SCSP SNIA Certified Storage Professional All-in-One Exam Guide (Exam S10-110) by Eric Vanderburg

SCSP SNIA Certified Storage Professional All-in-One Exam Guide (Exam S10-110) by Eric Vanderburg

Author:Eric Vanderburg [Vanderburg, Eric]
Language: eng
Format: azw3
Publisher: McGraw-Hill Education
Published: 2017-03-31T04:00:00+00:00


Backup Reliability Methods

Backup reliability is the level of assurance that backup processes will be able to restore data effectively. The first component of this is ensuring that data integrity is intact, meaning that data has not been altered or corrupted in the process of backing it up or restoring it. One method used to verify integrity is checksums. Next, application verification can be used to provide backup reliability.

Data Integrity

Data integrity refers to how data is maintained accurately and consistently over its entire lifecycle. It plays a vital aspect in the design, implementation, and use of a system used to store, process, or retrieve data. It is the opposite of data corruption, where data is lost during any process. Many aspects can affect data integrity that may differ under a certain context. Generally, though, it can be determined based on the following:

• Human error Errors people made while the data is entered

• Intentional actions Intentional harm to the integrity of data by attackers or malcontent employees

• Transmission error Errors that occur during the movement or transfer of data from one node to another or over the network

• Bugs The presence of software bugs or viruses

• Hardware malfunction The failure of one or more hardware components

• Natural disaster Occurrence events such as fires or floods

Data integrity also ensures that the files saved remain the same from the time the backup is recorded up to the time it’s retrieved. Any intended or unintended changes to the data made during storage, process, and retrieval can also affect integrity.

So, how is data integrity ensured? Physical controls such as controlling access to the area where the servers are kept by allowing only authorized users to get in and out of the area is the first step to ensuring data integrity from human error and intentional actions. This should be combined with specific authorization levels for all users. Other integrity concerns such as transmission errors, bugs, hardware malfunctions, and natural disasters are approached with documented system administration procedures, disaster-recovery plans, and incident response plans. Systems also employ integrity-checking features such as checksums and application verification, discussed next.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.