1 | 14 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | 15 | ||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
1. The interruption or shutdown of business operations caused by data loss, leading to productivity losses and service disruptions.
2. A backup of a physical server is the process of capturing and storing the complete configuration, data, operating system, and applications of the server.
3. An external service provider performs a backup that is not done in-house. This backup option can be more affordable and offer extra features, like automatic backups.
4. A type of backup that copies all data that has changed since the last full backup, providing a middle ground between full and incremental backups.
5. Storing backup copies of data and files at the same physical location as the original data source.
6. Malicious software programs that can infiltrate ICT systems and cause data loss.
7. A device or location used to store backup data, such as a hard drive or cloud storage.
8. Loss of electricity supply which can lead to data corruption or loss.
9. The duplication of data in different physical or logical locations to ensure its availability in case of data loss or system failures.
10. Disruptions or malfunctions in the communication infrastructure of ICT systems that can cause data loss.
11. The process of backing up data to physical storage devices that are disconnected from the network.
12. The process of ensuring that backups can be restored successfully and that the data restored is accurate and complete.
13. The process of reducing the size of backup files by removing redundant data and compressing the remaining data.
14. The harm to an individual or organization's reputation caused by data loss incidents, which can lead to loss of trust and credibility.
15. The storage of data on remote servers accessed through the internet, offering flexible and scalable storage solutions.