NowtAdminCase Studiesmodule1Module2Module3Module4Module5Module6Glossary

 
nowtCapturing DataVerification and ValidationOrganisation of DataCapabilities of SoftwareProcessing DataDisemination and distributionHardwareSecurity of dataNetwork enviromentsnowt
endSecurityPhysical securityQuestionsend
 

Security of Data

This section deals with the need to secure data from the possible accidental or intentional damage and loss. The most common cause of data loss is that the file is mistakenly deleted or overwritten by the end user. Often companies spend far to much money and care on protecting against viruses and whilst I don't wish to discount the importance of this effort the same companies fail to be systematic about backing up data.

Backup Systems

The purpose of backup is to cope with the situation when one or more aspects of system security has failed. Thus backup may be as simple as allowing a file that has been accidentally overwritten to be recovered or it may be designed to cope with the complete destruction of a computer installation. In general the greater the degree of backup the greater will be its cost. An organisation has therefore to balance the costs of maintaining backup against the potential cost of not having it when needed.

A backup system consists of two phases. The first is a set of routine procedures carried out when the computer system is working normally. These maintain data that will allow phase two to be implemented when needed. Phase two of a backup system is a set of procedures used when the system security has failed in some respect. Phase two uses the routine data collected during the first phase to reconstruct the damaged part of the system. In some critical applications it may be essential for phase two to be implemented to restore a working system immediately, In other situations it may be sufficient that the damaged element can be restored over a longer time scale.

The method of backup depends to a large extent on the nature of the data that is being backed up. If the data never or rarely changes as is the case with applications software, then it would be sufficient to keep copies on tape or disc in a safe place - for example in a fire proof safe, possibly in a separate building. Any occasional updates or changes could be copied and similarly stored.

In the case of batch processing systems, where a transaction file is merged with a master file to produce a new master file then the generations method would be used. Here the new master file is called the son. The previous master file is called the father. The father generation master and its transaction file are kept as backup. When another transaction file is merged with the son, then the son becomes the father and the father becomes the grandfather. Three generations of file are normally kept together with their associated transaction files If the current (son) master file is destroyed it can be re-created by merging the father generation master and transaction files again.

Greater problems occur with transaction processing where changes to records are made randomly as they occur. If access to the data is critical then the file may be mirrored. This is when an exact copy of the file is maintained on a different disk. Both files are changed together. If the disk fails, corrupting or making the file unavailable then processing can continue using the image. This protects against loss of the file due to disk failure. It does not however allow recovery from situations where invalid data has been processed or records accidentally deleted. Mirroring would normally be used in conjunction with a regular backup procedure as described below.

Random access files can be backed up by regularly copying the entire file to a tape or to another disk. Special tape devices called tape streamers are available for this. The frequency of copying would depend on how active the file was. This in itself does not allow the file to be recovered since the copy is a snapshot of the file and the data will have changed since the copy was made. In addition to the copy a transaction log must be maintained. This is simply a file containing details of every transaction made since the copy was done. If the file is lost or corrupted then it can be restored by merging the transaction log with the copy to reproduce the original.

In the College we believe it is important to automate the back up process. Mr. Sparkes backs a daily backup of the files on your P drive that have been altered. This is called an incremental backup. No backup system is perfect with our system you can still loose a day's work. If the backup system is automated absence of a staff member or too heavy a work load on a given day doesn't prevent back up.

   

© LEV