Introduction
The issue of backup procedures is common in the world today due to the increased use of technology and the increased threat of cyber security. Most of the companies and schools have suffered from data loss and security breaches which affects their operations, their reputation and puts their consumers at risk. One of the outstanding cases of data loss is that of Zomato, a company whose 17 million user records were stolen by a hacker. The stolen data included hashed passwords and email addresses of the users (Manna, Sengupta & Mazumdar, 2018). Securing backups is critical and involves both physical and non-physical measures. The physical security includes locks, doors and physical barriers to keep away the unwanted intruders. The non-physical measures includes firewalls and passwords to make sure the intruders do not get access. Hashed passwords, like the ones in Zomato, can be changed back to plain text. The salted passwords are also easy to hack and this is why the company was easily hacked. The backup media should be stored away from the company to ensure it is not accessed by the stakeholders and intruders. Its location should be known to only a few people.
The remote storage of backup data or the offsite storage is a useful way of increasing security. Data should be copied from the primary storage to a tape cartridge and kept in a different location to minimize access (Hansen, 2015). The backup media should be secured in a way that if the primary data is affected by any disaster or theft, the backup can be used to replace it.
Comments on the Process of Securing Backups in Schools
The essay starts by explaining the need to have security in the schools and the nature of the schools. The high number of people in the schools and the differences in their information makes it necessary to have security against any manipulation, misuse or any other way in which the data can be used to cause harm to the students. The student gives a clear account of the need to secure the data and the ways in which security can be achieved. The student has explained the offsite backup and how to make use of passwords and administrators to make sure the data is secure. From this analysis, the student has achieved to convince the reader on the ways in which data is secured. The student also shows a high understanding of the data security and this makes the information in the essay more reliable.
The language used in the essay is simple and all points are simplified in a way that anyone can understand it. The student made sure that all terms used in the essay are not hard to understand even for a person who does not have a background education in the field. However, the student could have improved the essay by giving more examples from the real world, of a school that the reader can research and confirm the information. It would have been better to also give examples of the ways in which the backup storage can be beneficial and how they can fail to achieve the intended goals.
References
Hansen, K.C. (2015). U.S. Patent Application No. 14/658,013.
Manna, A., Sengupta, A., & Mazumdar, C. (2018, January). Towards Formal Modelling pf Privacy Policies of Enterprises. In 2018Fifth International Conference of Emerging Application of Information technology (EAIT) (pp. 1-6). IEEE.
Cite this page
Essay Sample on Backup Procedures. (2022, Nov 20). Retrieved from https://proessays.net/essays/essay-sample-on-backup-procedures
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Cybersecurity Essay Sample: Case Study of Sony Entertainment Pictures
- Essay on Enforceability of Internet "Click Here To Accept" Contracts
- What Is the Major Difference Between IT and MIS?
- Digital Connections and Relationships Essay Example
- Research Paper on Kerberos: Authentication Service
- Literature Review on Smart Devices and the Internet of Things
- Paper Sample: Application for Technology Creative Manager Position at Googleplex