Firewalls help protect a network from malicious intent that can disrupt/totally destroy data or even your hard drive. There are hardware and software versions of firewalls.
• Software firewalls – programs that examine data pockets on a network to determine whether to forward them to their destination or block them. An example of this is two-way firewall is Zone Alarm.
• Hardware firewalls – protect the entire network typically found in broadband routers. It uses packet filtering to examine the header of the packet to determine its source and destination. This information is compared to a set of pre-defined or user created rules which determine whether the packet is to be forwarded or ...view middle of the document...
It is needed to ensure the system works and your backup data is preserved and can be reached quickly to recover when something happens to your main backup location.
Cold sites are locations that are leased or bought. They come prewired for power with generators for backup and are ready for the hardware if there is a need to make the sites operational. This kind of site is the least expensive type of backup.
Hot sites are duplicates of the original site of the organization. They have full computer systems as well as near-complete backups of user data. Real time synchronization between the two sites may be used to completely mirror the data environment of the original site using wide area network links and specialized software. They exist so that the original organization can relocate after a disaster with minimal losses to normal operations. It will be up and running within a matter of hours or even less. This type of backup is the most expensive to operate.
Warm sites will have hardware connectivity already established on a smaller scale than the original production. They have backups on hand but may not be complete, maybe several days to a week old. An example would be backup tapes sent to the site by courier.
Full backup is the starting point for all other backups and contains all the data in the folders and files that have been selected to be backed up. Since full backup stores all files and folders frequent full backups result in faster, simpler restore operations and offer the best solution in data protection.
Differentials save the data input since the last full backup and has the advantage that a maximum of only two data sets are needed to restore the data. First you must perform a full backup, after that each differential backup made will contain all the changes since the last full backup.
Incremental backups make it more feasible to store backups from...