You are on page 1of 27
CortPane! > ‘Adjust your computer's settings System and Security Serta cope ure wth Fa stay ct and eon Worn Findon peters "Network and internet (Chceehmeeup an hn etn Hardware and Sound Programs % «a ai 82, Xe s @ ve Wee Cate = User Accounts Wovingercout ee ‘Appearance and Personalization ‘Clock Language, and Region ‘astra Ease of Access —_a_27 ig.10.7 Creating a System Image Backup Step | = On the window that appears click on the File History option <> Cool Pud > Stem and Sey 1 Sptem and Secnty Mera tere sepenmee nt Perea eck Lnguige ant Rejen Windows Firenall system Power Options v & File History ssorage Spaces Manip songe pce: Work Folder Adminitrative Tooke & Gupechent compere ‘Secuity and Maintenance even yur compute andes stow mane evs nos Fev See atin ops yours th Fi ney ‘Backup and Restore (Windows 7) AY BitLocker Drive Encryption Dee ar pte ew es O chage Ur econ Cont tinge Fig. 10.8 Creating a System Image Backup Step 1! Module 10 Page 297, Certited Secure Computer User Copyisht © by EE Seamed ‘NI Rights Reserved. Reproduction is StrielyPrhioted, Certied Secure Computer User eam 11242 Data Backup and Disaster Recovery In the File History window, click on the System Image Backup link. Users will need administrator privileges or password to proceed from here. rete © = > canaPat > Stem nd ecty > Fle itn, 8 Sewch Const Pme Keep a history of your files tee pn te, Fiore cope foul 0 you ca et hc eet age [i Fite Historyie off felis Asana tings Copy ome Units Dap Comes anfvites Copy te IE cence Fig.10.9 Creating a System Image Backup Step it = On the Create System Image window that appears, choose the location of the full backup. If Windows finds no suitable medium for the backup, it suggests a local drive with enough space along with a warning message. Once the location is chosen, click on Next Module 10 Page 298 Cert Secure Computer User Copyright © by RE-Cowmell ‘NI RightsReserved, Reproductions tity Prohbted Cert Secure Computer User ‘ata Backup and Dsastor Recovery ‘Module 10 Page 209, fam 112-22 1 savomnese Select where you want to save your backup \Wercomme tt yur yourbckpon an tena eve Save bet | Ect Oeinton eco) we ato) Fig.10.10 Creating a System Image Backup Step IV In the next screen, choose what is to be backed up. Once done, click Next © Ww steeeaue What do you want to back up? © Leon ee cnn dot nl ap item i th Seite, nin ce ideo ‘odors a aro ceee say ragenchan ste eye tae tesa ‘etog octcewealttindader noma ieae Ota meron ‘ome Rr en nd wher ce mage mth bac, ‘heen you chene bebe en repre Fig.10.11 Creating a System Image Backup Step V Certied Secure Computer User Copyright © by KE-Coumell ‘Al RightsReserved. Reproduction is StrietyProhbted. Certed Secure Computer User sam 122-22 ata Backup and Disaster Recovery = After reviewing the details of the backup, click on Save Settings and run backup. Fig.10.12 Creating a System image Backup Step VI Incremental Backup Windows offers the option of creating an incremental backup of users’ data in the name of File History backup. Steps to create a File History Backup are as follows: = Navigate to the File History window as discussed in the previous section Before proceeding with the backup, users can determine which folders to exclude from the backup by clicking on the Exclude folders option on the left-hand pane of the window Bretton © +B coin» Sytem mdse» ein Sate Keep history of your les Rccrncane. Fen nes cope toute cn gt a heya aged a Pile vistoy sot 7x Fig, 10.13 Creating o File History Backup Step I Module 10 Page 200, Certied Secure Computer User Copyright © by EE-Coumell ‘Al RightsReserved, Reproduction is tity Prohibited. Certied secure Computer User Data Backup and Disaster Recovery fram 112-22 Users can add the folders they wish to exclude from the backup by adding them to the exclude list. Once done, click on Save changes at the bottom of the screen Te enter premade,» fietiany + Exel cde from File History Fig.10.14 Creating a File History Backup Step 1! Users can customize the backup based on various parameters by clicking on the Advanced settings option on the left-hand pane of the File History window Branton a Ae Camel» Spt deity» Fle iy Keep aistory of your les ery ef yoyo tn pee ba te ed I Fi tony cot ep tne Deen Cott Fre RIE dvereces Fig.10.15 Creating a File History Backup Step Ill ‘Mode 30 Page 301 certified Secure Computer User Copyright © by RE-Camnell [ARghts Reserved, Reproduction Stity Prone. Certiied Secure Computer User ‘Data Backup and Disaster Recovery fam 11212 The Advanced settings window offers options such as setting the frequency of updating the backup, the amount of free space that must be left on the backup drive, how long to keep the backups before automatically deleting them, and the option to delete them manually = Fe Smemant ecay > Fintan + eae Sige 38 Sench cela Advanced setings ‘Greschon den you nt tesco our ey andhow ng oe aed ve See copes ces: oa piri Ky mente ‘TWh PC cat cae wh ten nt heme ae ee ee ed soe ae Fig.10.16 Creating a File History Backup Step IV 1B soars ge Module 10 Page 302, © = Fu Spm andSecty + FleHoy > Adc Sg OS conta vanced cetings Chose aw en you wnt ose copes youre nd how ng tgp sere eins Sore oie tes Keep eed seine svete © Oper rien eet gto en eet eter eo Fig.10.17 Creating o File History Backup Step V Certted Secure Computer User Copyright © by EE-Semnell ‘AI Rights Reserved. Reproduction tity Probie. Certied Secure Computer User Data Backup and Disaster Recovery 1B Aancet Seige Users can also view the Event logs of the file history backups and perform various actions depending on their needs. To access this option, users will need Admin privileges fam 1122 + x Spam andseerty > Flatten + Aten Sings ve Advanced settings hocshow ten you et tare copes uf and wan to ep ned ern Sve cope fe ay ep sedveione Fev Heme ‘Tha cat dr with athe nth emagouy Mon oreeut stage Fig, 10.18 Creating a File History Backup Step VI eee ven Fle Acton Vion Help =o >| alia) Gi ararsa208em Fig.10.19 Creating a File History Backup Step VI! Module 10 Page 303, Certited Secure Computer User Copyright © by EE-Ceumell ‘A RightsReserved, Reproduction is StrietlyProhte. Certied secure Computer User Data dackup and Disaster Recovery fam 112.22 "After setting up the backup parameters, click Save changes to navigate back to the File History Window. Click on the Select Drive option to choose the location of the backup Brictenay © + 1B) ConosPind > Sten Scay + etn, 1G Seach Cee Keep a history of your Mes ay ve cop ye yc gh Back ny et rage [fi Fe story is ot dae Fig.10.20 Creating a File History Backup Step Vil! = Users can also choose an external drive or a network location if they want to create the backup on another computer in the network. After choosing the location click OK "File History options gets turned on automatically and the system starts creating the backup Restoring Backed Up Data Using File History Backed up files can be restored in case of a data loss using the windows Restore personal files feature. Users can restore a single or multiple files or entire folders based on the data they wish to restore. Steps to restore personal files: "Click on the Restore personal files option in the left-hand pane of the File History window Module 10 Page 304 Certied Secure Computer User Copyright © by EE Smell ‘A ight Reserve Reproduction tity Prohited Certified Secure Computer User ata Backup and Disaster Recovery fam 12312 TB racteoy etre pennaes = 1B» Canelb ol + Speman cry > lei Keep history of your es Fl ayn cope youn th ac ee damage n Fle stony oft Capers ie, Dap, Contac dete, I Saco Fig.10.21 Restoring Personal Files Step | * Once the file or folder to be restored is identified, it can be restored to its original location by clicking on the green button. It can also be restored to a new location by right-clicking, to restore the data. . This opens a menu which gives an option of selecting the new location 5 & &> Monday, December 7,2015 226 PM | 3 of 3 & & Sass Module 10 Page 305 Fig.10.22 Restoring Personal Files Step 1! CertiedSecute Computer User Copyright © by EE-Cgunelt ‘A ight Reserve Reproduction tity Prohted. Centited Secure Computer User (ram 112.22 Data Backup and Disaster Recovery Mac OS X Backup and Restore Procedures ‘Mac Backup Through Time Machine Time Machine is a backup utility developed by Apple. It automatically saves up-to-date copies of everything on the Mac—photos, music, videos, documents, applications, and settings. If necessary, a user can go back in time to recover the data. Time Machine works with Mac and an external hard drive. Just connect the drive and assign it to Time Machine. It automatically backs up the entire Mac. What makes it different from other backup applications is that, in addition to keeping a spare copy of every file, it remembers how the system looked on a given day. Thus it stores the entire system state as backup. This facilitates easy recovery from crashes. ‘Steps to set up Time Machine to backup data: = Navigate to the System Preferences window and click the Time Machine icon Be @ Language Securty _Spotight Region 8 Privacy = @ & General Desktop & Dock ‘sereen Saver ‘System Preferences Mission Control Notitcations OQ 2.2 ~ = Keyboars = Printers & ‘Scanners Ow Internet Accounts Parental Controls Extensions S Dictation & Speech © Tine teaching ‘Accessibilty ‘Fig.10.23 Setting up Time Machine to Backup Data Step 1 = Turn the Time Machine on and click on Options ‘Module 10 Page 306 Centfied Secure Computer User Copyright © by EE-Camnell ‘AI Rights Reserved. Reproduction strictly Pro Certed Secure Computer User bam 11212 Select Backup Dik. Hou ack forte past 24 nore aly Sacks fr tbe past monty ney ick fora reas ments Fig.10.24 Setting up Time Machine to Backup Data Step It = In the options window, users can select the folders that they want to exclude from the backup. They can also opt to encrypt the backup by checking the option for it. Other backup preferences can be set like backing up the data only when on power and notifying the user when backup is complete. After setting up the preferences click Save Time Machine ‘Exchde these toa om back: SS Time h OFF ce nttncn tater rove (Nett tro bachap ae dlated Fig. 10.25 Setting up Time Machine to Backup Data Step Ill = Click on the Select Backup Disk... option in the Time Machine window and choose the disk on which the backup needs to be created. If someone has the Apple Time Capsule, they can choose that as their backup destination. Once done, click on Use Disk ‘Module 10 Page 307 Certtod Secure Computer User Copyright © by EE Somme Al Rights Reserved: Reproduction StrityProhates Certted Secure Computer User fam 222-22 Data Backup and Disaster Recovery Time Mi ia | Fig.10.26 Setting up Time Machine to Backup Data Step IV = Once a disk is selected the system backs up data whenever the disk is available and a backup is due The first backup takes a lot of time since it is a full backup. Subsequent automatic backups which are incremental in nature happen in short bursts. Users can know what the time machine is doing by looking at its icon. The time machine has different icons for its different states: © © 09 £Fig,10.27 Different States of the Time Machine Before recovering a file, use Quick Look to verify the contents of the file, then click Restore to bring it back to the present Understanding Safe Data Destruction ‘One of the primary ways of data loss is through a data breach caused by used and discarded computers and phones. Users generally do not destroy data on hard drives before throwing them away or selling them to someone else. What they do is delete the data, which is a not the same as destruction. Why Do We Need To Destroy Data Permanently? Picture This—Angela has recently started working out and eating healthy to lose weight. She has a habit of monitoring her weight daily. She does so by keeping a journal on her laptop with her daily measurements and a picture of her which she takes every morning. She generally Module 10 Page 308 Certitied Secure Computer User Copyright © by Ee-Commetl ‘A RightsReserved. Reproduction is Suity Prohbted. erties Secure Computer User sam 122-22 ‘ata Backup and isarer Recovery takes this picture without any clothes so that she can see exactly which part of her body she needs to work on in the gym. In a few months Angela achieves her target weight and deletes the journal along with the pictures from her laptop. She sells the laptop to someone by placing an online ad at a discounted price as she wants to buy a higher-end laptop. After a few days of selling her laptop, to her horror, she sees her weight loss pictures posted all over the Internet, even though she had deleted all of them from the computer before selling it. How is that possible? Could Angela have done something to prevent this? Most users do not understand that deleting a file from a computer does not destroy it permanently. Permanent destruction of data is something that people need to take seriously before disposing or selling their hard drives, phones, or computers. A file with your passwords private pictures, a file with your financial and personal information, and private emails are just some of the data, which if not destroyed permanently, can upset a person’s life if accessed by the wrong person. Deleting Vs. Permanent Destruction Before we delve into the distinction of data deletion and destruction, we first need to understand how data is stored. A hard drive can be compared to a book. When reading a book, a reader can know what to find on each page of the book by going through the contents. Similarly, a hard drive stores data in segments which can be compared to the pages of a book. Just like the contents of the book points readers to the correct page number, the master table or index in the hard drive points to the correct segment in which particular data is stored. Deleting all files or formatting a hard drive is like ripping off the contents of the book while leaving the pages intact. When we delete files or format a hard drive, only the master index gets formatted. This in effect tells the computer that the hard drive is empty. When new data is stored on this drive, it simply overwrites the previous data, which was always there. Thus deleting a file, formatting a hard drive, or even reinstalling the operating system does not really destroy the data permanently. It still resides on the drive which can be recovered by anyone with basic knowledge of recovering deleted data Data is destroyed permanently by overwriting all hard drive segments with gibberish over and ‘over again, till the original data is no more. Ways to Permanently Destroy Data = Data Encryptio Data encryption is not necessarily a method of destroying data. What encryption helps in, is ensuring that even if some data is recovered from a used hard drive, it is unusable. Encrypting all your data before destroying it and discarding your hard drive is an extra layer of data security. if by any chance any data escapes destruction and is recovered, it will be unusable for anyone. Module 10 Page 309 Certified Secure Computer User Copyright © by EE-Caumcil [Al Rights Reserved, Reproductions Strictly Prone. Cerued Secure Computer User am 122-22 Data Backup and Disaster Recovery "Wiping Hard Drives: Hard drives can be wiped using tools like eraser and file shredder. These tools go to each file and overwrite them with gibberish during the course of many passes. This ensures that the original data is lost and what is left on the drive is junk. "Destroying Hard Drives: If a user is discarding a computer or a hard drive rather than selling it, physically destroying the hard drive is the most effective way of ensuring that nobody has access to data on that drive. Eraser: Tool for secure data deletion Eraser is a free secure file deletion tool that allows for the secure removal of data from your drive. Unlike the Windows file deletion process, Eraser ensures secure file deletion by allowing the user to choose between several industry standard file deletion processes such as the US DoD 5220.22-M and the Gutmann methods which overwrite data between 7 and 35 times, respectively. = Download Eraser from http://eraser.heidi.i "Install and run Eraser. «Click on the Settings Button at the top. Settings pet egtmen arinetace gue: [Zinegate Ensen Windows paver me tings Detat dive eure method: [Preadorndoe Data pss) Radome it ouce f se Pinecone ee Sica Gm halal Ie Fig.10.28 Eraser Tool for Secure Data Deletion Module 30 Page 310 Certified Secure Computer User Copyright © by EE-Camnell ‘A RightsReserved, Reproductions trity Probe. Certied secure Computer User sam 112412 Data Bacup and Deaster Recovery = In the Erase Settings menu, click on the drop-down menu arrow to the side of “Default file erasure method” and choose a method of deletion. = NB: More secure methods such as the Gutmann method require a longer deletion time as the data must be overwritten 35 times. Se tegration eerneace language ‘WinegaeEaer into Window plore me stings Deut fi esse method ae ae U5 DoD seme M exe CHET pase) Randomness datasource ‘evo SST OPS: posed Seer pus pues (erected tobe wecedtor ease German ATR pose) * vane ath the eons aco ow pau 00D EBDZE NM @-206/0 Q pte) (CiRepace esd swith he fofoning fle to slew asl grach AGISS Eaonced) Opes) US Ai Frce 20 passes) US Amy ARGEDI9 passes) Rosin GOST P3079 95 © pes) British HMGISS Eaceine pas) Fig, 10.29 Eraser Toot for Secure Data Deletion = Ashortcut will also be added to the Recycle Bin and can be accessed by right-clicking on the Recycle Bin icon. ‘Module 30 Page 312 Certified Secure Computer User Copyright © by Ee-Commell ‘Al RightsReserved. Reproductions trityProheted. Certied Secure Computer User eam 11212 ‘ata Backup and Disaster Recovery Module Summary = Backup is the process of creating duplicate copies of the important data and storing it on the media storage devices such as CD/DVD, USB, external hard disks, Internet servers, cloud, etc. ‘= A backup of data is like a car insurance policy. Just like the insurance mitigates the loss of the car owner in case the car gets stolen or is wrecked in an accident, a backup mitigates the damage in case of loss of data = Reasons for data loss include human errors, software failures, computer viruses, hardware malfunctions, hardware thefts, and natural disasters Only important data must be backed up Data backups must be taken at regular intervals, * Data backups can be full, incremental, differential, or online in nature ‘= Windows 10 offers full and incremental backups = Mac OS X also offers full and incremental backups rolled into one = Data must always be permanently destroyed and not just deleted before discarding a hard drive Discussion Questions 1. The management of a firm decided to replace all the desktop computers in its offices with laptops. The system administrator was instructed to sell the computers at a discounted rate to recover some of the cost of the upgrade. What should the system administrator do before selling off the computers? 2. Percy wants to back up some confidential data, but is not sure whether to do an online or an offline backup. After conducting a thorough research, he concludes that online data backup is more advantageous as compared to offline backup. What advantages of online backup versus an offline backup did he come across? 3. After reading a research paper on data loss, Anne backed up her important data. Which reasons for data loss could have prompted Anne to start backing up her data? ‘Module 30 Page 312 Certified Secure Computer User Copyright © by EE-Comnell ‘Al RightsReserved. Reproductions Stncty Prone

You might also like