際際滷

際際滷Share a Scribd company logo
Backups of security devices, Performance
Analysis
Backup
Why Backup?
If you are not backing up your files
regularly, you deserve to lose them.
Average user experiences loss once a year
Backup
What Can Cause Data Loss?
 Incorrect software use
 Input data incorrectly
 Software may harm data
 Hard disk malfunctions
 Accidentally delete files
 Virus infection
Backup
Methods
Full backup
Differential backup
Incremental backup
Media
Diskette
Tape
Zip disk
CD-R / CR-RW
DVD-RAM
Mirrored hard drive
Full Backup
 Complete type of backup operation
 make a copy of all the data including files, folders,
settings, applications
 On - storage devices like hard drive, SSD, HDD, etc.
 files and folders will be backed up again entirely in any
subsequent backup operations  redundant copies of data
 Needs much disk space
Incremental Backup
 backing up all the files that have changed since the last
backup operation
Differential Backup
 backing up the only changed files since the last full
backup
Mirror Backup
 mirror of source is being supported up
 when record is erased from source, that document -
erased in Mirror Backup too
Full PC Backup
 whole picture of PCs hard drive
Local Backup
 backup where capacity medium is kept close within reach
or in structure with source
 second inward hard drive, connected outer hard drive,
CD/DVD-More, Network Attached storage (NAS)
Offsite Backup
 Backup - set in an alternate topographical area from
source
 Cloud Backup
 FTP Backup
Hardware and Software
 Desktops and laptops  Computer equipment can be damaged, lost, stolen.
 Removable media  Media degrades over time. Software programs to read
the media change and can become obsolete. Hardware changes over time,
and is not always backward compatible.
 Cloud storage
 Cloud providers go out of business
 Data formats change (what you upload may not be useable
when you download it)
 Accidents happen. Data is corrupted, or stolen.
File Formats
 Think about the ability to use and re-use data in the future. Both for you,
and for others.
 Accessibility of future data because of technology changes - proactively
plan for hardware and software obsolescence.
 Think about who needs access to your data. Are you collaborating with
someone within the University, or outside of it?
 Conducting funded research - be aware of any data storage and data
sharing requirements.
 Think about data security.
Best Practices for File Formats
Formats most likely to be accessible in the future are:
 non-proprietary
 open
 documented standard commonly used by a discipline-specific
research community
 standard representation (ASCII, Unicode)
 unencrypted and uncompressed
Remember that comprehensive documentation (metadata) is
essential to accurate use, and reuse, of all data.
Data Security and Access Control
 Network security
 Keep confidential or highly sensitive data off
computers or servers connected to the internet
 Physical security
 Access to buildings and rooms
 Computer systems & files
 Use strong passwords on files and systems
 Virus protection (updated continuously and running!)
 Encryption
Data Backups
 Reduces the risk of damage or loss
 Use multiple locations (here-near-far or 3-2-1)
-Keep at least 3 copies of data
- Store 2 backup copies on different storage media.
- Store 1 backup copy offsite.
 Create a backup schedule and put someone dependable in
charge
 Use reliable backup medium
 Test your backup system (test file recovery, data consistency, data
accuracy)

More Related Content

Similar to 7-Backups of security Devices-03-06-2023.ppt (20)

Backup and recovery
Backup and recoveryBackup and recovery
Backup and recovery
dhawal mehta
Andrew waugh
Andrew waughAndrew waugh
Andrew waugh
Ark Group Australia Pty Ltd
Andrew Waugh presentation
Andrew Waugh   presentationAndrew Waugh   presentation
Andrew Waugh presentation
Ark Group Australia Pty Ltd
Data Security Consideration and data secure.pptx
Data Security Consideration and data secure.pptxData Security Consideration and data secure.pptx
Data Security Consideration and data secure.pptx
nikitasoam7781
Presentation on BACKUP(Nursing informatics )
Presentation on BACKUP(Nursing informatics )Presentation on BACKUP(Nursing informatics )
Presentation on BACKUP(Nursing informatics )
dapilahjoshua18
Data Management 101
Data Management 101Data Management 101
Data Management 101
Kristin Briney
system admin Backups Disaster Recovery .pptx
system admin Backups  Disaster Recovery .pptxsystem admin Backups  Disaster Recovery .pptx
system admin Backups Disaster Recovery .pptx
johnrains584
Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021
Karel Kannel
University of Bath Research Data Management training for researchers
University of Bath Research Data Management training for researchersUniversity of Bath Research Data Management training for researchers
University of Bath Research Data Management training for researchers
Jez Cope
SCA Accessioning Born-Digital Materials Workshop, Nov. 8, 2012
SCA Accessioning Born-Digital Materials Workshop, Nov. 8, 2012SCA Accessioning Born-Digital Materials Workshop, Nov. 8, 2012
SCA Accessioning Born-Digital Materials Workshop, Nov. 8, 2012
peterchanws
Accessioning Born-Digital Materials
Accessioning Born-Digital MaterialsAccessioning Born-Digital Materials
Accessioning Born-Digital Materials
peterchanws
Encryption
EncryptionEncryption
Encryption
Nitin Parbhakar
Database management system in the business
Database management system in the businessDatabase management system in the business
Database management system in the business
ssuserd329601
Data Management for Undergraduate Researchers (updated - 02/2016)
Data Management for Undergraduate Researchers (updated - 02/2016)Data Management for Undergraduate Researchers (updated - 02/2016)
Data Management for Undergraduate Researchers (updated - 02/2016)
Rebekah Cummings
Data Backup (IT) Lecture 際際滷 # 5
Data Backup (IT) Lecture 際際滷 # 5Data Backup (IT) Lecture 際際滷 # 5
Data Backup (IT) Lecture 際際滷 # 5
Muhammad Talha Zaroon
Data security
Data securityData security
Data security
sbmiller87
Android forensics an Custom Recovery Image
Android forensics an Custom Recovery ImageAndroid forensics an Custom Recovery Image
Android forensics an Custom Recovery Image
Mohamed Khaled
Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
Webinar: Are You Treating Unstructured Data as a Second Class Citizen?Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
Storage Switzerland
data acquisition in computer forensics and
data acquisition in computer forensics anddata acquisition in computer forensics and
data acquisition in computer forensics and
ssuserec53e73
Guide to computer forensics and investigation.ppt
Guide to computer forensics and investigation.pptGuide to computer forensics and investigation.ppt
Guide to computer forensics and investigation.ppt
MaluOffice
Backup and recovery
Backup and recoveryBackup and recovery
Backup and recovery
dhawal mehta
Data Security Consideration and data secure.pptx
Data Security Consideration and data secure.pptxData Security Consideration and data secure.pptx
Data Security Consideration and data secure.pptx
nikitasoam7781
Presentation on BACKUP(Nursing informatics )
Presentation on BACKUP(Nursing informatics )Presentation on BACKUP(Nursing informatics )
Presentation on BACKUP(Nursing informatics )
dapilahjoshua18
Data Management 101
Data Management 101Data Management 101
Data Management 101
Kristin Briney
system admin Backups Disaster Recovery .pptx
system admin Backups  Disaster Recovery .pptxsystem admin Backups  Disaster Recovery .pptx
system admin Backups Disaster Recovery .pptx
johnrains584
Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021Proact backup and storage vs ransomware 2021
Proact backup and storage vs ransomware 2021
Karel Kannel
University of Bath Research Data Management training for researchers
University of Bath Research Data Management training for researchersUniversity of Bath Research Data Management training for researchers
University of Bath Research Data Management training for researchers
Jez Cope
SCA Accessioning Born-Digital Materials Workshop, Nov. 8, 2012
SCA Accessioning Born-Digital Materials Workshop, Nov. 8, 2012SCA Accessioning Born-Digital Materials Workshop, Nov. 8, 2012
SCA Accessioning Born-Digital Materials Workshop, Nov. 8, 2012
peterchanws
Accessioning Born-Digital Materials
Accessioning Born-Digital MaterialsAccessioning Born-Digital Materials
Accessioning Born-Digital Materials
peterchanws
Database management system in the business
Database management system in the businessDatabase management system in the business
Database management system in the business
ssuserd329601
Data Management for Undergraduate Researchers (updated - 02/2016)
Data Management for Undergraduate Researchers (updated - 02/2016)Data Management for Undergraduate Researchers (updated - 02/2016)
Data Management for Undergraduate Researchers (updated - 02/2016)
Rebekah Cummings
Data Backup (IT) Lecture 際際滷 # 5
Data Backup (IT) Lecture 際際滷 # 5Data Backup (IT) Lecture 際際滷 # 5
Data Backup (IT) Lecture 際際滷 # 5
Muhammad Talha Zaroon
Data security
Data securityData security
Data security
sbmiller87
Android forensics an Custom Recovery Image
Android forensics an Custom Recovery ImageAndroid forensics an Custom Recovery Image
Android forensics an Custom Recovery Image
Mohamed Khaled
Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
Webinar: Are You Treating Unstructured Data as a Second Class Citizen?Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
Webinar: Are You Treating Unstructured Data as a Second Class Citizen?
Storage Switzerland
data acquisition in computer forensics and
data acquisition in computer forensics anddata acquisition in computer forensics and
data acquisition in computer forensics and
ssuserec53e73
Guide to computer forensics and investigation.ppt
Guide to computer forensics and investigation.pptGuide to computer forensics and investigation.ppt
Guide to computer forensics and investigation.ppt
MaluOffice

More from abhichowdary16 (7)

trigno.pptx
trigno.pptxtrigno.pptx
trigno.pptx
abhichowdary16
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
abhichowdary16
20-MOD 8 Self and Work Management-20-07-2023.ppt
20-MOD 8 Self and Work Management-20-07-2023.ppt20-MOD 8 Self and Work Management-20-07-2023.ppt
20-MOD 8 Self and Work Management-20-07-2023.ppt
abhichowdary16
Class IX Maths Construction Module 1 .pptx
Class IX Maths Construction Module 1 .pptxClass IX Maths Construction Module 1 .pptx
Class IX Maths Construction Module 1 .pptx
abhichowdary16
mathsproject-
mathsproject-mathsproject-
mathsproject-
abhichowdary16
triangles ppt.pptx
triangles ppt.pptxtriangles ppt.pptx
triangles ppt.pptx
abhichowdary16
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
abhichowdary16
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
abhichowdary16
20-MOD 8 Self and Work Management-20-07-2023.ppt
20-MOD 8 Self and Work Management-20-07-2023.ppt20-MOD 8 Self and Work Management-20-07-2023.ppt
20-MOD 8 Self and Work Management-20-07-2023.ppt
abhichowdary16
Class IX Maths Construction Module 1 .pptx
Class IX Maths Construction Module 1 .pptxClass IX Maths Construction Module 1 .pptx
Class IX Maths Construction Module 1 .pptx
abhichowdary16
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
abhichowdary16

Recently uploaded (20)

Multi objective genetic approach with Ranking
Multi objective genetic approach with RankingMulti objective genetic approach with Ranking
Multi objective genetic approach with Ranking
namisha18
health safety and environment presentation
health safety and environment presentationhealth safety and environment presentation
health safety and environment presentation
ssuserc606c7
Air pollution is contamination of the indoor or outdoor environment by any ch...
Air pollution is contamination of the indoor or outdoor environment by any ch...Air pollution is contamination of the indoor or outdoor environment by any ch...
Air pollution is contamination of the indoor or outdoor environment by any ch...
dhanashree78
only history of java.pptx real bihind the name java
only history of java.pptx real bihind the name javaonly history of java.pptx real bihind the name java
only history of java.pptx real bihind the name java
mushtaqsaliq9
Env and Water Supply Engg._Dr. Hasan.pdf
Env and Water Supply Engg._Dr. Hasan.pdfEnv and Water Supply Engg._Dr. Hasan.pdf
Env and Water Supply Engg._Dr. Hasan.pdf
MahmudHasan747870
Turbocor Product and Technology Review.pdf
Turbocor Product and Technology Review.pdfTurbocor Product and Technology Review.pdf
Turbocor Product and Technology Review.pdf
Totok Sulistiyanto
decarbonization steel industry rev1.pptx
decarbonization steel industry rev1.pptxdecarbonization steel industry rev1.pptx
decarbonization steel industry rev1.pptx
gonzalezolabarriaped
Water Industry Process Automation & Control Monthly - March 2025.pdf
Water Industry Process Automation & Control Monthly - March 2025.pdfWater Industry Process Automation & Control Monthly - March 2025.pdf
Water Industry Process Automation & Control Monthly - March 2025.pdf
Water Industry Process Automation & Control
Cloud Computing concepts and technologies
Cloud Computing concepts and technologiesCloud Computing concepts and technologies
Cloud Computing concepts and technologies
ssuser4c9444
Integration of Additive Manufacturing (AM) with IoT : A Smart Manufacturing A...
Integration of Additive Manufacturing (AM) with IoT : A Smart Manufacturing A...Integration of Additive Manufacturing (AM) with IoT : A Smart Manufacturing A...
Integration of Additive Manufacturing (AM) with IoT : A Smart Manufacturing A...
ASHISHDESAI85
Wireless-Charger presentation for seminar .pdf
Wireless-Charger presentation for seminar .pdfWireless-Charger presentation for seminar .pdf
Wireless-Charger presentation for seminar .pdf
AbhinandanMishra30
US Patented ReGenX Generator, ReGen-X Quatum Motor EV Regenerative Accelerati...
US Patented ReGenX Generator, ReGen-X Quatum Motor EV Regenerative Accelerati...US Patented ReGenX Generator, ReGen-X Quatum Motor EV Regenerative Accelerati...
US Patented ReGenX Generator, ReGen-X Quatum Motor EV Regenerative Accelerati...
Thane Heins NOBEL PRIZE WINNING ENERGY RESEARCHER
Embedded System intro Embedded System intro.ppt
Embedded System intro Embedded System intro.pptEmbedded System intro Embedded System intro.ppt
Embedded System intro Embedded System intro.ppt
23ucc580
GROUP-3-GRID-CODE-AND-DISTRIBUTION-CODE.pptx
GROUP-3-GRID-CODE-AND-DISTRIBUTION-CODE.pptxGROUP-3-GRID-CODE-AND-DISTRIBUTION-CODE.pptx
GROUP-3-GRID-CODE-AND-DISTRIBUTION-CODE.pptx
meneememoo
CS3451-OPERATING-SYSTEM NOTES ALL123.pdf
CS3451-OPERATING-SYSTEM NOTES ALL123.pdfCS3451-OPERATING-SYSTEM NOTES ALL123.pdf
CS3451-OPERATING-SYSTEM NOTES ALL123.pdf
PonniS7
Introduction to Safety, Health & Environment
Introduction to Safety, Health  & EnvironmentIntroduction to Safety, Health  & Environment
Introduction to Safety, Health & Environment
ssuserc606c7
15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf
15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf
15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf
NgocThang9
CFOT Fiber Optics FOA CERTIFICATION.pptx
CFOT Fiber Optics FOA CERTIFICATION.pptxCFOT Fiber Optics FOA CERTIFICATION.pptx
CFOT Fiber Optics FOA CERTIFICATION.pptx
MohamedShabana37
Name.docxVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV
Name.docxVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVName.docxVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV
Name.docxVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV
MerijimArsedelPalmad1
Indian Soil Classification System in Geotechnical Engineering
Indian Soil Classification System in Geotechnical EngineeringIndian Soil Classification System in Geotechnical Engineering
Indian Soil Classification System in Geotechnical Engineering
Rajani Vyawahare
Multi objective genetic approach with Ranking
Multi objective genetic approach with RankingMulti objective genetic approach with Ranking
Multi objective genetic approach with Ranking
namisha18
health safety and environment presentation
health safety and environment presentationhealth safety and environment presentation
health safety and environment presentation
ssuserc606c7
Air pollution is contamination of the indoor or outdoor environment by any ch...
Air pollution is contamination of the indoor or outdoor environment by any ch...Air pollution is contamination of the indoor or outdoor environment by any ch...
Air pollution is contamination of the indoor or outdoor environment by any ch...
dhanashree78
only history of java.pptx real bihind the name java
only history of java.pptx real bihind the name javaonly history of java.pptx real bihind the name java
only history of java.pptx real bihind the name java
mushtaqsaliq9
Env and Water Supply Engg._Dr. Hasan.pdf
Env and Water Supply Engg._Dr. Hasan.pdfEnv and Water Supply Engg._Dr. Hasan.pdf
Env and Water Supply Engg._Dr. Hasan.pdf
MahmudHasan747870
Turbocor Product and Technology Review.pdf
Turbocor Product and Technology Review.pdfTurbocor Product and Technology Review.pdf
Turbocor Product and Technology Review.pdf
Totok Sulistiyanto
decarbonization steel industry rev1.pptx
decarbonization steel industry rev1.pptxdecarbonization steel industry rev1.pptx
decarbonization steel industry rev1.pptx
gonzalezolabarriaped
Cloud Computing concepts and technologies
Cloud Computing concepts and technologiesCloud Computing concepts and technologies
Cloud Computing concepts and technologies
ssuser4c9444
Integration of Additive Manufacturing (AM) with IoT : A Smart Manufacturing A...
Integration of Additive Manufacturing (AM) with IoT : A Smart Manufacturing A...Integration of Additive Manufacturing (AM) with IoT : A Smart Manufacturing A...
Integration of Additive Manufacturing (AM) with IoT : A Smart Manufacturing A...
ASHISHDESAI85
Wireless-Charger presentation for seminar .pdf
Wireless-Charger presentation for seminar .pdfWireless-Charger presentation for seminar .pdf
Wireless-Charger presentation for seminar .pdf
AbhinandanMishra30
Embedded System intro Embedded System intro.ppt
Embedded System intro Embedded System intro.pptEmbedded System intro Embedded System intro.ppt
Embedded System intro Embedded System intro.ppt
23ucc580
GROUP-3-GRID-CODE-AND-DISTRIBUTION-CODE.pptx
GROUP-3-GRID-CODE-AND-DISTRIBUTION-CODE.pptxGROUP-3-GRID-CODE-AND-DISTRIBUTION-CODE.pptx
GROUP-3-GRID-CODE-AND-DISTRIBUTION-CODE.pptx
meneememoo
CS3451-OPERATING-SYSTEM NOTES ALL123.pdf
CS3451-OPERATING-SYSTEM NOTES ALL123.pdfCS3451-OPERATING-SYSTEM NOTES ALL123.pdf
CS3451-OPERATING-SYSTEM NOTES ALL123.pdf
PonniS7
Introduction to Safety, Health & Environment
Introduction to Safety, Health  & EnvironmentIntroduction to Safety, Health  & Environment
Introduction to Safety, Health & Environment
ssuserc606c7
15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf
15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf
15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf
NgocThang9
CFOT Fiber Optics FOA CERTIFICATION.pptx
CFOT Fiber Optics FOA CERTIFICATION.pptxCFOT Fiber Optics FOA CERTIFICATION.pptx
CFOT Fiber Optics FOA CERTIFICATION.pptx
MohamedShabana37
Name.docxVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV
Name.docxVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVName.docxVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV
Name.docxVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV
MerijimArsedelPalmad1
Indian Soil Classification System in Geotechnical Engineering
Indian Soil Classification System in Geotechnical EngineeringIndian Soil Classification System in Geotechnical Engineering
Indian Soil Classification System in Geotechnical Engineering
Rajani Vyawahare

7-Backups of security Devices-03-06-2023.ppt

  • 1. Backups of security devices, Performance Analysis
  • 2. Backup Why Backup? If you are not backing up your files regularly, you deserve to lose them. Average user experiences loss once a year
  • 3. Backup What Can Cause Data Loss? Incorrect software use Input data incorrectly Software may harm data Hard disk malfunctions Accidentally delete files Virus infection
  • 4. Backup Methods Full backup Differential backup Incremental backup Media Diskette Tape Zip disk CD-R / CR-RW DVD-RAM Mirrored hard drive
  • 5. Full Backup Complete type of backup operation make a copy of all the data including files, folders, settings, applications On - storage devices like hard drive, SSD, HDD, etc. files and folders will be backed up again entirely in any subsequent backup operations redundant copies of data Needs much disk space
  • 6. Incremental Backup backing up all the files that have changed since the last backup operation
  • 7. Differential Backup backing up the only changed files since the last full backup
  • 8. Mirror Backup mirror of source is being supported up when record is erased from source, that document - erased in Mirror Backup too
  • 9. Full PC Backup whole picture of PCs hard drive
  • 10. Local Backup backup where capacity medium is kept close within reach or in structure with source second inward hard drive, connected outer hard drive, CD/DVD-More, Network Attached storage (NAS)
  • 11. Offsite Backup Backup - set in an alternate topographical area from source Cloud Backup FTP Backup
  • 12. Hardware and Software Desktops and laptops Computer equipment can be damaged, lost, stolen. Removable media Media degrades over time. Software programs to read the media change and can become obsolete. Hardware changes over time, and is not always backward compatible. Cloud storage Cloud providers go out of business Data formats change (what you upload may not be useable when you download it) Accidents happen. Data is corrupted, or stolen.
  • 13. File Formats Think about the ability to use and re-use data in the future. Both for you, and for others. Accessibility of future data because of technology changes - proactively plan for hardware and software obsolescence. Think about who needs access to your data. Are you collaborating with someone within the University, or outside of it? Conducting funded research - be aware of any data storage and data sharing requirements. Think about data security.
  • 14. Best Practices for File Formats Formats most likely to be accessible in the future are: non-proprietary open documented standard commonly used by a discipline-specific research community standard representation (ASCII, Unicode) unencrypted and uncompressed Remember that comprehensive documentation (metadata) is essential to accurate use, and reuse, of all data.
  • 15. Data Security and Access Control Network security Keep confidential or highly sensitive data off computers or servers connected to the internet Physical security Access to buildings and rooms Computer systems & files Use strong passwords on files and systems Virus protection (updated continuously and running!) Encryption
  • 16. Data Backups Reduces the risk of damage or loss Use multiple locations (here-near-far or 3-2-1) -Keep at least 3 copies of data - Store 2 backup copies on different storage media. - Store 1 backup copy offsite. Create a backup schedule and put someone dependable in charge Use reliable backup medium Test your backup system (test file recovery, data consistency, data accuracy)

Editor's Notes

  • #13: Your desktop or laptop computer should store only your current working copy of your data. Your master copy should be stored in a safe environment, and it should be copied in another location as well. Data redundancy is very important. Your laptop can break down, the hard drive can crash, your computer can be infected with a virus, your laptop is stolen. What happens if it is the ONLY copy of your data? Removable media are vulnerable to temperature and humidity fluctuations, poor handling, air, moisture, and light conditions. The program you used to generate or analyze the data could be upgraded by the manufacturer, and it might no longer work with your data. The software has changed, and no longer runs on your computer. Removable media should be migrated to new media every 3-5 years. Hard drives should be migrated every 5 years. The consistency of the recorded data should be checked yearly. Cloud storage providers are providing a service for a fee. They are a business, and as such they can go bankrupt, be bought out, or be legislated out of existence. Cloud storage is simply storage. What you put in is what you get out. Dont make the mistake of thinking of them as a long-term storage solution, like an archive. Have another option available, because if they go out of business, you may have a very limited amount of time to move your data to a new provider. You will not be able to move it directly from one service to another.
  • #14: Plan for the future at the start of any data collection activity. You may need your data in one format to analyze it, and another to visualize it. You may want to share it with a collaborator who needs it in a specific format. Perhaps the software tool you need to use requires a format that only it has. Being aware of these requirements will make the later stages of your work easier and more productive. Think about how software and hardware change over time. Proprietary software often has a short shelf life. Microsoft has changed Word quite a few times over the years. If you try to open an old 1989 copy of a Word file with the 2010 version, you will get nothing but gibberish. (The first Word program was released in 1983. It was in MS-DOS). Later versions are not always backwards compatible. The same holds true for many proprietary software products. Hardware also changes over time. Operating systems change, hard drive file formats change. The mechanical bits of computers change and break down. The data may be still on an older hard drive, but if the software that reads it is no longer available, or the bearings that spin the disc are frozen, you will never be able to access that data. Access for your collaborators is something you need to be aware of. If they are at UVa, they are probably using the same systems as you, or the data can be migrated to a format you can both access and use. But if they are in Europe, or Asia, they may not have access to the same equipment or software. This is especially important if you are working with highly sensitive data, such as personal identifiers or HIPPA regulated data. Do your collaborators have access to your data storage environments? Many funders, especially US government ones, require data sharing as a part of your funding. They may specify specific formats for data sharing and data storage. Data security is an important consideration. Can you move the data easily? Consider factors such as size, security level, format. What are the requirements imposed by the funder, the institution, or collaborators?
  • #15: You will probably need to keep your working data in a proprietary format until your data analysis is finished. It is always a good idea to have your primary data file backed up in both the proprietary format you are using for analysis, and a non-proprietary one. Data redundancy is a simple but effective deterrent to unimagined software and hardware failures. For long-term data storage (archiving) and sharing, you want to select a file format which is non-proprietary for maximum reuse potential. Open formats are best. Convert your data from proprietary formats to open or discipline-defined standards. The following list comes from the UK Data Archive, the preeminent authority on digital research data in the social sciences and humanities. [http://www.data-archive.ac.uk/create-manage/format/formats-table] Quantitative tabular data: SPSS portable format (.por), comma-separated values (.csv), tab-delimited files (.tab), text files (.txt) Geospatial data: ESRI Shapefile (.shp, .shx, .prj, .sbx, .sbn), TIFF (.tif, .tfw), Cad data (.dwg) Qualitative data: XML, rich text format (.rtf), plain text data (ASCII .txt) Digital Image data: TIFF (.tif) uncompressed Digital Audio data: Free Lossless Audio Codec (FLAC) (.flac) Digital Video data: MPEG-4 (.mp4), motion JPEG 2000 (.mj2) Documentation and scripts: Rich text format (.rtf), PDF/A or PDF (.pdf), HTML (.htm), Open Document Text (.odt) Dont forget the metadata! Comprehensive and complete documentation is essential so that all future users can understand the data.
  • #16: The PI, or an assigned team member, should be responsible for maintaining the master copy. Restrict write access to specific members of the team. Document and update your guidelines (include responsibilities) so if team members change, new members will know the requirements. Record changes with your working data with Version control. Network security: Keep highly sensitive, confidential or IP-valuable data off internet-connected servers (or behind firewalls). Physical security: Who has access to your office and to the data files? Be careful of allowing repairs by an outside company. Computer systems and files: Keep virus protection up to date, and active. Be sure your computer has a login password. Do not send personal or confidential data via e-mail or FTP. Encrypt your data prior to sending. If you have IRB requirements, be sure to follow them. You may need to address data storage when acquiring consent and confidentially agreements for data users. Many IRBs require 2 levels of security when working with sensitive or confidential data. This can be a password-secured computer in a locked office, or password-protected data files on a password-protected computer. Encryption is another option to ensure the security of data.
  • #17: Data redundancy is very important. Regular back-ups protect against disasters and accidental or malicious data loss. Types of problems: Hardware failures Software problems Virus infection Hacking Power failures Human errors Ideally, your backup should be stored in a different zone: you want to be able to recover your data if something bad happens. If you keep your backup on the same device/media as your primary, or master, then in the case of a disaster you will lose all of it. 3-2-1 Rule: Keep 3 copies of your data. 2 different media (for example - hard drive and optical media). 1 copy stored offsite, ideally in a different threat zone. Here-near-far: Keep 3 copies of your data. 1 here (your working copy), 1 near (your primary backup), 1 far (your primary data, kept in a different threat zone) What is a threat zone? A different geographical location from the one you are working in. If a natural disaster occurred in Virginia, and all of your data files are here, then you will probably lose everything. Put your primary, or primary backup, on a media that is secure, and send it to a friend or family member in another state for safe keeping. Can the cloud be considered a different zone? Yes, but only if the servers arent in the same zone you are in. Backup your data frequently. Copy that backup frequently. Dont touch the primary unless you need it. Ideally, create a schedule for backing up your data, and follow it. Have someone be responsible for the backup schedule. Follow-up. Periodically test your backed up data for accuracy and consistency. Your schedule should include this. Your schedule should also include the dates when data files are created, so you know when you should migrate to fresh media. Disaster recovery: If the worst happens, recover your data from the primary backup. You may have to start your analysis again, but it is better than having to collect the data again. If you have been saving and backing up your data on a regular schedule, you should lose no more than your work between backups. This is a great reason to do those backups weekly.