Security of Data
This section deals with the need to secure data from the possible
accidental or intentional damage and loss. The most common cause of data loss
is that the file is mistakenly deleted or overwritten by the end user. Often
companies spend far to much money and care on protecting against viruses and
whilst I don't wish to discount the importance of this effort the same
companies fail to be systematic about backing up data.
Backup Systems
The purpose of backup is to cope with the situation when one or more
aspects of system security has failed. Thus backup may be as simple as allowing
a file that has been accidentally overwritten to be recovered or it may be
designed to cope with the complete destruction of a computer installation. In
general the greater the degree of backup the greater will be its cost. An
organisation has therefore to balance the costs of maintaining backup against
the potential cost of not having it when needed.
A backup system consists of two phases. The first is a set of routine
procedures carried out when the computer system is working normally. These
maintain data that will allow phase two to be implemented when needed. Phase
two of a backup system is a set of procedures used when the system security has
failed in some respect. Phase two uses the routine data collected during the
first phase to reconstruct the damaged part of the system. In some critical
applications it may be essential for phase two to be implemented to restore a
working system immediately, In other situations it may be sufficient that the
damaged element can be restored over a longer time scale.
The method of backup depends to a large extent on the nature of the data
that is being backed up. If the data never or rarely changes as is the case
with applications software, then it would be sufficient to keep copies on tape
or disc in a safe place - for example in a fire proof safe, possibly in a
separate building. Any occasional updates or changes could be copied and
similarly stored.
In the case of batch processing systems, where a transaction file is
merged with a master file to produce a new master file then the generations
method would be used. Here the new master file is called the son. The previous
master file is called the father. The father generation master and its
transaction file are kept as backup. When another transaction file is merged
with the son, then the son becomes the father and the father becomes the
grandfather. Three generations of file are normally kept together with their
associated transaction files If the current (son) master file is destroyed it
can be re-created by merging the father generation master and transaction files
again.
Greater problems occur with transaction processing where changes to
records are made randomly as they occur. If access to the data is critical then
the file may be mirrored. This is when an exact copy of the file is maintained
on a different disk. Both files are changed together. If the disk fails,
corrupting or making the file unavailable then processing can continue using
the image. This protects against loss of the file due to disk failure. It does
not however allow recovery from situations where invalid data has been
processed or records accidentally deleted. Mirroring would normally be used in
conjunction with a regular backup procedure as described below.
Random access files can be backed up by regularly copying the entire
file to a tape or to another disk. Special tape devices called tape streamers
are available for this. The frequency of copying would depend on how active the
file was. This in itself does not allow the file to be recovered since the copy
is a snapshot of the file and the data will have changed since the copy was
made. In addition to the copy a transaction log must be maintained. This is
simply a file containing details of every transaction made since the copy was
done. If the file is lost or corrupted then it can be restored by merging the
transaction log with the copy to reproduce the original.
In the College we believe it is important to automate the back up
process. Mr. Sparkes backs a daily backup of the files on your P drive that
have been altered. This is called an incremental backup. No backup system is
perfect with our system you can still loose a day's work. If the backup system
is automated absence of a staff member or too heavy a work load on a given day
doesn't prevent back up.
|