Backup | Data Loss |
Disaster Recovery | Incremental Backup |
Full Backup | Differential Backup |
Off-Site Backup | On-Site Backup |
The deliberate or accidental eradication of information, resulting from mistakes made by individuals, malfunctioning hardware, or malicious software. | A replica of data captured at a specific moment and stored in a distinct place from the original data. |
A backup that solely captures the modifications made to data since the previous backup. | The process that involves restoring data and systems to a functional state following a catastrophic event, such as a natural disaster or cyber attack. |
A type of backup that captures and stores only the modifications made to data since the previous complete backup, resulting in faster execution and lower storage requirements. | A complete backup is a data backup method that duplicates all the information stored on a system at a specific moment. It typically takes longer and occupies more storage capacity compared to incremental backups, but |
A backup that is stored in the same location as the original data, allowing for quick access in case of a failure, but lacking protection. | A backup stored away from the original data to shield against physical harm to the original data. |
Magnetic Tape Backup | Cloud Backup |
In-House Backup | Third-Party Backup |
Backup Frequency | Backup Retention |
Backup Verification | Virtual Server Backup |
"A backup method that utilizes storage in the cloud as its location, offering advantages such as adaptability, expandability, and economical efficiency." | A storage medium that employs magnetic tape for backing up data, commonly used to store vast amounts of information at a low cost for extended periods. |
An external service provider performs a backup that is not done in-house. This backup option can be more affordable and offer extra features, like automatic backups. | A backup conducted by the organization's own IT department using locally accessible resources. |
The duration for which backups are stored, generally determined by regulatory demands and guidelines set by the organization. | The regularity of performing backups is determined by factors such as the quantity and importance of the data being backed up. |
A backup process that records the entire state of a virtual machine, including its data, configuration settings, and system state. | The process of ensuring that backups can be restored successfully and that the data restored is accurate and complete. |
Physical Server Backup | Bare-Metal Restore |
Backup Compression | Backup Encryption |
Onsite Backups | Offsite Backups |
Data Redundancy | Backup Validation |
The complete reinstatement of a system, encompassing the operating system, applications, and user data, starting from the beginning. | A backup of a physical server is the process of capturing and storing the complete configuration, data, operating system, and applications of the server. |
The process of applying encryption to backup files is implemented with the purpose of safeguarding them from unauthorized access and theft. | The process of reducing the size of backup files by removing redundant data and compressing the remaining data. |
Backup copies of data and files at a remote location, separate from the original data source. | Storing backup copies of data and files at the same physical location as the original data source. |
The process of verifying the integrity and completeness of backup data to ensure its reliability for restoration purposes. | The duplication of data in different physical or logical locations to ensure its availability in case of data loss or system failures. |
Backup Legislative Compliance | Compliance |
Audit Trail | Online Backups |
Offline Backups | Remote Server |
Cloud-Based Storage | Hardware Failure |
The act of adhering to and following rules, regulations, and standards set by authorities. | The process of ensuring that data backups are performed in accordance with relevant laws and regulations. |
The process of backing up data to a remote server or cloud-based storage over the internet. | A chronological record that provides evidence of activities, processes, or events to verify compliance. |
A computer server located at a different physical location than the user, accessible via a network or the internet. | The process of backing up data to physical storage devices that are disconnected from the network. |
The malfunction or damage of physical components in ICT systems that can lead to data loss. | The storage of data on remote servers accessed through the internet, offering flexible and scalable storage solutions. |
Software Corruption | Malware Attacks |
Human Error | Natural Disasters |
Power Outages | Accidental Deletion |
Network Failures | Inadequate Backup |
Malicious activities targeting ICT systems to compromise data integrity and confidentiality. | Where the software in ICT systems gets altered or damaged, causing potential data loss. |
Issues such as floods, fires, earthquakes, and hurricanes that can cause physical destruction to ICT systems, leading to data loss. | Mistakes or negligence by individuals operating or managing ICT systems that may result in data loss. |
The unintentional removal of important data from ICT systems that results in data loss. | Disruptions to power supply such as immediate loss of power |
Insufficient or irregular data backup procedures in ICT systems, increasing the risk of data loss. | Disruptions or malfunctions in the communication infrastructure of ICT systems that can cause data loss. |
Malware Infections | Power Outage |
Flood | Fire |
Earthquake | Hurricane |
Tornado | Lightning |
Loss of electricity supply which can lead to data corruption or loss. | Malicious software programs that can infiltrate ICT systems and cause data loss. |
Destructive blaze that can engulf data centers and destroy data stored within them. | Overflowing of water which can damage hardware and destroy data storage devices. |
Storm with strong winds and heavy rainfall that can damage data centers and cause data loss. | Seismic activity that can cause physical damage to data storage infrastructure leading to data loss. |
Electrical discharge during thunderstorms that can cause power surges leading to data loss. | Violently rotating column of air that can destroy buildings housing data centers resulting in data loss. |
Tsunami | Wildfire |
Improper Data Handling | Phishing Attacks |
Unauthorized Access | Data Breaches |
Misconfiguration | Lack Of Backup |
Uncontrolled fire that can engulf data centers and destroy data stored within them. | Series of large waves caused by underwater earthquakes that can flood data centers leading to data loss. |
Fraudulent attempts to obtain sensitive information, which can result in data loss if successful. | Careless or negligent actions that lead to data loss, such as improper storage or transfer practices. |
Unauthorized disclosure of sensitive information, leading to data loss and potential harm to individuals or organizations. | When individuals or entities gain entry to a system without permission, potentially resulting in data loss or theft. |
The absence of redundant copies of data, increasing the risk of permanent data loss in the event of a mishap. | Errors in system setup or configuration that can lead to data loss, such as incorrect permissions or settings. |
Data Breach | Financial Impact |
Reputation Damage | Legal Consequences |
Operational Disruption | Data Recovery Costs |
Data Privacy Violations | Customer Trust Erosion |
The negative repercussions on an organization's finances due to data loss, including potential revenue loss and costs associated with data recovery. | An incident where sensitive, confidential, or protected data is accessed, stolen, or used by unauthorized individuals or parties. |
The potential legal liabilities faced by organizations due to data loss, including fines, penalties, and lawsuits for failing to protect sensitive information. | The harm to an individual or organization's reputation caused by data loss incidents, which can lead to loss of trust and credibility. |
The expenses associated with recovering lost or corrupted data, including the use of specialized software or hiring data recovery experts. | The interruption or shutdown of business operations caused by data loss, leading to productivity losses and service disruptions. |
The gradual loss of confidence and loyalty from customers due to data loss incidents, resulting in decreased sales and a damaged brand image. | The infringement of individuals' privacy rights as a result of data loss incidents, leading to concerns about data misuse or identity theft. |
Regulatory Non-Compliance | Storage Medium |
Backup Time | Source |
Failover Systems | Redundancy |
High Availability System | Automatic Failover |
A device or location used to store backup data, such as a hard drive or cloud storage. | The failure to meet legal requirements and industry standards related to data protection and security, leading to penalties and sanctions for non-compliant organizations. |
The original location of the data being backed up, such as a computer or server. | The amount of time required to complete a backup process, which can vary depending on the type and size of data being backed up. |
The duplication of critical components to ensure system availability and reliability. | Systems that automatically switch to a redundant or backup system in case of a primary system failure. |
A feature of Failover Systems that seamlessly switches to a backup system without human intervention. | Systems that need to be continuously operational without any downtime. |
Hot Standby | Cold Standby |
A Failover System where the backup system is not actively running but can be brought online manually. | A Failover System where the backup system is running in parallel with the primary system, ready to take over instantly. |