What is the purpose of the backup policy

Assignment Help Basic Computer Science
Reference no: EM132535676

Your Backup and Recovery Policy must address using VSS and WSB in your organization. Your Backup and Recovery Policy document must address at minimum all of the following topic: • What is the purpose of the backup policy: this identifies the goal of the policy and why it is important. This includes a policy statement, background, object, scope, definitions, guiding principles, etc. • Who is responsible for backups: What person(s), position, or department is responsible for ensuring the policy and procedures are followed. What are the roles and responsibilities? Who is responsible for backing up the data? who is responsible for restoring data? who is responsible for securing the backed-up data? who is responsible for erasing or destroying it? • Data to be backed up: This identifies what data management determines is important to the organization. • Off site backups: A copy of a backup should be stored at a separate location. This helps protect the data in the event of fire, flood or other disasters that can destroy the primary site. • Label media: Media labeling identifies what data is on the media and when the backup to that location was performed. • Testing: the policy needs to identify when and at what level testing should be performed and how the results are recorded. • Retention requirements: retention determines how many tapes or other media must be purchased and for how long they will be retained before being destroyed.

The length of retention is determined by laws, regulations, and industry guidelines as well as organizational needs. • Execution and frequency of backups: The BIA influences the execution and frequency by identifying RTO (recovery time objectives) and RPO (recovery point objectives). The helps determine the type of back performed and the rotation strategy employed. What is the plan? the schedule? • Protecting backups: Backup media needs to be classified and handled the same as the original data. A breach that compromises the back data is the same as a breach that compromises the original data. The policy needs to identify the backups are to be protected. What measures must be followed to ensure the security of your organizations' backups? • Disposing of media: How, when, where, and by whom media will be sanitized or destroyed must be specified in the policy.

Reference no: EM132535676

Questions Cloud

How have surmounted the obstacles : Elaborate upon the pitfalls and/or challenges that you have run into in the final grant proposal writing process for the final paper for this course
How should failure be dealt with by entrepreneurs : How should failure be dealt with by entrepreneurs and How does organisational culture serve to impede both the formulation and implementation of new strategies
Write about an incident that occurred over period of hours : Write a first-person narrative in which you describe a failure-yours or someone else's-to live up to the expectations of parents or other authority figures.
Define the importance of vacation time to your employees : Which motivational theory or theories do you think would help communicate the importance of vacation time to your employees?
What is the purpose of the backup policy : What is the purpose of the backup policy: this identifies the goal of the policy and why it is important.
What do you see as the advantages of virtual meetings : What do you see as the advantages and disadvantages of virtual meetings? Compare the methods used at GE, P&G, and other companies to promote virtual teams.
Describe your personal professional goals and objectives : The ability to demonstrate social work practice skills is a key component of any social work field education experience. As you demonstrate social work practice
What the worst-case scenario : Briefly describe each situation and what the worst-case scenario could learn from the best-case scenario?
Discuss the advantages of having articles : In a 100-150 word paragraph, discuss why using research studies from peer reviewed journals is important to the development of knowledge in social work.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd