CYBR 4330 - Chapter 3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

RAID Level 5

- Data striping over multiple drives w/o a parity drive most commonly used in orgs that balance saftey with redundancy against costs of acquiring and operating the systems stripes acorss multiple drives no dedicated parity drive segments are interleaved with parity data, written across drives in a set can be hot swapped

full backup

A full and complete backup of the entire system, including all applications, operating systems components, and data. adv: comprehensive snapshot of org system dis: requires large media to store

differential backup

A type of partial backup that involves copying all changes made since the last full backup. Thus, each new differential backup file contains the cumulative effects of all activity since the last full backup. advs - faster - less storage space dis - each sequential backup is slower - if one is corrupt, previous day is the same

incremental backup

A type of partial backup that involves copying only the data items that have changed since the last partial backup. This produces a set of incremental backup files, each containing the results of one day's transactions less space and time than differential if incident, multiple backups needed designed to complete the backup in the shortest amount of time economical in the amount of room needed to store yield shortest time needed to restore files

•Disk to Disk to Cloud

AKA disk-to-disk-to-onlin rapidly gaining acceptance in the consumer and corporate area org may not want to go directly to cloud aggregate all local backups to central repository and THEN back up that repository to online vendor allow only trusted backup server or service - reduce risk of corruption to CIA users can backup data to a central location and org can periodically upload backup to the online repository most commercial bcackup providers use an encryption process prior to data being transmitted to cloud storage location - not transmitted in plaintext easily access that data to restore it to another system quickyly - minimize downtime ability to automate the cloud backup process - back up more frequently - minimize amount of lost data ensure data is being retained in multiple geographical location to reduce data loss

retention schedule

All data storage that involves backups or archives should be based on this •guides the location, frequency of replacement, and duration of storage.

mirroring

An approach that provides real-time protection as well as data backup is the use of provides duplication of server data storage by using multiple hard drive volumes, as discussed with RAID. can be extended to the point of vaulting and journaling One strategy for implementing server recovery and redundancy through THESE servers uses hot, warm, and cold servers can increase the reliability of primary systems and enhance effectiveness of BR strategies

Community cloud

An implementation in which several orgs with common interests share computing resources can be managed by a 3rd party or by orgs themselves can be hosted internally or externally

Private cloud

An implementation in which the computing resources are operated solely by a single org extension of an org's intranet into the cloud

RAID Level 6

Block-level striping with double-distributed parity systems can recover from two drive failures

RAID Level 3

Byte-level striping of data data is stored in segments on dedicated data drives parity info is stored on a sep drive one large volumes for data, parity drive operates alone for error recovery

•Public cloud •Community cloud •Private cloud •A hybrid combination of the above

Clouds are deployed in the following ways

Snapshot replication

Copying data from one database to another

RAID Level 1

Disk mirroring twin drives in a computer system computer records all data to both drives simultaenously backup if primary drive fails expensive inefficient use of media variation is disk duplexing mirroring: same drive controller manages both drives duplexing: each drive has its own controller often used to create duplicate copies of OS columes plan can be developed that mirrors and then splits disk pairs to create highly available copies of critical system drives

RAID Level 0

Disk striping not a form of redundant storage creates one larger logical volume acorss several available HDDs stores data using disk striping failure of 1 drive may make all data inaccessible does not improve risk situation, increases risk of data loss

cost of specialized equipment media and time required to store and retrieve info market for consumer-grade tape backups has dwindled

Drawbacks of tape backups

recovery plans

Each backup and recovery implementation should have complete need to be developed, tested, and rehearsed periodically.

•establishing and operating costs, •downtime estimates, •estimates of the security provided by the option, •how the option affects the sequence of recovery based on the relative priority of included systems, and •how the option fits into broader organizational planning efforts.

Each backup and recovery option should contain planning for the total cost of operation, including:

scheduling of the backups, coupled with the arrangement for the storage of the media

First stage of tape-based backup and recovery

data storage "int he cloud"

For the corporate user, this online data storage is sometimes referred to as commonly associate with leasing of computing resources from a third party

If you don't own the hardware, software, and infrastructure, you can't guarantee effective security, so you must scrutinize the service agreement and insist on minimal standards of due care

From a security perspective, the leasing of services from a third party is always a challenge. Why?

daily, weekly

In general, data files and critical system files should be backed up HOW OFTEN, with nonessential files being backed up HOW OFTEN

Merger replication

Merging data from multiple databases into a separate database

daily on-site backup either incremental or differential weekly off-site full backuup off-shift hours

Most common schedule for tape backup is

RAID Level 7

RAID 5 on a single virtual drive proprietary variation of RAID 5 array works as a single virtual drive performed by running special software over RAID 5 HW

RAID Level 5+1

RAID 5 plus a separate data parity drive RAID 5 - robustness method adds a separate data parity rive not found in RAID 1

bare metal recovery

Recent advances in server recovery have developed technologies designed to replace operating systems, applications, and data when they fail allow you to reboot the affected system from a CD-ROM or other remote device and quickly restore your OS by providing images many Linux/UNIX versions fewer Windows - Windows 7 repair disk - use the setup disk

RAID Level 0+1

Striping then mirroring combination of RAID 0, 1 RAID 0 - performance RAID 1 - fault tolerance second striped set to mirro a primary striped set

Database Backups

Systems that use databases, whether hierarchical, relational, or object-oriented, require special considerations when planning backup and recovery

•Legacy backup applications - "lock and copy" •Online (cloud) backup applications - also "lock and copy", but backups to online/cloud •Continuous data protection - near real time copies to secondary storage

Systems that use databases, whether hierarchical, relational, or object-oriented, require special considerations when planning backup and recovery

electronic vaulting

The bulk batch-transfer of data to an off-site facility is known as ________________. conducted via leased lines or data comms services for a fee online/cloud backup are quickly taking over recieving server archives data as it is reciveed primary criteria for selecting an e-vaulting solution: costs, bandwidth, security needs, needed service level ensure org can do this without affecting other operations •used to be more expensive than tape backup and slower than data mirroring; however, the explosion in the online/cloud market has changed this. consider using specalized THIS applications for data that warrants the additional expense can be performed over VPN SW agent is typically installed on all serves - initiates full backup to remote vault - prepars to continuously copy data as it is created - vendor must maintain and protect data - access through Web interfave of SW Amazon, Rackspace

Public cloud

The most common implementation a service provider makes computing resources available over the Internet and WWW

online (or cloud) backup, disk backup, and tape backup

The most common varieties of data backup include

Redundant array of independent disks (RAID)

These systems can overcome some of the limits of tape backup systems uses a number of hard drives to store information across multiple drive units Another form of data backup is the use of additional disk drives for redundancy enhances capabilities can spread out data can elimiate reduce impact of a hard disk failure nine RAID configurations doesn't address need for off-site strategy deals with most common need for restoring from backup - recovery from HD failure

Microsoft - Virtual Server VMware's - VMware Server Oracle - VM VirtualBox

Three applications dominate the virtualization market

full, differential, incremental

Three basic backup options

network-attached storage (NAS) and storage area networks (SANs).

Two other advances in data storage and recovery are

•Hardware-level virtualization •OS-level virtualization (a.k.a. software virtualization) •Application-level virtualization

Virtualization can occur in a variety of ways

Hardware-level virtualization

Vm acts like independent computer with own OS allows deployment of simulated HW components physical host's resources are divided between VM and host most common and popular

easily and accurately back up an entire system and then move it to another hardware platform, usually within minutes

What makes virtualization important to CP is the ability to

Tape Backups and Recovery: General Strategies

able to store larger quantities of data in smaller containers cost-effective method

NIST SP 800-34

according to this, alternative should be considered when designing backup and recovery strategies =

cold server

administrator's test platform should be identically conigured to the hot and warm servers upgrades and new applications are tested here added as the new warm server while the hot server is taken offline for repair

system backup can only work correctly if

all user access to the drive is stopped

Database shadowing

also known as databank shadowing •a technology that can be used simply, with multiple databases on a single drive in a single system, or using databases in remote locations across a public or private carrier. combines e-vaulting with RJ multiple copies of DB to two locations used for orgs needing immediate data recovery after incident available for reading and writing - dynamic backup works well for read-only functions (pg 106) each transactional event written simultaneously to multiple DBs can be bufferedm, transmitted across network, stored in DB on a remote server primary DB and shadowed DB get transaction entry, update, deltion request - only primary responds - both DBs make request

Software as a Service (SaaS)

applications are made available on the Internet (and over the WWW) orgs can lease this often include online backup services

daily backup

backs up only files that were modified that day date-specific incremental backup

•The backup plan: Who, what, when, where, and how? •Backup creation: Who, what, when, where, and how? •Backup verification: Who, what, when, where, and how? •Data storage: Who, what, where, how, and for how long? •Encryption: Who, what, when, where, how, and why?

backup and recovery plans should include answers to the following

copy backup

backup of a set of specified files allows admin to make sure all files are backed up but only a subset at a time could be considered a partial full backup

Application-level virtualization

broad term designed to improve portability and compatibility virtualization layer appears to the application as the expected OS answers all necessary API calls made by the application app percieves it's interacting with host Os and resources allows app to run on computer that otherwise support an app

Disaster Tolerant Disk Systems (DTDS)

consists of two or more independnet zones, either of which provides access to stored data

disk striping

data segments, called stripes, are written in turn to ach disk drive in the array

Platform as a Service (PaaS)

development platforms are made available to developers

disk striping without parity

disk striping to allow multiple drives to be cominedin order to hain large capacity without data redundancy

Contingency planning (CP)

encompasses everything done by an organization to prepare for the unexpected

storage area networks (SANs)

fiber-channel direct connections between systems needing storage and storage devices high-speed and higher-security only accessible by devices connected

•Delayed data protection •Real-time data protection •Server recovery •Application recovery •Site recovery

five key mechanisms that help restore critical information and the continuation of business operations:

one

for full backups of entire systems, at least x copies should be stored in a secure location - bank - security deposit - remote branch

one or two one

for routine data backups of critical data, the org only needs to retain the blank or blank most recent copies and at least blank off-site copy(ies)

Infrastructure as a Service (IaaS)

hardware and operating systems resources are made available for whatever the organization desires to implement

host platform

host machine the physical server and operating system that the virtualization application and all virtual machines run on

Site recovery

includes the steps needed to plan for and execute the procedure to quickly establish critical capabilities at an alternate site when the organization's primary site or sites are not available providing alternate processing capabiliy may be necessary - may be necessary to quickly put a computing environment into operations determining factor: cost the exclusive control options are hot sites, warm sites, and cold sites, the three popular shared-use options are time-shares, service bureaus, and mutual agreements, and the independent option is mobile sites

•Disk to Disk to Tape

individuals and organizations can build libraries of these devices to support larger-scale data backup and recovery secondary data disk series should be periodically backed upt o tape 2nd disk avoids need to take the primary set offline for duplication reduces resource ysafe on the primary systems initial copies can be made efficiently and simultaneously with other processes

disaster recovery plan (DR plan)

lists and describes the efforts to resume normal operations at the primary places of business

digital audio tapes (DATs) quarter-inch cartridge (QIC) 8-mm tape digital linear tape (DLT)

most common types of tape media for smaller orgs and individuals

Continuous data protection

near real time copies to secondary storage using an application interface data is stored within one-second tolderance only R1Soft

application recovery or clustering services plus replication

next level of recovery software replication can provide increased protection from data loss clustering services and application recovery work is similar to hot, warm, and cold server model sysadmins install applications on multiple servers for redundancy expands on this premise: rather than simple services providing failover capabilities for critical applications, it uses SW to detect failure of the primary applicaiton server and to hen activate the secondary app server to begin accepting and servicing requests

online backup to a third-party data storage venro

one of the newest forms of data backup this option offers multi-terabyte online data storage anywhere Memeo, Dropbox, Google

hot server

online primary server provides services necessary to support operations

OS-level virtualization (a.k.a. software virtualization)

only host's OS used multiple virtual sessions of OS each application can be independent of the others increased controls over resource utilization

cloud computing

originally described as the provision of three fundamental services •Software as a Service (SaaS) •Platform as a Service (PaaS) •Infrastructure as a Service (IaaS)

Failure Tolerant Disk Systems (FTDSs)

protect against loss of data access because of failure of any single component

Failure Resistant Disk Systems (FRDSs)

protects against data loss due to disk failure and its enhancement, FRDS+

warm server

serves as an ancillary or secondary server services requests when the primary is busy or down should hot server goe down, this automatically takes over

Grandparent/Parent/Child method

similar to the six-tape rotation method retains 4 full weekly (friday) backups and ads a full monthly backup, retaining 12 monthly backups the most common method of tape rotations once the monthly backup is created, the four (or five) Friday tapes are reused

network-attached storage (NAS)

single device or server attaches to network uses common communications methods to provide online storage environment implemented as additional storage space allows user or groups to access data storage does not work well with realtime apps - latency of comms methods TCP/IP-based protocols and comms methods more compatible anyone who can intercept the IP address can access

Virtualization

the development and deployment of virtual systems rather than physical implementations of systems and services develop and deploy different applications and enviornments without requiring a separate HW platform for each environment or OS take existing HW and deploy any other OS or application using specialized tech memory, storage, data, and networking can be virtualized physical host and virtual hyperivosr provide them by mapping them roots trace back to 1960s with development of IBM CP-40 Only in last 15 years became commercial - SoftPC - 1988 - Virtual PC - 1997 - VMware - 1998 allows admins to create snapshot backups, copy collection of file that support the particular VM to another location - image loaded into new host orgs don't worry about quickly purchasing and setting up multiple pieces of HW

primary site

the location or group of locations at which the organization executes its functions

Snapshot replication Merger replication Transaction replication

three types of database replication

virtual machine

to a virtualized environment operating in or on a host platform guest hosted operating system or platform running on the host machine

Legacy backup applications

traditional •"lock and copy" DB must be accessible while a backup is created to a local drive

Remote journaling (RJ)

transfer of live transactions to an off-site facility. Developed by IBM in 99 only transactions are transferred transfer performed online online activities on a system level two locations are written simultaneously can be asynchronous recovery of key transactions in near real time OS initiates a process that created record of object behavior - all changes are recorded in a journal entry - sotred in journal reciever - full receiver is available for stoage - sotred receviers can be pulled from tape and applied to data transference of journal entries to a remote journal

business resumption plan (BR plan)

two major elements 1. DR plan 2. BC plan these are not indistinguishable

Data backup

typically involves making a copy or snapshot of the data from a specific point in time data = volatile, subject to change For data recovery from an incident or disaster, this is the most common solution

hypervisor

virtual machine monitor The virtualization application specialized software that enables the virtual machine to operate on the host platform.

six-tape rotation

when addressing the selection of files to backup, a popular method is six sets of media are used in rotation uses five media sets per week and offers two weeks of recovery capabailiy org first attempts to recover files using Mon-Thurs tapes If needed file is not contained, last full backup that was stored off-site is retreieves and recovered org myay make two copies of each full backup so an onsite version is on hand

Online (cloud) backup applications

•"lock and copy", but backups to online/cloud

RAID Level 4

•Block-level striping of data data is stored in segments on dedicated data drives parity info is stored on a sep drive one large volumes for data, parity drive operates alone for error recovery

RAID Level 2

•Disk striping with parity not widely used Hamming code to store stripes on multiple data drives and corresponding redunent errorcorrection on separate err-correcting drivess allows reconstruction of data if some data or redundant parity is lost no commercial implementations

formal policy and plan

•Management should create a WHAT that - with input from legal counsel - for conforming to applicable laws, regulations, and standards. •Data that is not covered by laws or regulations may even be in the organization's best interest to quickly destroy.

RAID Level 1+0

•Mirroring then striping second striped set FROM mirro a primary striped set

Failure Resistant Disk Systems (FRDSs) Failure Tolerant Disk Systems (FTDSs) Disaster Tolerant Disk Systems (DTDS)

•RAID vendors have come to use a standardized classification that identifies three types of RAID implementations:

on-site - fireproof safes - filing cabines off-site - safety deposit - prfessional service - conditioned environment - each unit should be labelled and write-protected retire tapes periodically

•Regardless of the strategy employed, all on-site and off-site storage must be secured.

near real time copies to secondary storage

•Some applications use file systems and databases in ways that invalidate the customary way of doing backup and recovery. some apps write large binary files •Make sure that members of the application support and development teams are part of the planning process when these systems' backup plans are made and that these team members are included in training, testing, and rehearsal activities. advances in cloud computing have opened a new FIELD in THIS ask that the service agreement include contingencies for recovery

Transaction replication

•Using a master database for regular operations but periodically copying new and updated entries to a backup

business continuity plan (BC plan)

•When the IR process cannot contain and resolve an incident, the company turns to the disaster recovery and THIS plans to help restore normal operations quickly at the primary site or a new permanent site if the old one is no longer viable. contains the steps for implementing critical business functions at an alternate internal or external location until normal operations can be resumed at the primary site (or at a new location). occurs concurrently with the DR plan when the damage is major or long term

Disk to Disk to Other: Delayed Protection

•With the decrease in the costs of storage media, including traditional hard drives, solid-state drives, and tape backups, more and more organizations are creating massive arrays of independent, large-capacity disk drives to store information at least temporarily. availability of devices avoids cost oand implementation challenges of tape quick and easy recovery of files and directories

incident response (IR)

•focuses on detecting, evaluating, and reacting to an incident, with later phases of the process focusing on keeping the business functioning even if the physical plant is destroyed or unavailable.

data archive

•involves the long-term storage of a document or data file, usually for legal or regulatory purposes.

Database replication

•similar strategy to DB shadowing multiple backups


संबंधित स्टडी सेट्स

Maternal and Newborn Success Questions Unit 2 Exam

View Set