Backup Data Loss
Disaster Recovery Incremental Backup
Full Backup Differential Backup
Off-Site Backup On-Site Backup

 

The deliberate or accidental eradication of information, resulting from mistakes made by individuals, malfunctioning hardware, or malicious software. A replica of data captured at a specific moment and stored in a distinct place from the original data.
A backup that solely captures the modifications made to data since the previous backup. The process that involves restoring data and systems to a functional state following a catastrophic event, such as a natural disaster or cyber attack.
A type of backup that captures and stores only the modifications made to data since the previous complete backup, resulting in faster execution and lower storage requirements. A complete backup is a data backup method that duplicates all the information stored on a system at a specific moment. It typically takes longer and occupies more storage capacity compared to incremental backups, but
A backup that is stored in the same location as the original data, allowing for quick access in case of a failure, but lacking protection. A backup stored away from the original data to shield against physical harm to the original data.

 

Magnetic Tape Backup Cloud Backup
In-House Backup Third-Party Backup
Backup Frequency Backup Retention
Backup Verification Virtual Server Backup

 

"A backup method that utilizes storage in the cloud as its location, offering advantages such as adaptability, expandability, and economical efficiency." A storage medium that employs magnetic tape for backing up data, commonly used to store vast amounts of information at a low cost for extended periods.
An external service provider performs a backup that is not done in-house. This backup option can be more affordable and offer extra features, like automatic backups. A backup conducted by the organization's own IT department using locally accessible resources.
The duration for which backups are stored, generally determined by regulatory demands and guidelines set by the organization. The regularity of performing backups is determined by factors such as the quantity and importance of the data being backed up.
A backup process that records the entire state of a virtual machine, including its data, configuration settings, and system state. The process of ensuring that backups can be restored successfully and that the data restored is accurate and complete.

 

Physical Server Backup Bare-Metal Restore
Backup Compression Backup Encryption
Onsite Backups Offsite Backups
Data Redundancy Backup Validation

 

The complete reinstatement of a system, encompassing the operating system, applications, and user data, starting from the beginning. A backup of a physical server is the process of capturing and storing the complete configuration, data, operating system, and applications of the server.
The process of applying encryption to backup files is implemented with the purpose of safeguarding them from unauthorized access and theft. The process of reducing the size of backup files by removing redundant data and compressing the remaining data.
Backup copies of data and files at a remote location, separate from the original data source. Storing backup copies of data and files at the same physical location as the original data source.
The process of verifying the integrity and completeness of backup data to ensure its reliability for restoration purposes. The duplication of data in different physical or logical locations to ensure its availability in case of data loss or system failures.

 

Backup Legislative Compliance Compliance
Audit Trail Online Backups
Offline Backups Remote Server
Cloud-Based Storage Hardware Failure

 

The act of adhering to and following rules, regulations, and standards set by authorities. The process of ensuring that data backups are performed in accordance with relevant laws and regulations.
The process of backing up data to a remote server or cloud-based storage over the internet. A chronological record that provides evidence of activities, processes, or events to verify compliance.
A computer server located at a different physical location than the user, accessible via a network or the internet. The process of backing up data to physical storage devices that are disconnected from the network.
The malfunction or damage of physical components in ICT systems that can lead to data loss. The storage of data on remote servers accessed through the internet, offering flexible and scalable storage solutions.

 

Software Corruption Malware Attacks
Human Error Natural Disasters
Power Outages Accidental Deletion
Network Failures Inadequate Backup

 

Malicious activities targeting ICT systems to compromise data integrity and confidentiality. Where the software in ICT systems gets altered or damaged, causing potential data loss.
Issues such as floods, fires, earthquakes, and hurricanes that can cause physical destruction to ICT systems, leading to data loss. Mistakes or negligence by individuals operating or managing ICT systems that may result in data loss.
The unintentional removal of important data from ICT systems that results in data loss. Disruptions to power supply such as immediate loss of power
Insufficient or irregular data backup procedures in ICT systems, increasing the risk of data loss. Disruptions or malfunctions in the communication infrastructure of ICT systems that can cause data loss.

 

Malware Infections Power Outage
Flood Fire
Earthquake Hurricane
Tornado Lightning

 

Loss of electricity supply which can lead to data corruption or loss. Malicious software programs that can infiltrate ICT systems and cause data loss.
Destructive blaze that can engulf data centers and destroy data stored within them. Overflowing of water which can damage hardware and destroy data storage devices.
Storm with strong winds and heavy rainfall that can damage data centers and cause data loss. Seismic activity that can cause physical damage to data storage infrastructure leading to data loss.
Electrical discharge during thunderstorms that can cause power surges leading to data loss. Violently rotating column of air that can destroy buildings housing data centers resulting in data loss.

 

Tsunami Wildfire
Improper Data Handling Phishing Attacks
Unauthorized Access Data Breaches
Misconfiguration Lack Of Backup

 

Uncontrolled fire that can engulf data centers and destroy data stored within them. Series of large waves caused by underwater earthquakes that can flood data centers leading to data loss.
Fraudulent attempts to obtain sensitive information, which can result in data loss if successful. Careless or negligent actions that lead to data loss, such as improper storage or transfer practices.
Unauthorized disclosure of sensitive information, leading to data loss and potential harm to individuals or organizations. When individuals or entities gain entry to a system without permission, potentially resulting in data loss or theft.
The absence of redundant copies of data, increasing the risk of permanent data loss in the event of a mishap. Errors in system setup or configuration that can lead to data loss, such as incorrect permissions or settings.

 

Data Breach Financial Impact
Reputation Damage Legal Consequences
Operational Disruption Data Recovery Costs
Data Privacy Violations Customer Trust Erosion

 

The negative repercussions on an organization's finances due to data loss, including potential revenue loss and costs associated with data recovery. An incident where sensitive, confidential, or protected data is accessed, stolen, or used by unauthorized individuals or parties.
The potential legal liabilities faced by organizations due to data loss, including fines, penalties, and lawsuits for failing to protect sensitive information. The harm to an individual or organization's reputation caused by data loss incidents, which can lead to loss of trust and credibility.
The expenses associated with recovering lost or corrupted data, including the use of specialized software or hiring data recovery experts. The interruption or shutdown of business operations caused by data loss, leading to productivity losses and service disruptions.
The gradual loss of confidence and loyalty from customers due to data loss incidents, resulting in decreased sales and a damaged brand image. The infringement of individuals' privacy rights as a result of data loss incidents, leading to concerns about data misuse or identity theft.

 

Regulatory Non-Compliance Storage Medium
Backup Time Source
Failover Systems Redundancy
High Availability System Automatic Failover

 

A device or location used to store backup data, such as a hard drive or cloud storage. The failure to meet legal requirements and industry standards related to data protection and security, leading to penalties and sanctions for non-compliant organizations.
The original location of the data being backed up, such as a computer or server. The amount of time required to complete a backup process, which can vary depending on the type and size of data being backed up.
The duplication of critical components to ensure system availability and reliability. Systems that automatically switch to a redundant or backup system in case of a primary system failure.
A feature of Failover Systems that seamlessly switches to a backup system without human intervention. Systems that need to be continuously operational without any downtime.

 

Hot Standby Cold Standby

 

A Failover System where the backup system is not actively running but can be brought online manually. A Failover System where the backup system is running in parallel with the primary system, ready to take over instantly.