1/10 | 17 | ||||||||||||||||||||||||
16 | |||||||||||||||||||||||||
12 | 2 | ||||||||||||||||||||||||
19 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
15 | 18 | ||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
13/14 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
1. Systems that need to be continuously operational without any downtime.
2. The process of applying encryption to backup files is implemented with the purpose of safeguarding them from unauthorized access and theft.
3. An external service provider performs a backup that is not done in-house. This backup option can be more affordable and offer extra features, like automatic backups.
4. Errors in system setup or configuration that can lead to data loss, such as incorrect permissions or settings.
5. Mistakes or negligence by individuals operating or managing ICT systems that may result in data loss.
6. The process that involves restoring data and systems to a functional state following a catastrophic event, such as a natural disaster or cyber attack.
7. The process of backing up data to physical storage devices that are disconnected from the network.
8. The infringement of individuals' privacy rights as a result of data loss incidents, leading to concerns about data misuse or identity theft.
9. Unauthorized disclosure of sensitive information, leading to data loss and potential harm to individuals or organizations.
10. Storm with strong winds and heavy rainfall that can damage data centers and cause data loss.
11. The duplication of data in different physical or logical locations to ensure its availability in case of data loss or system failures.
12. Backup copies of data and files at a remote location, separate from the original data source.
13. The deliberate or accidental eradication of information, resulting from mistakes made by individuals, malfunctioning hardware, or malicious software.
14. The unintentional destruction or loss of data, which can occur due to hardware failure, human error, or other factors.
15. A Failover System where the backup system is running in parallel with the primary system, ready to take over instantly.
16. The harm to an individual or organization's reputation caused by data loss incidents, which can lead to loss of trust and credibility.
17. The original location of the data being backed up, such as a computer or server.
18. Loss of electricity supply which can lead to data corruption or loss.
19. The complete reinstatement of a system, encompassing the operating system, applications, and user data, starting from the beginning.