O'Reilly logo

Information Assurance Handbook: Effective Computer Security and Risk Management Strategies by Steven Hernandez, Corey Schou

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 25

Backup and Restoration

When all else fails, the only option available may be to rely on backups. Unfortunately, organizations discover poor management of backups, and untested restoration processes lead to failure. Backups range from enterprise records preserved for legal hold or due diligence to personal files on a personal device with little value. Organizations must use information gleaned from the business impact analysis and risk assessment to determine which information and assets have a requirement for the integrity and availability services that backup solutions provide.

Backup and restoration are important data protection strategies. Backup, as the name suggests, consists of making copies of data for restoration after a ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required