Chapters 10-11 Flashcards
(85 cards)
Why do Businesses Gather Data?
- Decision Making
- Core Components of Larger Corporate Strategy
- Data must all be protected
Why are Data Backups Important?
- Prevent Data Loss
What Threats are Addressed by Backups?
- Mechanical Failure or Damage
- Data on Lost or Stolen Computers
- Data Destruction or Corruption
What is Shadowing?
Backup Copy of Each File Being Worked on is Written Periodically
Full Backups vs Incremental Backups
- Full Backups are Slower but Cover Everything
- Incremental Backups Only Records Changes Since Last Backup, faster, should be done until next full backup
What is a Centralized Backup?
Back up Systems Over the Network to a Server with Some Storage Device Attached
What is CDP?
- Continuous Data Protection is when two server locations back up each other in real time where one site can take over in case of disaster
- Required high speed transmission link
What are Magnetic Tapes?
Slow but inexpensive per bit stored, used in servers
What are Second Hard Drives on Computers?
Very fast but lost if computer is stolen or destroyed, can be backed up on tape for archival
what are DVDs?
Optical Disks are more accessible but offer less capacity. Life of information is unknown.
What is a RAID?
- A Redundant Array of Independent Disks combines multiple disks through virtualization for data redundancy and/or performance
- Disks can be written to simultaneously
Differentiate RAID 0, RAID 1, and RAID 5
- Raid 0 is used to store data segments into different disks (Striping)
- Raid 1 is very fast and used for data redundancy (mirroring)
- Raid 5 is stripping and mirroring with fast read but slow write (Distributed Parity)
What is Mirroring?
Creating an exact copy of disks at the same time, virtually no data loss but costly
What is Striping?
Writing data simultaneously across multiple disks, fast but no reliability
What are Backup Creation Policies?
What should be backed up, how frequent it happens, and how frequent restoration testing occurs
Why Should Backup Media be Encrypted?
To protect confidential information if tape is stolen or lost
Why Should There be Strong Access Control Policies?
- To log and monitor checkouts
- To protect media from loss
What are Data Retention Policies?
Strong legal requirements for how long certain types of data must be kept
What are the Benefits of Email Retention?
- Major Part of Corporate Memory
- Referencing Purposes
- Legal Archiving Requirements (may result in fines if broken)
What are the Dangers of Retention?
- Legal Discovery Process
- Potentially Very Damaging
- Always Expensive
What is Accidental Email Retention?
- Emails unknowingly stored or individual acts of saving copies of data
Why is Email Message Authentication Important?
Prevents fake blackmail
What are Parts of a Database?
- Entity: Type of Object
- Key: Unique Row Identifier
- Attributes (Columns): entity characteristics
- Row (tuple/record): specific occurrence of entity
How to Enforce Database Security?
- Restrict Data Access
- Restrict Granularity (level of detail)
- Restrict Information Regarding Database Structure