1 | 14 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | 15 | ||||||||||||||||||||||||
6/12 | 13 | ||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
1. Malicious software programs that can infiltrate ICT systems and cause data loss.
2. The expenses associated with recovering lost or corrupted data, including the use of specialized software or hiring data recovery experts.
3. A storage medium that employs magnetic tape for backing up data, commonly used to store vast amounts of information at a low cost for extended periods.
4. The process of applying encryption to backup files is implemented with the purpose of safeguarding them from unauthorized access and theft.
5. A backup of a physical server is the process of capturing and storing the complete configuration, data, operating system, and applications of the server.
6. A backup stored away from the original data to shield against physical harm to the original data.
7. The duplication of data in different physical or logical locations to ensure its availability in case of data loss or system failures.
8. A device or location used to store backup data, such as a hard drive or cloud storage.
9. A backup conducted by the organization's own IT department using locally accessible resources.
10. A backup that is stored in the same location as the original data, allowing for quick access in case of a failure, but lacking protection.
11. A Failover System where the backup system is not actively running but can be brought online manually.
12. The process of backing up data to physical storage devices that are disconnected from the network.
13. The negative repercussions on an organization's finances due to data loss, including potential revenue loss and costs associated with data recovery.
14. A backup that solely captures the modifications made to data since the previous backup.
15. The complete reinstatement of a system, encompassing the operating system, applications, and user data, starting from the beginning.