You are on page 1of 2

METHODS TO SECURE TO DATA AND PERSONAL INFORMATION ONLINE

---- Continued from the class notes----


(9). Backup Procedures
-Backups create one or more copies of data.
-A backup is usually stored to an external device. In this way the data is more secure since the backup will
be safe even if the original storage device fails, is damaged, lost or stolen.
-Backups can also be saved to online storage. -A copy of data is held in two different geographical locations.
-Backing up to online storage is slower because it uses an internet connection.
-Factors to consider hen backing up data;

❖ Media/device to be used for backup


❖ Where to keep the backup e.g.
❖ Can it be stored securely e.g., encryption/passwords
❖ What files to back up.
❖ How often to make a backup?
• More regular backups will need more storage space.
• Less frequent backups may result in a loss of data e.g., if that data has not been backed up
recently.

❖ Can it be automated
❖ Who has access to the backup?
❖ When to run backup

-There are three types of backups;


i)Full backup -This creates a copy of all files.
ii)Differential backup -Creates a copy of all files that have changed since the last full backup.
iii)An incremental backup -Saves a copy of only the files that have changed since the last full or
incremental backup.
-Backup is done to guard against loss or damage to files. Loss of files or damage to files can be caused by;
◼ Theft
◼ Disasters such as flooding or fire
◼ Malware
◼ Power cuts
When backing up, the following prudent ideas for backup procedure should be considered.
• Set automatic backups. -This is more reliable than manual backup by human beings as they might
forget to do it.
• Do not use optical media - because they deteriorate over time and are fragile.
• Schedule backups for late in the evening when data to be backed up will not be in use. -This is to
avoid data conflict.
• Create more than one copy.
• Back up folders containing important files using online storage.
• Store copies at multiple locations.
• Store important data in a fireproof safe.
(10). Email Attachments and Web Links

-Users should always be careful when opening email attachments or hyperlinks in emails and other
messages.
-Some attachments or hyperlinks are fake and are designed to steal users’ personal information.

-To protect against this, users should ensure;


(i). Their anti-malware software is up to date.
(ii).They check and be particularly careful about the email attachment.
They should be concerned if;
❖ They do not recognize the sender
❖ The text is general, impersonal or irrelevant to the user
❖ The text contains spelling or grammatical errors
❖ The attachment file is an executable file such as an .exe or .zip file (Executable files are
computer files that can be run as programs.)
❖ The text contains a message urging the user to do something immediately.
❖ They do not recognize the URL.

You might also like