SlideShare una empresa de Scribd logo
1 de 1
Backup methods<br />Due to major and occasional problems and viruses that attack our computer, the risk of losing our data is greater than 50%, especially after using the computer for a long time.  It is stated that: <br />“As much as 60% of corporate data resides unprotected on PC desktops and laptops.<br />(IDC analyst Cynthia Doyle, Business Continuity in 2002: It's Not Business as Usual, April 2002)<br />Viruses: Survey finds PCs infected at a rate of more than 10% each month.<br />(ICSA Labs, 2002)ˡ<br />It is also mentioned that: <br />“A long-term survey of computer-related economic losses conducted by Robert Courtney, a computer security consultant and former member of the Computer System Security and Privacy Advisory Board, found that 65 percent of losses to organizations were the result of errors and omissions.22 This figure was relatively consistent between both private and public sector organizations.”ҙ<br />I normally make back up whenever I feel it’s needed, especially when I add something of important. <br />Although I know that I can buck up my files automatically by using some software, but I use the manual way <br />I use two kind of USB one that has a protected password and I keep it in a bank safe box, this one contain most important and personal information. The second one I use it for my daily use. <br />If hired by a company I will make sure that their data and information are safe, by using anti-virus software and keeping my computer use in a professional way rather than consulting website that might be suspicious.<br />Bibliography BIBLIOGRAPHY Computer Security Division . (2001, August 1). CSRC . Retrieved March 20, 2011, from COMMON THREATS: A BRIEF OVERVIEW: http://csrc.nist.gov/publications/nistpubs/800-12/800-12-html/chapter4.htmlScannen und Digitalisieren. (2009). Retrieved March 29, 2011, from Aktenmanagement und: http://www.ironmountain.de/whatwedo/scanning-and-digitising.aspStaysafeonline. (2008, June 3). Assess Your Risk. Retrieved March 29, 2011, from Stay safe for Business: http://www.staysafeonline.org/for-business/assess-your-risk<br />

Más contenido relacionado

La actualidad más candente

A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...IJNSA Journal
 
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Drjabez
 
SGSB Webcast 3: Smart Grid IT Systems Security
SGSB Webcast 3: Smart Grid IT Systems SecuritySGSB Webcast 3: Smart Grid IT Systems Security
SGSB Webcast 3: Smart Grid IT Systems SecurityAndy Bochman
 
Ics part 2
Ics part 2Ics part 2
Ics part 2NPSCAVO
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wpCMR WORLD TECH
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningeSAT Journals
 
IRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET- Intervention of Artificial Intelligence in Cyber SecurityIRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET- Intervention of Artificial Intelligence in Cyber SecurityIRJET Journal
 
A comprehensive study on classification of passive intrusion and extrusion de...
A comprehensive study on classification of passive intrusion and extrusion de...A comprehensive study on classification of passive intrusion and extrusion de...
A comprehensive study on classification of passive intrusion and extrusion de...csandit
 
Digital information security
Digital information securityDigital information security
Digital information securitySayed Ahmad
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSahithi Naraparaju
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access controlJyotishkar Dey
 
Security Metrics Resources File
Security Metrics Resources FileSecurity Metrics Resources File
Security Metrics Resources Fileguest0947de
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access controlJyotishkar Dey
 
Most expensive IT Security Incidents
Most expensive IT Security IncidentsMost expensive IT Security Incidents
Most expensive IT Security IncidentsARP
 
Export Data from Student Information System
Export Data from Student Information SystemExport Data from Student Information System
Export Data from Student Information SystemDiscovery Software
 

La actualidad más candente (18)

A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
 
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
 
SGSB Webcast 3: Smart Grid IT Systems Security
SGSB Webcast 3: Smart Grid IT Systems SecuritySGSB Webcast 3: Smart Grid IT Systems Security
SGSB Webcast 3: Smart Grid IT Systems Security
 
Ics part 2
Ics part 2Ics part 2
Ics part 2
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
IRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET- Intervention of Artificial Intelligence in Cyber SecurityIRJET- Intervention of Artificial Intelligence in Cyber Security
IRJET- Intervention of Artificial Intelligence in Cyber Security
 
Power station monitoring and cyber security
Power station monitoring and cyber securityPower station monitoring and cyber security
Power station monitoring and cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
A comprehensive study on classification of passive intrusion and extrusion de...
A comprehensive study on classification of passive intrusion and extrusion de...A comprehensive study on classification of passive intrusion and extrusion de...
A comprehensive study on classification of passive intrusion and extrusion de...
 
Digital information security
Digital information securityDigital information security
Digital information security
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access control
 
Security Metrics Resources File
Security Metrics Resources FileSecurity Metrics Resources File
Security Metrics Resources File
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access control
 
Most expensive IT Security Incidents
Most expensive IT Security IncidentsMost expensive IT Security Incidents
Most expensive IT Security Incidents
 
Export Data from Student Information System
Export Data from Student Information SystemExport Data from Student Information System
Export Data from Student Information System
 
Ld3420072014
Ld3420072014Ld3420072014
Ld3420072014
 

Destacado

Student table bmo
Student table bmoStudent table bmo
Student table bmoBadr MSDK
 
Company database
Company databaseCompany database
Company databaseBadr MSDK
 
Rescue Time Data Goals
Rescue Time Data GoalsRescue Time Data Goals
Rescue Time Data GoalsBadr MSDK
 
Books data base
Books data baseBooks data base
Books data baseBadr MSDK
 
Case study 1
Case study 1Case study 1
Case study 1Badr MSDK
 
صحيح مسلم
صحيح مسلمصحيح مسلم
صحيح مسلمBadr MSDK
 
My favorite pastime
My favorite pastimeMy favorite pastime
My favorite pastimeBadr MSDK
 
The risala a-treatiseonmalikifiqh
The risala a-treatiseonmalikifiqhThe risala a-treatiseonmalikifiqh
The risala a-treatiseonmalikifiqhBadr MSDK
 
كتاب صحيح البخاري كاملا
 كتاب صحيح البخاري كاملا  كتاب صحيح البخاري كاملا
كتاب صحيح البخاري كاملا Badr MSDK
 

Destacado (9)

Student table bmo
Student table bmoStudent table bmo
Student table bmo
 
Company database
Company databaseCompany database
Company database
 
Rescue Time Data Goals
Rescue Time Data GoalsRescue Time Data Goals
Rescue Time Data Goals
 
Books data base
Books data baseBooks data base
Books data base
 
Case study 1
Case study 1Case study 1
Case study 1
 
صحيح مسلم
صحيح مسلمصحيح مسلم
صحيح مسلم
 
My favorite pastime
My favorite pastimeMy favorite pastime
My favorite pastime
 
The risala a-treatiseonmalikifiqh
The risala a-treatiseonmalikifiqhThe risala a-treatiseonmalikifiqh
The risala a-treatiseonmalikifiqh
 
كتاب صحيح البخاري كاملا
 كتاب صحيح البخاري كاملا  كتاب صحيح البخاري كاملا
كتاب صحيح البخاري كاملا
 

Similar a Backup

Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docxUse speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docxgidmanmary
 
Research Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxResearch Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxaudeleypearl
 
Running Head INFORMATION SECURITY VULNERABILITY 2.docx
Running Head INFORMATION SECURITY VULNERABILITY     2.docxRunning Head INFORMATION SECURITY VULNERABILITY     2.docx
Running Head INFORMATION SECURITY VULNERABILITY 2.docxcharisellington63520
 
Learning area 1 information and communication technology and society
Learning area 1   information and communication technology and societyLearning area 1   information and communication technology and society
Learning area 1 information and communication technology and societyShuren Lew
 
Learning area 1_-_information_and_communication_technology_and_society
Learning area 1_-_information_and_communication_technology_and_societyLearning area 1_-_information_and_communication_technology_and_society
Learning area 1_-_information_and_communication_technology_and_societySaktis Kesavan
 
La1 information and communication technology and society
La1   information and communication technology and societyLa1   information and communication technology and society
La1 information and communication technology and societyAzmiah Mahmud
 
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...IRJET Journal
 
We use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docxWe use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docxsheronlewthwaite
 
We use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docxWe use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docxco4spmeley
 
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIIBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIAGILLY
 
Grading Guide Lifespan Development and Personality PaperPSY1.docx
Grading Guide Lifespan Development and Personality PaperPSY1.docxGrading Guide Lifespan Development and Personality PaperPSY1.docx
Grading Guide Lifespan Development and Personality PaperPSY1.docxwhittemorelucilla
 
How to protect the cookies once someone gets into the cookie jar
How to protect the cookies once someone gets into the cookie jarHow to protect the cookies once someone gets into the cookie jar
How to protect the cookies once someone gets into the cookie jarJudgeEagle
 
Southwestern Business Administration JournalVolume 16 Is.docx
Southwestern Business Administration JournalVolume 16  Is.docxSouthwestern Business Administration JournalVolume 16  Is.docx
Southwestern Business Administration JournalVolume 16 Is.docxrosemariebrayshaw
 
Security Is an Enabler, Not Securing Is an Inhibitor
Security Is an Enabler, Not Securing Is an InhibitorSecurity Is an Enabler, Not Securing Is an Inhibitor
Security Is an Enabler, Not Securing Is an Inhibitorsecratic
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsLondon School of Cyber Security
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitionersDanny Doobay
 
REAL TIME ENDPOINT INSIGHTS
REAL TIME ENDPOINT INSIGHTS REAL TIME ENDPOINT INSIGHTS
REAL TIME ENDPOINT INSIGHTS Accelerite
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)kent neri
 

Similar a Backup (20)

Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docxUse speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
 
Research Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxResearch Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docx
 
Forensics
ForensicsForensics
Forensics
 
Running Head INFORMATION SECURITY VULNERABILITY 2.docx
Running Head INFORMATION SECURITY VULNERABILITY     2.docxRunning Head INFORMATION SECURITY VULNERABILITY     2.docx
Running Head INFORMATION SECURITY VULNERABILITY 2.docx
 
Learning area 1 information and communication technology and society
Learning area 1   information and communication technology and societyLearning area 1   information and communication technology and society
Learning area 1 information and communication technology and society
 
Learning area 1_-_information_and_communication_technology_and_society
Learning area 1_-_information_and_communication_technology_and_societyLearning area 1_-_information_and_communication_technology_and_society
Learning area 1_-_information_and_communication_technology_and_society
 
La1 information and communication technology and society
La1   information and communication technology and societyLa1   information and communication technology and society
La1 information and communication technology and society
 
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
 
We use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docxWe use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docx
 
We use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docxWe use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docx
 
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSIIBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
 
Grading Guide Lifespan Development and Personality PaperPSY1.docx
Grading Guide Lifespan Development and Personality PaperPSY1.docxGrading Guide Lifespan Development and Personality PaperPSY1.docx
Grading Guide Lifespan Development and Personality PaperPSY1.docx
 
Chap 2 lab2 (Ej Guevarra)
Chap 2 lab2 (Ej Guevarra)Chap 2 lab2 (Ej Guevarra)
Chap 2 lab2 (Ej Guevarra)
 
How to protect the cookies once someone gets into the cookie jar
How to protect the cookies once someone gets into the cookie jarHow to protect the cookies once someone gets into the cookie jar
How to protect the cookies once someone gets into the cookie jar
 
Southwestern Business Administration JournalVolume 16 Is.docx
Southwestern Business Administration JournalVolume 16  Is.docxSouthwestern Business Administration JournalVolume 16  Is.docx
Southwestern Business Administration JournalVolume 16 Is.docx
 
Security Is an Enabler, Not Securing Is an Inhibitor
Security Is an Enabler, Not Securing Is an InhibitorSecurity Is an Enabler, Not Securing Is an Inhibitor
Security Is an Enabler, Not Securing Is an Inhibitor
 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and Forensics
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
 
REAL TIME ENDPOINT INSIGHTS
REAL TIME ENDPOINT INSIGHTS REAL TIME ENDPOINT INSIGHTS
REAL TIME ENDPOINT INSIGHTS
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 

Más de Badr MSDK

Abdullah al hamdan e scan
Abdullah al hamdan e scanAbdullah al hamdan e scan
Abdullah al hamdan e scanBadr MSDK
 
Best Buy case study
Best Buy case studyBest Buy case study
Best Buy case studyBadr MSDK
 
Abdullah alqahtani escan
Abdullah alqahtani escanAbdullah alqahtani escan
Abdullah alqahtani escanBadr MSDK
 
Student information and payment
Student information and paymentStudent information and payment
Student information and paymentBadr MSDK
 
GDP per capita of Morocco 2010 (time series)
GDP per capita of Morocco 2010 (time series)GDP per capita of Morocco 2010 (time series)
GDP per capita of Morocco 2010 (time series)Badr MSDK
 
ادع إلى سبيل_ربك
ادع إلى سبيل_ربكادع إلى سبيل_ربك
ادع إلى سبيل_ربكBadr MSDK
 
Lighting design for home & business
Lighting design for home & businessLighting design for home & business
Lighting design for home & businessBadr MSDK
 
Sunflower caffe
Sunflower caffeSunflower caffe
Sunflower caffeBadr MSDK
 
Sunflower caffe
Sunflower caffeSunflower caffe
Sunflower caffeBadr MSDK
 
Google desktop
Google desktopGoogle desktop
Google desktopBadr MSDK
 

Más de Badr MSDK (11)

Abdullah al hamdan e scan
Abdullah al hamdan e scanAbdullah al hamdan e scan
Abdullah al hamdan e scan
 
Best Buy case study
Best Buy case studyBest Buy case study
Best Buy case study
 
Abdullah alqahtani escan
Abdullah alqahtani escanAbdullah alqahtani escan
Abdullah alqahtani escan
 
Student information and payment
Student information and paymentStudent information and payment
Student information and payment
 
GDP per capita of Morocco 2010 (time series)
GDP per capita of Morocco 2010 (time series)GDP per capita of Morocco 2010 (time series)
GDP per capita of Morocco 2010 (time series)
 
ادع إلى سبيل_ربك
ادع إلى سبيل_ربكادع إلى سبيل_ربك
ادع إلى سبيل_ربك
 
B2B
B2B B2B
B2B
 
Lighting design for home & business
Lighting design for home & businessLighting design for home & business
Lighting design for home & business
 
Sunflower caffe
Sunflower caffeSunflower caffe
Sunflower caffe
 
Sunflower caffe
Sunflower caffeSunflower caffe
Sunflower caffe
 
Google desktop
Google desktopGoogle desktop
Google desktop
 

Backup

  • 1. Backup methods<br />Due to major and occasional problems and viruses that attack our computer, the risk of losing our data is greater than 50%, especially after using the computer for a long time. It is stated that: <br />“As much as 60% of corporate data resides unprotected on PC desktops and laptops.<br />(IDC analyst Cynthia Doyle, Business Continuity in 2002: It's Not Business as Usual, April 2002)<br />Viruses: Survey finds PCs infected at a rate of more than 10% each month.<br />(ICSA Labs, 2002)ˡ<br />It is also mentioned that: <br />“A long-term survey of computer-related economic losses conducted by Robert Courtney, a computer security consultant and former member of the Computer System Security and Privacy Advisory Board, found that 65 percent of losses to organizations were the result of errors and omissions.22 This figure was relatively consistent between both private and public sector organizations.”ҙ<br />I normally make back up whenever I feel it’s needed, especially when I add something of important. <br />Although I know that I can buck up my files automatically by using some software, but I use the manual way <br />I use two kind of USB one that has a protected password and I keep it in a bank safe box, this one contain most important and personal information. The second one I use it for my daily use. <br />If hired by a company I will make sure that their data and information are safe, by using anti-virus software and keeping my computer use in a professional way rather than consulting website that might be suspicious.<br />Bibliography BIBLIOGRAPHY Computer Security Division . (2001, August 1). CSRC . Retrieved March 20, 2011, from COMMON THREATS: A BRIEF OVERVIEW: http://csrc.nist.gov/publications/nistpubs/800-12/800-12-html/chapter4.htmlScannen und Digitalisieren. (2009). Retrieved March 29, 2011, from Aktenmanagement und: http://www.ironmountain.de/whatwedo/scanning-and-digitising.aspStaysafeonline. (2008, June 3). Assess Your Risk. Retrieved March 29, 2011, from Stay safe for Business: http://www.staysafeonline.org/for-business/assess-your-risk<br />