Post on 07-Apr-2018
transcript
8/4/2019 Backup and Recovery Methods and Procedures
http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 1/25
APIIT Sri Lanka
Sahan Munasinghe (CB003824)
1 Introduction
Data protection is crucial for protecting your business's continuity. If your only data
backup is on a computer, and the hard disk fails or is damaged by a power surge, your business
data is gone. And having paper copies of business data isn't adequate data protection; what if
your business premises burn to the ground or experience severe flooding? Once again the data
you need to carry on your business could be irretrievably lost.
According to About (2010) ³for adequate data protection, you need to establish a data backupsystem that follows these three steps:
archive business data regularly
create data backups on reliable media
keep updated data backups in a secure, off-site location.´
The basic rule for business data protection is that if losing the data will interfere with doing
business, back it up. You can reinstall software programs if you need to, but recovering the
details of transactions or business correspondence is impossible if those files are lost or damaged
beyond repair.
8/4/2019 Backup and Recovery Methods and Procedures
http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 2/25
APIIT Sri Lanka
Sahan Munasinghe (CB003824)
2 Backup and Recovery means
According to Oracle (2010) ³a backup is a copy of data from your database that can be
used to reconstruct that data. Backups can be divided into physical backups and logical backups.
2.1 Physical backups
According to Usenix (2010) Physical backups are backups of the physical files used in
storing and recovering your database, such as datafiles, control files, and archived redo logs.
Ultimately, every physical backup is a copy of files storing database information to some other
location
2.2 Logical backups
According to Pcmag (2010) Logical backups contain logical data (for example, tables or
stored procedures) exported from a database´
Physical backups are the foundation of any sound backup and recovery strategy. Logical
backups are a useful supplement to physical backups in many circumstances but are not
sufficient protection against data loss without physical backups.
3 Important of Backup
Backup in general provides companies who rely heavily on business critical data the ability
to have multiple copies of their data. The first step of backup is the safeguarding of valuable
business information by copying that data. But copying pertinent business data is only one part
of this safeguarding process. The following components form a backup strategy with all of them
playing important roles. After data is copied, it must be safely transported to another location.
Next, the data must be stored in a secure facility. Finally, the valuable information must be
available to be recovered for use in case of data loss. (Findarticles, 2010)
8/4/2019 Backup and Recovery Methods and Procedures
http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 3/25
APIIT Sri Lanka
Sahan Munasinghe (CB003824)
Disaster-Resource (2010) states ³Failure in any of these 4 steps of the process can result in
disaster.
Copying/Replication
Transportation
Storage
Recovery
According to Sigops (2009)software and hardware failurecan be divided into five main groups:
Program errors
Device drivers can create errors with a computer¶s performance for a number of unrelatedreasons. (Gnu,2010)
Administrator (human) errors
Human error is an imbalance between what the situation requires, what the person
intends, and what he/she does. (Ohsah, 2010)
Computer failures (system crash)
System crash is a condition in which a computer program stops performing as expected
and also stops responding to other parts of the system. Linfom, 2008)
Disk failures
In computing, a hard disk failureoccurs when a hard disk drive malfunctions and the
stored information cannot be accessed with a properly configured computer. A disk
failure may occur in the course of normal operation, or due to an external factor such as
exposure to fire or water or high magnetic waves, or suffering a sharp impact, which can
lead to a head crash. (Sensagent, 2010)
Catastrophes (fire, earthquake) or theft
8/4/2019 Backup and Recovery Methods and Procedures
http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 4/25
APIIT Sri Lanka
Sahan Munasinghe (CB003824)
4 The bad side of losing Data
At present most of business manage their day today business activities through computers.
Guess what how much of your work has been saved in the form of little magnetized bits spread
pout across a binch of spinning platters.
In the business environment the lost of data is very tangible and quantifiable in monetary terms.
Lost Customers ± Business can lose their customer details.
Orders ±Tracked orders cannot be re-implemented due to lack of data.
Morale ± Employees get feels of helplessness due to lack of inefficient data they got.
5 Backup devices and media
You need some media to store the backups. It is preferable to use removable media, to
store the backups away from the computer and to get "unlimited" storage for backups.
Matching the capacity of the backup medium to the amount of data you intend to backup is very
important, especially as hard disks capacities grow. The more disk or tape swaps required to
perform a backup, the less likely it is that you will do it routinely. ideally, the whole backup will
fit on one tape or disk so that you can leave it to run and do something else. You don't need to
back up the whole hard disk every time, so a backup media that can hold most of it will usually
suffice. (easeus-backup, 2010)
8/4/2019 Backup and Recovery Methods and Procedures
http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 5/25
APIIT Sri Lanka
Sahan Munasinghe (CB003824)
6 Backup Storage Medias
6.1 Magnetic Tape
According to businessdictionary (2010) ribbon of plastic coated with magnetic material
(such as ferric oxide) and available in several standard widths (half-inch being the most
common) usually in cassettes. Used in audio, video, and datastorage (primarily for backup), it
provides only sequential (serial) data access unlike magnetic and optical disks which provide
random access
Source: (ziffdavisinternet.com, 2007)
8/4/2019 Backup and Recovery Methods and Procedures
http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 6/25
APIIT Sri Lanka
Sahan Munasinghe (CB003824)
Advantages Disadvantages
Reliability - Because it's in use only during a
backup or recovery operation, tape tends to
be f airly reliable compared to hard drives
(which always spin, even when they're not in
use).
Expense - Although once touted as being the
most economical backup method per gigabyte
of data, tape drives and media are now
considerably more expensive than hard drives
or network backup.
Power savings - For the same reason, tape
drives also use less power.
Tape degradation - Magnetic media is subject
to degradation due to heat, humidity, dust,
mishandling, electromagnetic forces, and
ordinary wear.
Ease of storage. Tape cartridges typically are
small and can be easily stored off-site,
allowing data to survive even if the
computer itself is destroyed or stolen.
Uncertainty of data integrity. Unless a full
verification of each backup is performed
(which takes as long as the backup itself),
there's no way to know for sure whether your
backup is reliable.
Ease of use. There's a lot of support for tape
drives, and a lot of good software that make
restoring a computer from tape a
reasonably painless procedure.
Cumbersome for non-full restores. Tapes are
sequential-access devices, and are best suited
for full-system restores. Finding and restoring
individual documents can be a long, slow, and
cumbersome process.
Source: (Authors Work based on Backupnut,2010)
8/4/2019 Backup and Recovery Methods and Procedures
http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 7/25
APIIT Sri Lanka
Sahan Munasinghe (CB003824)
6.2 External hard drives for data backups
Techterms (2010) states The hard disk is a spindle of magnetic disks, called platters, that
record and store information. Because the data is stored magnetically, information recorded to
the hard disk remains intact after you turn your computer off.
Hard drives are getting cheaper and cheaper, making them an attractive option to use as
backup media. Readily available in very high capacities they are an ideal backup solution for the
home or small office. For smaller backup needs, many users carry a USB flash drive or pen
drive. These are easier to carry around but have more limited storage capacities.
More expensive portable hard drive enclosures include not one but two or more physical hard
drives. The second drive can be configured to automatically copy the contents of the first drive,
meaning that your data is safe even if one of the drives fail. This technology is called RAID and
is very useful for protecting highly important data. However, since any data stored or deleted on
a RAID array will be immediately changed on all disks in the array.
Advantages:-
Fast recording times, very large capacities available.
Disadvantages:-
More expensive than DVD backups, cannot make multiple backups for off-site storage
without investing in extra drives.
8/4/2019 Backup and Recovery Methods and Procedures
http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 8/25
APIIT Sri Lanka
Sahan Munasinghe (CB003824)
6.3 Optical storage
According to techtarget (2010) an optical disc is an electronic data storage medium that
can be written to and read using a low-powered laser beam, stored data as micron-wide dots of
light and dark. A laser read the dots, and the data was converted to an electrical signal, and
finally to audio or visual output.
Advantages Disadvantages
Durability - With proper care, optical media
can last a long time, depending on what kind of
optical media you choose.
Reusable - The write-once read-many
(WORM) characteristic of some optical media
makes it excellent for archiving, but it also
prevents you from being able to use that media
again.
Great for archiving - Several forms of optical
media are write-once read-many, which means
that when data is written to them, they cannot
be reused. This is excellent for archiving
because data is preserved permanently with no
possibility of being overwritten.
Writing time -The server uses software
compression to write compressed data to your
optical media. This process takes considerable
processing unit resources and may increase the
time needed to write and restore that data.
Transportability - Optical media are widely
used on other platforms, including the PC. For
example, data written on a DVD-RAM can be
read on a PC or any other system with an
optical device and the same file system.
R andom access - Optical media provide the
capability to pinpoint a particular piece of data
stored on it, independent of the other data on
the volume or the order in which that data was
stored on the volume.
Source: (Authors Work based on Backupnut,2010)
8/4/2019 Backup and Recovery Methods and Procedures
http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 9/25
APIIT Sri Lanka
Sahan Munasinghe (CB003824)
6.4 Remote backup service/Remote backup
Crcivr (2010) states online backup is the process of backing up computer data to a remote
location via IP-WAN. Online backup, also known as televaulting, is used as part of a disaster
recovery strategy to protect information system data. In the event of data loss due to natural
disasters, hardware failure or human error, data stored offsite at a remote data center facility can
be used to restore systems to the most recent working configuration. In online backup, files,
folders, media or disk images are copied directly to disk-based storage at a remote data center
facility.
Advantages:-
Virtually unlimited backup capacities available, backup process can be fully automated,
backup is stored off-site, meaning your data is safe even in the event of theft or fire.
Disadvantages:-
No way to access your data if your internet connection fails (until connectivity is
restored), can be expensive especially where large amounts of data are stored and
transferred. Creating and restoring backups is very slow compared to other backup media,
even with a very fast internet connection.
8/4/2019 Backup and Recovery Methods and Procedures
http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 10/25
APIIT Sri Lanka
Sahan Munasinghe (CB003824)
7 Backup Methods
7.1 Full backup
According to backup4all (2010) full backup is the starting point for all other backups and
contains all the data in the folders and files that are selected to be backed up. Because the full
backup stores all files and folders, frequent full backups result in faster and simpler restore
operations. Remember that when you choose other backup types, restore jobs may take longer.
It would be ideal to make full backups all the time, because they are the most
comprehensive and are self-contained. However, the amount of time it takes to run full backups
often prevents us from using this backup type. Full backups are often restricted to a weekly or
monthly schedule, although the increasing speed and capacity of backup media is making
overnight full backups a more realistic proposition.
Advantages:
Restore is the fastest
All files from the selected drives and folders are backed up to one backup set.
In the event you need to restore files, they are easily restored from the single backup set.
Disadvantages:
Backing up is the slowest
Full backups require more disk, tape, or network drive space.
8/4/2019 Backup and Recovery Methods and Procedures
http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 11/25
APIIT Sri Lanka
Sahan Munasinghe (CB003824)
7.2 Differential backup
Backup4all (2010) States there is a significant, but sometimes confusing, distinction
between differential backupand incremental backup. Whereas incremental backs up all the files
modified since the last full backup, differential or incremental backup, differential backup offers
a middle ground by backing up all the files that have changed since the last full backup . That is
where it gets its name: it backs up everything that's different since the last full backup.
Advantages:
Restore is faster than restoring from incremental backup
Backing up is faster than a full backup
The storage space requirements are lower than for full backup
Disadvantages:
Restore is slower than restoring from full backup
Backing up is slower than incremental backup
The storage space requirements are higher than for incremental backup
8/4/2019 Backup and Recovery Methods and Procedures
http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 12/25
APIIT Sri Lanka
Sahan Munasinghe (CB003824)
7.3Incremental backup
Backup4all (2010) States Incremental backup provides a faster method of backing up data than
repeatedly running full backups. During an incremental backup only the files changed since the
most recent backup are included. That is where it gets its name: each backup is anincrement
since the most recent backup.
Advantages:
Backing up is the fastest
The storage space requirements are the lowest
Disadvantages:
Restore is the slowest
7.4 Mirror backup
According to backup4all (2010) a mirror backup is a straight copy of the selected folders
and files at a given instant in time. Mirror backup is the fastest backup method because it copies
files and folders to the destination without any compression . However, the increased speed has
its drawbacks: it needs larger storage space and it cannot be password protected.
While the other backup types collect all the files and folders being backed up each time into a
single compressed "container file", a mirror backup keeps all the individual files separate in the
destination. That is, the destination becomes a "mirror" of the source.
8/4/2019 Backup and Recovery Methods and Procedures
http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 13/25
APIIT Sri Lanka
Sahan Munasinghe (CB003824)
Advantages:
1. The fastest backup type, especially in conjunction with the "Fast mirror" option
2. It creates a snapshot of selected files and folders in the destination which you can browse
and access later without needing to run Backup4all
Disadvantages:
1. It needs more storage space than any other backup type
2. Password protection is not possible
3. Cannot track different versions of files
7.4 Snapshot Backups
Techtarget (2010) states a storage snapshot is a set of reference markers, or pointers, to
data stored on a disk drive, on a tape, or in a storage area network (SAN). A snapshot is
something like a detailed table of contents, but it is treated by the computer as a complete data
backup. Snapshots streamline access to stored data and can speed up the process of data
recovery. There are two main types of storage snapshot, called the copy-on-write (or low-
capacity) snapshot and the split-mirror snapshot. Utilities are available that can automatically
generate either type.
8/4/2019 Backup and Recovery Methods and Procedures
http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 14/25
APIIT Sri Lanka
Sahan Munasinghe (CB003824)
7.5 Online Versus Off line Backups
According to brighthub (2010) online data backup is just as the name implies. Data is
backed up over a networked connection (most likely using the TCP/IP standard protocol of the
Internet to a remote location (ideally). An offline data backup most often refers to data that is
backed up on-site, rather than to a remote location as mentioned above. The offline method will
require some type of on-site hardware and media such as digital tape drives or CD/DVD burners.
the offline data backup method may be the better option for you if you're concerned about
transmitting sensitive data (albeit, encrypted data) over public internet pathways.
Online backup methods have these characteristics:
y The backup is less intrusive to other clients, which can connect to the database
management software during the backup and may be able to access data depending on
what operations they need to perform.
y Care must be taken to impose appropriate locking so that data modifications do not take
place that would compromise backup integrity.
Offline backup methods have these characteristics:
y Clients can be affected adversely because the server is unavailable during backup.
y The backup procedure is simpler because there is no possibility of interference from
client activity.
A similar distinction between online and offline applies for recovery operations, and similar
characteristics apply. However, it is more likely that clients will be affected for online recoverythan for online backup because recovery requires stronger locking. During backup, clients might
be able to read data while it is being backed up. Recovery modifies data and does not just read it,
so clients must be prevented from accessing data while it is being restored.
8/4/2019 Backup and Recovery Methods and Procedures
http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 15/25
APIIT Sri Lanka
Sahan Munasinghe (CB003824)
8 Recovery Models
8.1 Full Recovery
According to Performance (2010) all operations are written to the transaction log.
Therefore, this model provides complete protection against media failure. This means that you
can restore your database up to the last committed transaction that is stored in the log file.
Additionally, data can be recovered to any point in time (prior to the point of failure). To
guarantee this, such operations as select into and the execution of the utility are fully logged, too.
Besides point-in-time recovery, the full recovery model allows you also to recover to a log mark.
Log marks correspond to a specific transaction and are inserted only if the transaction commits.
8.2 Bulk-Logged Recovery
Performance (2010) states ³Bulk-logged recovery supports log backups by using minimal space
in the transaction log for certain large-scale or bulk operations. The logging of the following
operations is minimal and cannot be controlled on an operation-by-operation basis:
Select into
Create index (including indexed views)
Utility and bulk insert
Write text and update text
Although bulk operations are not fully logged, you do not have to perform a full database backup
after the completion of such an operation. During bulk-logged recovery, transaction log backups
contain both the log as well as the results of a bulk operation. This simplifies the transition
between full and bulk-logged recovery models´.
8/4/2019 Backup and Recovery Methods and Procedures
http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 16/25
APIIT Sri Lanka
Sahan Munasinghe (CB003824)
8.3 Simple Recovery
According to Performance (2010) In the simple recovery model, the transaction log is not
used to protect your database against any media failure. Therefore, you can recover a damaged
database only using full database or differential backup. Backup strategy for this model is very
simple: Restore the database using existing database backups and, if differential backups exist,
apply the most recent one.
The advantages of the simple recovery model are that the performance of all bulk operations is
very high and requirements for the log space very small.
8/4/2019 Backup and Recovery Methods and Procedures
http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 17/25
APIIT Sri Lanka
Sahan Munasinghe (CB003824)
9 Backup Policy
According to businessdictionary (2010)Planned approach to data protection that assigns the
backup responsibilities to the appropriate personnel or departments, and sets the duplication time
cycles.
The backup policy can create by stick to the following points,
Backup Procedure
Backup procedure encompasses several main points what data you back up, using what
method(s), how often, and to what media. Each one of these matters involves a number of
decisions. (Inc, 2010)
What Data Should Back Up?
This is the most important things your backup policy should state. Identify what data you want to
backup its saves time it takes for each backup to run, as well as the amount of storage space
needed-not to mention network congestion.(Pcnineoneone, 2010)
What Is Your Backup Method?
Author referring to full versus incremental or differential backups. (Although "incremental" and
"differential" mean different things to different people, one common usage is for a differential
backup to contain all the data that changed since the last full backup, while an incremental
backup contains only the data that changed since the last update. Incremental backups run faster
because they contain less data, but differential backups may be easier and quicker to restore,
especially if you use tape drives.) Your policy should state under which circumstances one
method or another is used. For example, you might specify that a full backup occurs once a
month with incremental backups twice a day and differential backups once a week. If the
method is different for servers than it is for workstations, say what those differences
are.(Backupschedule, 2010)
8/4/2019 Backup and Recovery Methods and Procedures
http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 18/25
APIIT Sri Lanka
Sahan Munasinghe (CB003824)
How Are Backups Scheduled?
In this schedule state how frequently backups run, whether that's several times a day, a couple of
times per week, or whatever. This schedule should least impact on users' work.(S pamlaws, 2010)
What Media Do You Use?
In most large organizations, high-capacity tape drives of one sort or another are taken for granted
as a backup medium, often with an automated loading and retrieval system. That may indeed be
the best choice for your business, but it's not the only option. In particular, given the rapidly
rising capacities and falling prices of hard drives, you may find that some sort of hard drive array
is just as economical, while providing much faster performance, especially for restoring files.
Your written backup policy can perhaps be worded in a generic way to accommodate potential
changes in the media you use, but think through the implications carefully. (Hddoctor, 2010)
Media Management
This area state how your physical backup media is handled. This includes rotating among
multiple sets of media, recycling, replacing, or destroying old media, storing backup¶s offsite and
keeping your backup media encrypted.(Symantec, 2010)
Rotating Media
All backup media is subject to failure-for any number of reasons. A smart backup policy assumes
that a certain percentage of media will fail much sooner than it should. The usual way to deal
with this unfortunate fact of life is with redundancy: have two, three, or more copies of each
backup and rotate them on a regular basis.(Computerworld, 2010)
8/4/2019 Backup and Recovery Methods and Procedures
http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 19/25
APIIT Sri Lanka
Sahan Munasinghe (CB003824)
Dealing with Used Media
Backup data is bound to exceed your media's capacity eventually. In any case, your backup
policy should specify exactly what happens when a storage device fills up. You have a few main
choices:
Recycle: Erase the media and record over it.
Store: Hang onto the full media.
Destroy: Ditch the old media in a way that prevents anyone else from reading your
backups.
If you choose "store" or "destroy," you'll start over with new, blank media. Regardless of your
choice, list the details. If you recycle media, how many times will you do that before storing or
destroying it? Do you replace an entire set of media all at once (generally a good idea) or by the
individual piece? How long will you store old media, and where? If and when you destroy old
media, how will you do so securely?(Microsoft, 2010)
Offsite Storage
It's all well and good to keep backup media in a fireproof safe or other secure location onsite, but
you must also have at least one copy (and preferably more than one) stored in another building.
As unlikely as it may be, something could happen-theft, espionage, earthquake, terrorist attack,
whatever-that destroys all your backups if they're kept in a single location. Don't take any
chances. You already specified that you have more than one set of media in rotation, so designate
a safe offsite location to store media that's not actively in use.(Crcsecure, 2010)
Data Restoration
Backups are of no use whatsoever if you can't restore your data when you need it. Unfortunately,
restoration is usually the part of a backup policy that gets the least attention. Give careful thought
on this.(Emaglink, 2010)
8/4/2019 Backup and Recovery Methods and Procedures
http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 20/25
APIIT Sri Lanka
Sahan Munasinghe (CB003824)
Who Can Restore Files?
In most business situations, only an IT person can restore backed-up files, since they reside on a
secure server and since it would be all too easy for a user to mistakenly overwrite good files with
backups.
What Is the Procedure for Restoring Files?
Assuming your users have to go to the IT staff to get files restored, exactly what is the process-
make a phone call? Fill out a form on the intranet? Send an email? What if the user doesn't know
the exact file name, date, or location? Is there a different procedure if a whole drive or user
folder has to be restored? S pell out, in simple end-user terms, what someone has to do to get
back data that's in the backup archives somewhere. And, if you have a system that lets users
restore their own files, point them to a step-by-step guide on a Web page somewhere for how to
do this.
How Is Data Integrity Verified?
You can't assume that your backups are perfectly and indefinitely intact, just because your
backup software didn't report any errors. Stuff happens. Make it an explicit part of your backup
policy to test backups on a regular basis. When I say "test," again, I don't merely mean run
through a verification procedure with your backup software. I mean actually restore files. Ideally,
you should at least spot-check a few random files on each piece of physical media once every
month or two.(Handybackup, 2010)
8/4/2019 Backup and Recovery Methods and Procedures
http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 21/25
APIIT Sri Lanka
Sahan Munasinghe (CB003824)
Responsibility
Even though you've already specified where people go when they need to have files restored,
your policy should also indicate other responsible parties. Who has physical access to the backup
media? Who knows the pass phrase for encrypted backups? Who makes the policy decisions?
These might be titles or positions rather than individual names, but either way, make it clear.
8/4/2019 Backup and Recovery Methods and Procedures
http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 22/25
APIIT Sri Lanka
Sahan Munasinghe (CB003824)
10 References
Oracle cooperate website, (2010), ³Backup´, [Online] Available from:
http://download.oracle.com/docs/cd/B19306_01/backup.102/b14192/intro001.html[Accessed on1stSeptember 2010]
Disaster-Resource website, (2010), ³Failure´, [Online] Available from: http://www.disaster-
resource.com/articles/05p_094.html[Accessed on 1st September 2010]
Sigops website, (2010), ³Hardware and Software Failure´, [Online] Available from:
http://www.sigops.org/sosp/sosp09/papers/kadav-sosp09.pdf [Accessed on 2nd September 2010]
About website, (2010), ³Databackup´, [Online] Available from:
http://sbinfocanada.about.com/cs/management/a/databackup.htm[Accessed on 1st September
2010]
Businessdictionary website, (2010), ³Magnetic Tape´, [Online] Available from:
http://www.businessdictionary.com/definition/magnetic-tape.html[Accessed on 2nd September
2010]
ziffdavisinternet website, (2007), ³Magnetic Tape´, [Online] Available from:
http://common.ziffdavisinternet.com/encyclopedia_images/MAGTAPE.GIF[Accessed on 2nd
September 2010]
Techterms website, (2007), ³Harddisk´, [Online] Available from:
http://www.techterms.com/definition/harddisk [Accessed on 2nd September 2010]
Techtarget website, (2007), ³Optical storage´, [Online] Available from:
http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci811276,00.html[Accessed on 2nd
September 2010]
Crcivr website, (2007), ³Online Backup´, [Online] Available from:
http://www.crcivr.com/online_backup.asp[Accessed on 3rd September 2010]
Backup4all website, (2010), ³Full Backup´, [Online] Available from:
http://www.backup4all.com/kb/full-backup-116.html[Accessed on 3rd September 2010]
8/4/2019 Backup and Recovery Methods and Procedures
http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 23/25
APIIT Sri Lanka
Sahan Munasinghe (CB003824)
Backup4all website, (2010), ³Incremental Backup´, [Online] Available from:
http://www.backup4all.com/kb/incremental-backup-118.html[Accessed on 3rd September 2010]
Backup4all website, (2010), ³Differential Backup´, [Online] Available from:http://www.backup4all.com/kb/differential-backup-117.html [Accessed on 3rd September 2010]
Techtarget website, (2010), ³Differential Backup´, [Online] Available from:
http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci1008820,00.html [Accessed on 3rd
September 2010]
Performance website, (2010), ³Database Recovery Models´, [Online] Available from:
http://www.sql-server-
performance.com/articles/dba/Database_Recovery_Models_in_ SQL_ Server_p1.aspx [Accessed
on 3rd September 2010]
Businessdictionary, (2010), ³Backup Strategy´, [Online] Available from:
http://www.businessdictionary.com/definition/backup-strategy.html [Accessed on 4th September
2010]
Usenix, (2010), ³Physical Backup´, [Online] Available from:
http://www.usenix.org/events/osdi99/full_papers/hutchinson/hutchinson_html/node7.html
[Accessed on 4th September 2010]
Pcmag, (2010), ³Logical Backup´, [Online] Available from:
http://www.pcmag.com/encyclopedia_term/0,2542,t=logical+backup&i=56801,00.asp [Accessed
on 4th September 2010]
Findarticles, (2010), ³Important of Backup´, [Online] Available from:
http://findarticles.com/p/articles/mi_m0BRZ/is_3_22/ai_11026267[Accessed on 4th September
2010]
8/4/2019 Backup and Recovery Methods and Procedures
http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 24/25
APIIT Sri Lanka
Sahan Munasinghe (CB003824)
Findarticles, (2010), ³Copying/Replication´, [Online] Available from:
http://findarticles.com/p/articles/mi_m0BRZ/is_9_23/ai_109082339 [Accessed on 4th September
2010]
Findarticles, (2010), ³Program Error´, [Online] Available from:
http://www.gnu.org/s/libc/manual/html_node/Program-Error-Signals.html[Accessed on 4thSeptember 2010]
Ohsah, (2010), ³Human Error´, [Online] Available from: http://www.ohsah.bc.ca/media/120-FS-
ToErr.pdf [Accessed on 4th September 2010]
Linfo, (2010), ³System Crash´, [Online] Available from: http://www.linfo.org/crash.html
[Accessed on 4th September 2010]
Sensagent, (2010), ³Disk Failure´, [Online] Available from:
http://dictionary.sensagent.com/hard+disk+failure/en-en [Accessed on 4th September 2010]
Easeus-backup, (2010), ³Backup Devices and Media´, [Online] Available from:
http://www.easeus-backup.com/index.php/resources/Selecting-Backup-Devices-and-Media.html
[Accessed on 4th September 2010]
Brighthub, (2010), ³Online Versus Offline Backups´, [Online] Availablefrom:http://www.brighthub.com/computing/smb-security/articles/14800.aspx[Accessed on 4thSeptember 2010]
Inc, (2010), ³Backup Procedure´, [Online] Available from:
http://www.inc.com/articles/2000/03/18583.html[Accessed on 4th September 2010]
Pcnineoneone, (2010), ³What Data Should Back Up´, [Online] Available from:
http://www.pcnineoneone.com/howto/backup1.html [Accessed on 4th September 2010]
Backupschedule, (2010), ³What Is Your Backup Method´, [Online] Available from:
http://www.backupschedule.net/databackup/databackupmethods.html[Accessed on 4th
September 2010]
S pamlaws, (2010), ³How Are Backups Scheduled´, [Online] Available from:
http://www.spamlaws.com/backup-schedule.html[Accessed on 4th September 2010]
Hddoctor, (2010), ³What Media Do You Use´, [Online] Available from:
http://www.hddoctor.net/which-backup-media-should-you-use[Accessed on 4th September
2010]
Symantec, (2010), ³Media Management´, [Online] Available from:
http://seer.entsupport.symantec.com/docs/275640.htm[Accessed on 4th September 2010]
8/4/2019 Backup and Recovery Methods and Procedures
http://slidepdf.com/reader/full/backup-and-recovery-methods-and-procedures 25/25
APIIT Sri Lanka
Sahan Munasinghe (CB003824)
Computerworld, (2010), ³Rotating Media´, [Online] Available from:
http://www.computerworld.com/s/article/266057/Rotate_Your_Backup_Media[Accessed on 4th
September 2010]
Microsoft, (2010), ³Dealing with Used Media´, [Online] Available from:
http://technet.microsoft.com/en-us/library/ms178062.aspx[Accessed on 4th September 2010]
Crcsecure, (2010), ³Offsite Storage´, [Online] Available from:
http://www.crcsecure.com/offsite_data_storage.asp[Accessed on 4th September 2010]
Emaglink, (2010), ³Data Restoration´, [Online] Available from: http://www.emaglink.com/data-
Restoration.htm[Accessed on 4th September 2010]
Handybackup, (2010), ³How Is Data Integrity Verified´, [Online] Available from:
http://www.handybackup.net/backup_articles/verify-backup.shtml[Accessed on 4th September
2010]