M3: secure and reliable it has also become more

M3:

When carrying out fault remedies, users will need to take
data security and data integrity into serious consideration! All the data which
is stored in the machine that is taken in to the maintains will need to be
secured and backed up. Its known that data is always backed up when performing
fault remedies on servers and hard drives. However, it is important that all
the data is secured and should come back to the user as how it was saved
before.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

Data security
and integrity:

Data backup:

Data type is extremely important, if you don’t carry it out
for some reason you may lose your data and you won’t be able to recover it back.
Therefore, it is vital to back up your data. There are a lot of ways you can do
this. One is to keep operating system secure and regularly updated so you can
create restore points. This means if something bad occurs you will be able to
restore it to a point in the past when it wasn’t there. It doesn’t stop everything
but on the other hand it helps normally. Another way to back up is to put it on
an external hard drive, this means you can put any important documents! Another
backup method would be cloud storage which is known to be one of the best methods
out there for backup as it is secure and reliable it has also become more important
recently.

Recovery
procedures:

Recovery procedures are used when something bad occurs and
your trying to recover from it. A recovery procedure is defined to be to copy the
data from a backup to the server this is only if the data on the server is lost
for any reason. This will result in minimum downtime of the server. There are
other recovery procedures which can be to have a backup power supply so if a
power is lost for any reason this will automatically kick in as a recovery procedure.

Maintaining
security:

It is crucial to maintain your security so that no-one will
be able to access any part of your data and business. There are also a few
parts to this. Which are the following:

·        
Virus protection

·        
Physical protection

·        
Access rights

Virus
protection:

Virus protection (a good example would be anti-virus) needs
to be updated normally so that no viruses can gain access to your system. This
can be done manually or even automatically on a regular basis. It would be
normally easier to have this accomplished automatically as you or whoever is in
charge of maintain data security may forget to update one day. If you want to update
automatically, there would normally be an option on your anti-virus software
but it usually by default which has this enabled.

 

Access
rights:

Access right means someone who can access the network and in
what parts of the network. Only network administrators have the privileges to
access all parts of the network. Staff should have limited access (group policy)
as it should be created with a certain access right level. They will not be able
to have access of the network settings or even certain part-ions of hard drives
which aren’t part of there department. For an example: if a staff member was
part of the finance department, they can only ask that hard drive and not
sales, marketing etc…

Physical protection:

Physical protection is the last thing which has to be
considered. Software and networks both need protecting so that hackers can gain
access but there has to be a good level of physical protection so people can’t
just go around tampering with the network or stealing hardware/software from your
buildings. A good way of physical protection from being obtained is installing
CCTV cameras which monitor 24/7 activity so if anyone decides to break in there
would be camera footage and the person would be brought to justice if caught.
Alarms which are triggered if someone unauthorised breaks in so security is
notified (alerted) and locks on doors to help prevent or deter thief’s.