13.07.2015 Views

6\VWHP $GPLQLVWUDWLRQ 0DGH (DV\

6\VWHP $GPLQLVWUDWLRQ 0DGH (DV\

6\VWHP $GPLQLVWUDWLRQ 0DGH (DV\

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 11: Security AdministrationSecurity LayersThis layer is closely knit to the material in chapter 2, because disaster recovery is an integralpart of data security.Data security is the protection of the data. Data on the serversHere we are protecting the data on the server from damage or loss. This protection isaccomplished in various ways. The goal is to prevent or minimize loss of data in adisaster. Backup dataThe goal of this security layer is to preserve application data (usually on tape) so that thesystem can be recovered.The backup tapes must be stored safely to: Preserve the backup tapes in the event of a disaster Protect the backup tapes from theft Disaster RecoveryFor more information on disaster recovery, see chapter 2.It is easier to be proactive and prevent a problem than to recover from it.To remain proactive: Reduce the chances of losing data.The first place to do it is on the server. Protect backup data from damage or loss. Ensure that, if there is a disaster, the system be completely recovered. Data on the serversThe goal is to prevent or minimize loss of data in a disaster. Some of the items below canbe referred to as High Availability (HA) items: RAID arrays for drives Redundant equipment Using reliable equipment and vendors Premium hardware support agreements for the production systemThe following are facilities-related items: Uninterruptible Power Supplies (UPS) Fire detection and prevention devices11–10Release 4.6A/B

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!