You are on page 1of 25

APIIT Sri Lanka Sahan Munasinghe (CB003824)

1 Introduction

Data protection is crucial for protecting your business's continuity. If your only data backup is on a computer, and the hard disk fails or is damaged by a power surge, your business data is gone. And having paper copies of business data isn't adequate data protection; what if your business premises burn to the ground or experience severe flooding? Once again the data you need to carry on your business could be irretrievably lost.

According to About (2010) for adequate data protection, you need to establish a data backup system that follows these three steps:
 archive business data regularly  create data backups on reliable media  keep updated data backups in a secure, off-site location.

The basic rule for business data protection is that if losing the data will interfere with doing business, back it up. You can reinstall software programs if you need to, but recovering the details of transactions or business correspondence is impossible if those files are lost or damaged beyond repair.

APIIT Sri Lanka Sahan Munasinghe (CB003824)

2 Backup and Recovery means


According to Oracle (2010) a backup is a copy of data from your database that can be used to reconstruct that data. Backups can be divided into physical backups and logical backups. 2.1 Physical backups According to Usenix (2010) Physical backups are backups of the physical files used in storing and recovering your database, such as datafiles, control files, and archived redo logs. Ultimately, every physical backup is a copy of files storing database information to some other location 2.2 Logical backups According to Pcmag (2010) Logical backups contain logical data (for example, tables or stored procedures) exported from a database Physical backups are the foundation of any sound backup and recovery strategy. Logical backups are a useful supplement to physical backups in many circumstances but are not sufficient protection against data loss without physical backups.

3 Important of Backup

Backup in general provides companies who rely heavily on business critical data the ability to have multiple copies of their data. The first step of backup is the safeguarding of valuable business information by copying that data. But copying pertinent business data is only one part of this safeguarding process. The following components form a backup strategy with all of them playing important roles. After data is copied, it must be safely transported to another location. Next, the data must be stored in a secure facility. Finally, the valuable information must be available to be recovered for use in case of data loss. (Findarticles, 2010)

APIIT Sri Lanka Sahan Munasinghe (CB003824)

Disaster-Resource (2010) states Failure in any of these 4 steps of the process can result in disaster.  Copying/Replication  Transportation  Storage  Recovery

According to Sigops (2009)software and hardware failurecan be divided into five main groups:  Program errors Device drivers can create errors with a computers performance for a number of unrelated reasons. (Gnu,2010)  Administrator (human) errors Human error is an imbalance between what the situation requires, what the person intends, and what he/she does. (Ohsah, 2010)  Computer failures (system crash) System crash is a condition in which a computer program stops performing as expected and also stops responding to other parts of the system. Linfom, 2008)

 Disk failures In computing, a hard disk failureoccurs when a hard disk drive malfunctions and the stored information cannot be accessed with a properly configured computer. A disk failure may occur in the course of normal operation, or due to an external factor such as exposure to fire or water or high magnetic waves, or suffering a sharp impact, which can lead to a head crash. (Sensagent, 2010)

 Catastrophes (fire, earthquake) or theft

APIIT Sri Lanka Sahan Munasinghe (CB003824)

4 The bad side of losing Data

At present most of business manage their day today business activities through computers. Guess what how much of your work has been saved in the form of little magnetized bits spread pout across a binch of spinning platters. In the business environment the lost of data is very tangible and quantifiable in monetary terms. Lost Customers Business can lose their customer details. Orders Tracked orders cannot be re-implemented due to lack of data. Morale Employees get feels of helplessness due to lack of inefficient data they got.

5 Backup devices and media


You need some media to store the backups. It is preferable to use removable media, to store the backups away from the computer and to get "unlimited" storage for backups.

Matching the capacity of the backup medium to the amount of data you intend to backup is very important, especially as hard disks capacities grow. The more disk or tape swaps required to perform a backup, the less likely it is that you will do it routinely. ideally, the whole backup will fit on one tape or disk so that you can leave it to run and do something else. You don't need to back up the whole hard disk every time, so a backup media that can hold most of it will usually suffice. (easeus-backup, 2010)

APIIT Sri Lanka Sahan Munasinghe (CB003824)

6 Backup Storage Medias


6.1 Magnetic Tape

Source: (ziffdavisinternet.com, 2007)

According to businessdictionary (2010) ribbon of plastic coated with magnetic material (such as ferric oxide) and available in several standard widths (half-inch being the most common) usually in cassettes. Used in audio, video, and datastorage (primarily for backup), it provides only sequential (serial) data access unlike magnetic and optical disks which provide random access

APIIT Sri Lanka Sahan Munasinghe (CB003824)

Advantages

Disadvantages

Reliability - Because it's in use only during a Expense - Although once touted as being the backup or recovery operation, tape tends to most economical backup method per gigabyte be fairly reliable compared to hard drives of data, tape drives and media are now (which always spin, even when they're not in considerably more expensive than hard drives use). or network backup.

Power savings - For the same reason, tape Tape degradation - Magnetic media is subject drives also use less power. to degradation due to heat, humidity, dust, mishandling, ordinary wear. Ease of storage. Tape cartridges typically are Uncertainty of data integrity. Unless a full small and can be easily stored off-site, verification of each backup is performed allowing data to survive even if the (which takes as long as the backup itself), computer itself is destroyed or stolen. there's no way to know for sure whether your backup is reliable. Ease of use. There's a lot of support for tape Cumbersome for non-full restores. Tapes are drives, and a lot of good software that make sequential-access devices, and are best suited restoring a computer from tape a for full-system restores. Finding and restoring individual documents can be a long, slow, and cumbersome process.
Source: (Author s Work based on Backupnut,2010)

electromagnetic

forces,

and

reasonably painless procedure.

APIIT Sri Lanka Sahan Munasinghe (CB003824)

6.2 External hard drives for data backups

Techterms (2010) states The hard disk is a spindle of magnetic disks, called platters, that record and store information. Because the data is stored magnetically, information recorded to the hard disk remains intact after you turn your computer off. Hard drives are getting cheaper and cheaper, making them an attractive option to use as backup media. Readily available in very high capacities they are an ideal backup solution for the home or small office. For smaller backup needs, many users carry a USB flash drive or pen drive. These are easier to carry around but have more limited storage capacities.

More expensive portable hard drive enclosures include not one but two or more physical hard drives. The second drive can be configured to automatically copy the contents of the first drive, meaning that your data is safe even if one of the drives fail. This technology is called RAID and is very useful for protecting highly important data. However, since any data stored or deleted on a RAID array will be immediately changed on all disks in the array. Advantages: Fast recording times, very large capacities available. Disadvantages: More expensive than DVD backups, cannot make multiple backups for off-site storage without investing in extra drives.

APIIT Sri Lanka Sahan Munasinghe (CB003824)

6.3 Optical storage According to techtarget (2010) an optical disc is an electronic data storage medium that can be written to and read using a low-powered laser beam, stored data as micron-wide dots of light and dark. A laser read the dots, and the data was converted to an electrical signal, and finally to audio or visual output. Advantages Disadvantages The write-once read-many

Durability - With proper care, optical media Reusable

can last a long time, depending on what kind of (WORM) characteristic of some optical media optical media you choose. makes it excellent for archiving, but it also prevents you from being able to use that media again. Great for archiving - Several forms of optical Writing time -The server uses software media are write-once read-many, which means compression to write compressed data to your that when data is written to them, they cannot optical media. This process takes considerable be reused. This is excellent for archiving processing unit resources and may increase the because data is preserved permanently with no time needed to write and restore that data. possibility of being overwritten. Transportability - Optical media are widely used on other platforms, including the PC. For example, data written on a DVD-RAM can be read on a PC or any other system with an optical device and the same file system. Random access - Optical media provide the capability to pinpoint a particular piece of data stored on it, independent of the other data on the volume or the order in which that data was stored on the volume.

Source: (Author s Work based on Backupnut,2010)

APIIT Sri Lanka Sahan Munasinghe (CB003824)

6.4 Remote backup service/Remote backup

Crcivr (2010) states online backup is the process of backing up computer data to a remote location via IP-WAN. Online backup, also known as televaulting, is used as part of a disaster recovery strategy to protect information system data. In the event of data loss due to natural disasters, hardware failure or human error, data stored offsite at a remote data center facility can be used to restore systems to the most recent working configuration. In online backup, files, folders, media or disk images are copied directly to disk-based storage at a remote data center facility. Advantages: Virtually unlimited backup capacities available, backup process can be fully automated, backup is stored off-site, meaning your data is safe even in the event of theft or fire. Disadvantages: No way to access your data if your internet connection fails (until connectivity is restored), can be expensive especially where large amounts of data are stored and transferred. Creating and restoring backups is very slow compared to other backup media, even with a very fast internet connection.

APIIT Sri Lanka Sahan Munasinghe (CB003824)

7 Backup Methods
7.1 Full backup

According to backup4all (2010) full backup is the starting point for all other backups and contains all the data in the folders and files that are selected to be backed up. Because the full backup stores all files and folders, frequent full backups result in faster and simpler restore operations. Remember that when you choose other backup types, restore jobs may take longer. It would be ideal to make full backups all the time, because they are the most comprehensive and are self-contained. However, the amount of time it takes to run full backups often prevents us from using this backup type. Full backups are often restricted to a weekly or monthly schedule, although the increasing speed and capacity of backup media is making overnight full backups a more realistic proposition. Advantages:  Restore is the fastest  All files from the selected drives and folders are backed up to one backup set.  In the event you need to restore files, they are easily restored from the single backup set. Disadvantages:  Backing up is the slowest  Full backups require more disk, tape, or network drive space.

APIIT Sri Lanka Sahan Munasinghe (CB003824)

7.2 Differential backup

Backup4all (2010) States there is a significant, but sometimes confusing, distinction between differential backupand incremental backup. Whereas incremental backs up all the files modified since the last full backup, differential or incremental backup, differential backup offers a middle ground by backing up all the files that have changed since the last full backup. That is where it gets its name: it backs up everything that's different since the last full backup. Advantages:  Restore is faster than restoring from incremental backup  Backing up is faster than a full backup  The storage space requirements are lower than for full backup Disadvantages:  Restore is slower than restoring from full backup  Backing up is slower than incremental backup  The storage space requirements are higher than for incremental backup

APIIT Sri Lanka Sahan Munasinghe (CB003824)

7.3Incremental backup

Backup4all (2010) States Incremental backup provides a faster method of backing up data than repeatedly running full backups. During an incremental backup only the files changed since the most recent backup are included. That is where it gets its name: each backup is anincrement since the most recent backup. Advantages:  Backing up is the fastest  The storage space requirements are the lowest Disadvantages:  Restore is the slowest

7.4 Mirror backup

According to backup4all (2010) a mirror backup is a straight copy of the selected folders and files at a given instant in time. Mirror backup is the fastest backup method because it copies files and folders to the destination without any compression . However, the increased speed has its drawbacks: it needs larger storage space and it cannot be password protected.

While the other backup types collect all the files and folders being backed up each time into a single compressed "container file", a mirror backup keeps all the individual files separate in the destination. That is, the destination becomes a "mirror" of the source.

APIIT Sri Lanka Sahan Munasinghe (CB003824)

Advantages: 1. The fastest backup type, especially in conjunction with the "Fast mirror" option 2. It creates a snapshot of selected files and folders in the destination which you can browse and access later without needing to run Backup4all Disadvantages: 1. It needs more storage space than any other backup type 2. Password protection is not possible 3. Cannot track different versions of files

7.4 Snapshot Backups Techtarget (2010) states a storage snapshot is a set of reference markers, or pointers, to data stored on a disk drive, on a tape, or in a storage area network (SAN). A snapshot is something like a detailed table of contents, but it is treated by the computer as a complete data backup. Snapshots streamline access to stored data and can speed up the process of data recovery. There are two main types of storage snapshot, called the copy-on-write (or lowcapacity) snapshot and the split-mirror snapshot. Utilities are available that can automatically generate either type.

APIIT Sri Lanka Sahan Munasinghe (CB003824)

7.5 Online Versus Offline Backups According to brighthub (2010) online data backup is just as the name implies. Data is backed up over a networked connection (most likely using the TCP/IP standard protocol of the Internet to a remote location (ideally). An offline data backup most often refers to data that is backed up on-site, rather than to a remote location as mentioned above. The offline method will require some type of on-site hardware and media such as digital tape drives or CD/DVD burners. the offline data backup method may be the better option for you if you're concerned about transmitting sensitive data (albeit, encrypted data) over public internet pathways.

Online backup methods have these characteristics:


y

The backup is less intrusive to other clients, which can connect to the database management software during the backup and may be able to access data depending on what operations they need to perform.

Care must be taken to impose appropriate locking so that data modifications do not take place that would compromise backup integrity.

Offline backup methods have these characteristics:


y y

Clients can be affected adversely because the server is unavailable during backup. The backup procedure is simpler because there is no possibility of interference from client activity.

A similar distinction between online and offline applies for recovery operations, and similar characteristics apply. However, it is more likely that clients will be affected for online recovery than for online backup because recovery requires stronger locking. During backup, clients might be able to read data while it is being backed up. Recovery modifies data and does not just read it, so clients must be prevented from accessing data while it is being restored.

APIIT Sri Lanka Sahan Munasinghe (CB003824)

Recovery Models

8.1 Full Recovery

According to Performance (2010) all operations are written to the transaction log. Therefore, this model provides complete protection against media failure. This means that you can restore your database up to the last committed transaction that is stored in the log file. Additionally, data can be recovered to any point in time (prior to the point of failure). To guarantee this, such operations as select into and the execution of the utility are fully logged, too. Besides point-in-time recovery, the full recovery model allows you also to recover to a log mark. Log marks correspond to a specific transaction and are inserted only if the transaction commits. 8.2 Bulk-Logged Recovery Performance (2010) states Bulk-logged recovery supports log backups by using minimal space in the transaction log for certain large-scale or bulk operations. The logging of the following operations is minimal and cannot be controlled on an operation-by-operation basis:  Select into  Create index (including indexed views)  Utility and bulk insert  Write text and update text Although bulk operations are not fully logged, you do not have to perform a full database backup after the completion of such an operation. During bulk-logged recovery, transaction log backups contain both the log as well as the results of a bulk operation. This simplifies the transition between full and bulk-logged recovery models.

APIIT Sri Lanka Sahan Munasinghe (CB003824)

8.3 Simple Recovery

According to Performance (2010) In the simple recovery model, the transaction log is not used to protect your database against any media failure. Therefore, you can recover a damaged database only using full database or differential backup. Backup strategy for this model is very simple: Restore the database using existing database backups and, if differential backups exist, apply the most recent one. The advantages of the simple recovery model are that the performance of all bulk operations is very high and requirements for the log space very small.

APIIT Sri Lanka Sahan Munasinghe (CB003824)

9 Backup Policy

According to businessdictionary (2010)Planned approach to data protection that assigns the backup responsibilities to the appropriate personnel or departments, and sets the duplication time cycles.

The backup policy can create by stick to the following points,

Backup Procedure Backup procedure encompasses several main points what data you back up, using what method(s), how often, and to what media. Each one of these matters involves a number of decisions. (Inc, 2010)

What Data Should Back Up? This is the most important things your backup policy should state. Identify what data you want to backup its saves time it takes for each backup to run, as well as the amount of storage space needed-not to mention network congestion.(Pcnineoneone, 2010)

What Is Your Backup Method? Author referring to full versus incremental or differential backups. (Although "incremental" and "differential" mean different things to different people, one common usage is for a differential backup to contain all the data that changed since the last full backup, while an incremental backup contains only the data that changed since the last update. Incremental backups run faster because they contain less data, but differential backups may be easier and quicker to restore, especially if you use tape drives.) Your policy should state under which circumstances one method or another is used. For example, you might specify that a full backup occurs once a month with incremental backups twice a day and differential backups once a week. If the method is different for servers than it is for workstations, say what those differences are.(Backupschedule, 2010)

APIIT Sri Lanka Sahan Munasinghe (CB003824)

How Are Backups Scheduled? In this schedule state how frequently backups run, whether that's several times a day, a couple of times per week, or whatever. This schedule should least impact on users' work.(Spamlaws, 2010)

What Media Do You Use? In most large organizations, high-capacity tape drives of one sort or another are taken for granted as a backup medium, often with an automated loading and retrieval system. That may indeed be the best choice for your business, but it's not the only option. In particular, given the rapidly rising capacities and falling prices of hard drives, you may find that some sort of hard drive array is just as economical, while providing much faster performance, especially for restoring files. Your written backup policy can perhaps be worded in a generic way to accommodate potential changes in the media you use, but think through the implications carefully. (Hddoctor, 2010)

Media Management This area state how your physical backup media is handled. This includes rotating among multiple sets of media, recycling, replacing, or destroying old media, storing backups offsite and keeping your backup media encrypted.(Symantec, 2010)

Rotating Media All backup media is subject to failure-for any number of reasons. A smart backup policy assumes that a certain percentage of media will fail much sooner than it should. The usual way to deal with this unfortunate fact of life is with redundancy: have two, three, or more copies of each backup and rotate them on a regular basis.(Computerworld, 2010)

APIIT Sri Lanka Sahan Munasinghe (CB003824)

Dealing with Used Media Backup data is bound to exceed your media's capacity eventually. In any case, your backup policy should specify exactly what happens when a storage device fills up. You have a few main choices:  Recycle: Erase the media and record over it.  Store: Hang onto the full media.  Destroy: Ditch the old media in a way that prevents anyone else from reading your backups. If you choose "store" or "destroy," you'll start over with new, blank media. Regardless of your choice, list the details. If you recycle media, how many times will you do that before storing or destroying it? Do you replace an entire set of media all at once (generally a good idea) or by the individual piece? How long will you store old media, and where? If and when you destroy old media, how will you do so securely?(Microsoft, 2010)

Offsite Storage It's all well and good to keep backup media in a fireproof safe or other secure location onsite, but you must also have at least one copy (and preferably more than one) stored in another building. As unlikely as it may be, something could happen-theft, espionage, earthquake, terrorist attack, whatever-that destroys all your backups if they're kept in a single location. Don't take any chances. You already specified that you have more than one set of media in rotation, so designate a safe offsite location to store media that's not actively in use.(Crcsecure, 2010)

Data Restoration Backups are of no use whatsoever if you can't restore your data when you need it. Unfortunately, restoration is usually the part of a backup policy that gets the least attention. Give careful thought on this.(Emaglink, 2010)

APIIT Sri Lanka Sahan Munasinghe (CB003824)

Who Can Restore Files? In most business situations, only an IT person can restore backed-up files, since they reside on a secure server and since it would be all too easy for a user to mistakenly overwrite good files with backups.

What Is the Procedure for Restoring Files? Assuming your users have to go to the IT staff to get files restored, exactly what is the processmake a phone call? Fill out a form on the intranet? Send an email? What if the user doesn't know the exact file name, date, or location? Is there a different procedure if a whole drive or user folder has to be restored? Spell out, in simple end-user terms, what someone has to do to get back data that's in the backup archives somewhere. And, if you have a system that lets users restore their own files, point them to a step-by-step guide on a Web page somewhere for how to do this.

How Is Data Integrity Verified? You can't assume that your backups are perfectly and indefinitely intact, just because your backup software didn't report any errors. Stuff happens. Make it an explicit part of your backup policy to test backups on a regular basis. When I say "test," again, I don't merely mean run through a verification procedure with your backup software. I mean actually restore files. Ideally, you should at least spot-check a few random files on each piece of physical media once every month or two.(Handybackup, 2010)

APIIT Sri Lanka Sahan Munasinghe (CB003824)

Responsibility Even though you've already specified where people go when they need to have files restored, your policy should also indicate other responsible parties. Who has physical access to the backup media? Who knows the pass phrase for encrypted backups? Who makes the policy decisions? These might be titles or positions rather than individual names, but either way, make it clear.

APIIT Sri Lanka Sahan Munasinghe (CB003824)

10 References

Oracle cooperate website, (2010), Backup, [Online] Available from: http://download.oracle.com/docs/cd/B19306_01/backup.102/b14192/intro001.html[Accessed on 1stSeptember 2010] Disaster-Resource website, (2010), Failure, [Online] Available from: http://www.disasterresource.com/articles/05p_094.html[Accessed on 1st September 2010] Sigops website, (2010), Hardware and Software Failure, [Online] Available from: http://www.sigops.org/sosp/sosp09/papers/kadav-sosp09.pdf[Accessed on 2nd September 2010] About website, (2010), Databackup, [Online] Available from: http://sbinfocanada.about.com/cs/management/a/databackup.htm[Accessed on 1st September 2010] Businessdictionary website, (2010), Magnetic Tape, [Online] Available from: http://www.businessdictionary.com/definition/magnetic-tape.html[Accessed on 2nd September 2010] ziffdavisinternet website, (2007), Magnetic Tape, [Online] Available from: http://common.ziffdavisinternet.com/encyclopedia_images/MAGTAPE.GIF[Accessed on 2nd September 2010] Techterms website, (2007), Harddisk, [Online] Available from: http://www.techterms.com/definition/harddisk [Accessed on 2nd September 2010] Techtarget website, (2007), Optical storage, [Online] Available from: http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci811276,00.html[Accessed on 2nd September 2010] Crcivr website, (2007), Online Backup, [Online] Available from: http://www.crcivr.com/online_backup.asp[Accessed on 3rd September 2010]

Backup4all website, (2010), Full Backup, [Online] Available from: http://www.backup4all.com/kb/full-backup-116.html[Accessed on 3rd September 2010]

APIIT Sri Lanka Sahan Munasinghe (CB003824)

Backup4all website, (2010), Incremental Backup, [Online] Available from: http://www.backup4all.com/kb/incremental-backup-118.html[Accessed on 3rd September 2010]

Backup4all website, (2010), Differential Backup, [Online] Available from: http://www.backup4all.com/kb/differential-backup-117.html [Accessed on 3rd September 2010]

Techtarget website, (2010), Differential Backup, [Online] Available from: http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci1008820,00.html [Accessed on 3rd September 2010]

Performance website, (2010), Database Recovery Models, [Online] Available from: http://www.sql-serverperformance.com/articles/dba/Database_Recovery_Models_in_SQL_Server_p1.aspx [Accessed on 3rd September 2010]

Businessdictionary, (2010), Backup Strategy, [Online] Available from: http://www.businessdictionary.com/definition/backup-strategy.html [Accessed on 4th September 2010]

Usenix, (2010), Physical Backup, [Online] Available from: http://www.usenix.org/events/osdi99/full_papers/hutchinson/hutchinson_html/node7.html [Accessed on 4th September 2010]

Pcmag, (2010), Logical Backup, [Online] Available from: http://www.pcmag.com/encyclopedia_term/0,2542,t=logical+backup&i=56801,00.asp [Accessed on 4th September 2010]

Findarticles, (2010), Important of Backup, [Online] Available from: http://findarticles.com/p/articles/mi_m0BRZ/is_3_22/ai_11026267[Accessed on 4th September 2010]

APIIT Sri Lanka Sahan Munasinghe (CB003824)

Findarticles, (2010), Copying/Replication, [Online] Available from: http://findarticles.com/p/articles/mi_m0BRZ/is_9_23/ai_109082339 [Accessed on 4th September 2010] Findarticles, (2010), Program Error, [Online] Available from: http://www.gnu.org/s/libc/manual/html_node/Program-Error-Signals.html[Accessed on 4th September 2010] Ohsah, (2010), Human Error, [Online] Available from: http://www.ohsah.bc.ca/media/120-FSToErr.pdf [Accessed on 4th September 2010] Linfo, (2010), System Crash, [Online] Available from: http://www.linfo.org/crash.html [Accessed on 4th September 2010] Sensagent, (2010), Disk Failure, [Online] Available from: http://dictionary.sensagent.com/hard+disk+failure/en-en [Accessed on 4th September 2010] Easeus-backup, (2010), Backup Devices and Media, [Online] Available from: http://www.easeus-backup.com/index.php/resources/Selecting-Backup-Devices-and-Media.html [Accessed on 4th September 2010] Brighthub, (2010), Online Versus Offline Backups, [Online] Available from:http://www.brighthub.com/computing/smb-security/articles/14800.aspx[Accessed on 4th September 2010] Inc, (2010), Backup Procedure, [Online] Available from: http://www.inc.com/articles/2000/03/18583.html[Accessed on 4th September 2010] Pcnineoneone, (2010), What Data Should Back Up, [Online] Available from: http://www.pcnineoneone.com/howto/backup1.html [Accessed on 4th September 2010] Backupschedule, (2010), What Is Your Backup Method, [Online] Available from: http://www.backupschedule.net/databackup/databackupmethods.html[Accessed on 4th September 2010] Spamlaws, (2010), How Are Backups Scheduled, [Online] Available from: http://www.spamlaws.com/backup-schedule.html[Accessed on 4th September 2010] Hddoctor, (2010), What Media Do You Use, [Online] Available from: http://www.hddoctor.net/which-backup-media-should-you-use[Accessed on 4th September 2010] Symantec, (2010), Media Management, [Online] Available from: http://seer.entsupport.symantec.com/docs/275640.htm[Accessed on 4th September 2010]

APIIT Sri Lanka Sahan Munasinghe (CB003824)

Computerworld, (2010), Rotating Media, [Online] Available from:


http://www.computerworld.com/s/article/266057/Rotate_Your_Backup_Media[Accessed on 4th

September 2010]
Microsoft, (2010), Dealing with Used Media, [Online] Available from: http://technet.microsoft.com/en-us/library/ms178062.aspx[Accessed on 4th September 2010] Crcsecure, (2010), Offsite Storage, [Online] Available from:

http://www.crcsecure.com/offsite_data_storage.asp[Accessed on 4th September 2010]


Emaglink, (2010), Data Restoration, [Online] Available from: http://www.emaglink.com/data-

Restoration.htm[Accessed on 4th September 2010]


Handybackup, (2010), How Is Data Integrity Verified, [Online] Available from:

http://www.handybackup.net/backup_articles/verify-backup.shtml[Accessed on 4th September 2010]

You might also like