to be restore and the client that will receive data. 2. Backup servers instructs storage node to load backup media in backup device. Restore Operations 3. Data is read and send to backup client. 4. Storage node sends restore metadata to backup server 5. Backup server updates catalog. Backup Topologies There are 3 basic backup topologies: 1. Direct attached based backup 2. LAN based backup 3. SAN based backup Direct attached Backups - a backup system where storage devices are directly connected to the computer or server that needs to be backed up, without going through a network Direct attached Backups LAN-based Backups - all servers are connected to the LAN and all storage devices are directly attached to the storage node LAN-based Backups SAN-based Backups - a network of storage devices that can be accessed by multiple computers or servers - They are block storage-based, which means that data is split into storage volumes that can be formatted with different protocols. SAN-based Backups Introduction to Backup and Recovery LAN based backup Introduction to Backup and Recovery Backup Technology options - Backup to Tape - Physical Tape library - Backup to Tape Introduction to Backup and Recovery Backup to Tape -traditional destination for backup - Low cost option - Sequential / Linear Access - Multiple Streaming - Backup streams from multiple clients to a single backup device Introduction to Backup and Recovery Tape Limitations - Reliability - Sequential Access - Cannot be accessed by multiple host simultaneously - Control environment for tape storage - Wear and tear of tape Introduction to Backup and Recovery Backup to Disk - Ease of implementation - Fast access - More reliable - Random access - Multiple host access - Enhanced overall back & recovery Introduction to Backup and Recovery New Features - Files backup and restore, simple & automatic protection, complete pc backup and restore, block-level image, entire computer, server backup, files, folders, disks, common workloads Introduction to Backup and Recovery Difference between backup and recovery - Backup process is how you save and protect your production data safely store it away - Recovery is the process whereby you retrieve and restore that backup data to Introduction to Backup and Recovery Type of recovery - Granular recovery of files, folders and objects also known as file-level or object-level recovery, this is the process of quickly getting back one or just a few specific data sets from among many volumes. Introduction to Backup and Recovery Type of recovery - Instance mass restore this process allows IT staff to recover not just the files but hundreds of virtual machines(VMs) instantly, at scale, to any point in time, saving time and resources. Introduction to Backup and Recovery Type of recovery - Volume recovery process teams that need to recover an unlimited number of VMs at the same time used for faster recovery; for example, all VMs belonging to an application group. Introduction to Backup and Recovery Type of recovery - Virtual Machine Disk (VMDK) recovery This recovery process ensures all data and apps on a VM are restored quickly.. Introduction to Backup and Recovery Type of recovery - Bare machine recovery Restoring an entire operating system (software, apps, and data) in one process. Introduction to Backup and Recovery Type of recovery - Instant volume mounts Teams can save time using a backup solution as a target to restore an entire volume to a Windows VM. Introduction to Backup and Recovery Type of recovery - Instant restores of VMs This process restores a large number of VMs to any previous recovery point with backup copies fully hydrated and available immediately. Introduction to Backup and Recovery What are the data recovery methods? - File restore is the fastest method to recover individual corrupted or lost files and folders. This is the smallest type of restore available because you don’t have to restore every piece of backed up data. Introduction to Backup and Recovery What are the data recovery methods? - image restore requires a backup of the whole system image. It is used in situations where the entire device needs to be restored, such as when a system failure occurs. Introduction to Backup and Recovery What are the data recovery methods? - Bare-metal restore is typically the method of choice when it comes to disaster recovery. This type of restoration is used when data from a damaged device or system needs to be restored to a completely new device. Introduction to Backup and Recovery Types of data disasters - Natural disasters are events caused by natural forces that can bring about widespread damage to both humans and the environment. It includes things like earthquakes, hurricanes, tornadoes, and floods, to name a few. Introduction to Backup and Recovery Types of data disasters - Device Malfunctions Devices may not perform as they are expected, or fail to perform at all. This can occur because of a hardware, software, configuration, or power issue. When this happens, there is a chance your data will become inaccessible or Introduction to Backup and Recovery Types of data disasters - Human error humans can cause data disasters as well. Possible scenarios include deleting files, forgetting to save data or any changes made to the data, or misplacing spreadsheets or important files/folders. Spilling drinks or any other liquids is an Introduction to Backup and Recovery Types of data disasters - Cyberthreats Each year the number of online attacks continues to grow, causing an increasing number of data disasters. Malware, phishing, and ransomware are just a few examples of threats and attacks that can occur on devices.