Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)

 < Day Day Up > 


With ever-larger information sets being kept on-line, how quickly can data be restored and brought back into production? It is in addressing this requirement that the demand has arisen for new and more sophisticated data management and data-recovery techniques.

Back-up has never really been the problem. There have been a variety of back-up tools (both hardware and software) available for a number of years. Although data back-ups would seem to offer an effective shield against these threats, back-ups do not always provide comprehensive data protection. That is because the data back-up plans developed by many companies are not fully realized or, worse yet, not followed. What is more, individuals often fail to test the restore capabilities of their back-up media. If the back-ups are faulty, a simple data loss can quickly become a data disaster. Finally, even if back-ups are successful, they only contain data collected during the most recent back-up session. As a result, a data loss can potentially rob you of your most current data, despite your back-up attempts.

Conclusions Drawn from Data Recovery

An Agenda for Action in Data Recovery

The following is a provisional list of actions for data recovery. The order is not significant; however, these are the activities for which the research would want to provide a detailed description of procedures, review, and assessment for ease of use and admissibility. A number of these data-recovery topics have been mentioned in passing already:

  1. Disasters really do happen! Floods, tornadoes, earthquakes, and even terrorism can and do strike. You must be ready.

  2. To be ready, you must have a plan in place. Taking periodic image copies and sending them off-site is the first step.

  3. Performing change accumulations reduces the number of logs required as input to the recovery, which saves time at the recovery site. However, performing this step consumes resources at the home site.

  4. You should evaluate your environment to decide how to handle the change accumulation question.

  5. Even with a plan, you need to check to make sure you can implement it.

  6. Checking your assets to make sure they’re ready should be part of your plan.

  7. Building recovery JCL is tricky, and you need to get it exactly right. Data integrity and your business rely on this task.

  8. Cleaning your RECON data sets can take hours if done manually, and it’s an error-prone process. When your system is down, can you afford to make mistakes with this key resource?

  9. Test your plan. Even with this simplistic example, there’s a lot to think about. In the real world, there’s much more. Make sure your plan works before you are required to use it!

  10. You must deal with issues of increased availability, shrinking expertise, and growing complexity, failures of many types, and the costs of data management and downtime.


 < Day Day Up > 

Категории