You are on page 1of 42

NETWORK SECURITY DESIGN FOR BACKUP SERVER

A Project Report
Submitted to

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERISITY,

KAKINADA

by

K.Sri Manaswini (20X41A0429)

J. Sai Padma Shreeya (21X45A0402)

CH. Koteswari (20X41A0409)

B.Vineela (20X41A0406)

In partial fulfillment for the award of the degree of

BACHELOR OF TECHNOLOGY

IN

ELECTRONICS AND COMMUNICATION ENGINEERING

Under the guidance of

Mr. B.RAVI

(Associate Professor)
S.R.K INSTITUTE OF TECHNOLOGY
Enikepadu, Vijayawada – 521108
Andhra Pradesh
May 2024
CERTIFICATE

This is to certify that the project report entitled “Application of AI Chatbot using Gradio
Interface for Humans Mental Health disorders” is a bonafide record of work carried out
by Y.Venkatesh (20X41A0464), R.Akhil (20X41A0495), B.Venkaiah Chowdary
(20X41A0463), V.Anil (20X41A0462), K.Sai krishna (21X45A0423) under the guidance
and supervision in partial fulfilment of the requirements for award of the degree Bachelor of
Technology in Electronics and Communication of Jawaharlal Nehru Technological
University, Kakinada.
Dr.T. VISHNU PRIYA Dr.S.SRI GOWRI

(Project Guide) (Head of the Department)

ACKNOWLEDGEMENTS
The successful outcome of this project required valuable guidance and assistance
from many and we are extremely fortunate to have got this.
We acknowledge the support rendered by our guide Dr.T. VISHNU PRIYA, all through the

completion of the project.


We honestly express our reverence towards Dr.S.SRI GOWRI, the Head of the Department,
Electronics and Communication Engineering for her patronage and perseverance.
We are also thankful to Dr. M. EKAMBARAM NAIDU, Principal, SRK Institute of
Technology, for his support and encouragement.
We sincerely thank the staff and students of the Department of Electronics and
Communication Engineering, SRK Institute of Technology, without whose cooperation, the
completion of this project would have been distant reality. We also extend our heartfelt
gratitude to our family and well-wishers.

PROJECT TEAM

Y. Venkatesh (20X41A0464)
R. Akhil (20X41A0495)
B. Venkaiah Chowdary(20X41A0463)
V. Anil (20X41A0462)
K. Sai krishna (20X45A0423)
CONTENTS

ABSTRACT i

CHAPTER 1: INTRODUCTION TO MENTAL HEALTH DISORDER

• Mental Health disorders 1


• Different Types of Mental Health disorders 1
1.2.1 Anxiety disorders 1
1.2.2 Mood disorders 1
1.2.3 Depression disorders 1
1.2.4 Personality disorders 1
• Factors of Mental health disorders 1
1.3.1 Genetic and biological factors 1
1.3.2 Social and cultural factors 2
1.3.3 Medical conditions 2
1.3.4 Substance use 2
• Remedies of Mental Health Disorders 2
1.4.1 Medication 2
1.4.2 Educational and social support 2
1.4.3 Lifestyle and environmental modifications 3
CHAPTER 2: Chatbot 8
2.1 Who invented the Chatbot 8
2.2 Types of Chatbot 9
2.2.1 Rule-based chatbots 9
2.2.2 Voice chatbots 10
2.2.3 Conversational agents or virtual assistants 10
2.2.4 Task-oriented chatbots 10
2.2.5 Generative chatbots 11
2.3 Chatbot for Mental Health Disorder 11
2.3.1 Mood Tracking and Monitoring 12 2.3.2 Medication
Adherence Support 12
2.3.3 Symptom Screening and Triage 12
2.3.4 Education and Self-Help Resources 12
2.3.5 Peer Support and Emotional Assistance 13
2.4 How mental health chatbot are helpful 13
2.4.1 Emotional support 13
2.4.2 24/7 availability 14
2.4.3 Medication adherence 15
2.4.4 Reduced costs 15
2.4.5 Psychoeducation 15
2.5 What is Chatbot 15
2.6 Application of Chatbot 16
2.6.1 Healthcare 16
2.6.2 Travel and Hospitality 16
2.6.3 Human Resources 16
2.6.4 Sales and Marketing 17
2.6.5 Education and Learning 18
CHAPTER 3: GRADIO 18
CHAPTER 4: FALCON-7B LLM 21
CHAPTER 5: ALGORITHM 22

CHAPTER 6: GOOGLE COLAB 49

CHAPTER 7: RESULT 50
CHAPTER 8: CONCLUSION 53
REFERENCE
ABBREVIATIONS

Libraries: Transformers, dataset.

Datasets: Mental health conversational data set [webmd], health line.

Hugging Face: It is a company that provides tools for building applications using Machine
learning.

Bit stand Bytes: Quantization of LLM.

PEFT (parameter Efficient fine tuning): Fine tuning of LORA parameters.

LORA: Low rank application used to fine tune LLM.

QLORA: Same as LORA. Compression of High prescion data into low data.

Wandb: Monitoring of Fine-tuning metrics.

[Falcon 7B Shared bf16] Model: understanding and creating text.

GRADIO: Python library allows users to creates machine learning modal user interface.

Langchain: Framework used for development of LLMs.

Einops (Einstein-Inspired Notation for operations):

• Einops is a powerful library for tensor manipulation.

• It is used to perform the operations on tensors.

• The operations are tensor reshaping, slicing, and rearranging operation making your
code cleaner and intuitive.
ABSTRACT

An organization has a backup server, which is currently on its network. Apart from basic
protection like antivirus on the server, there are no other security implementations from a
network perspective. The backup server and the users are all on the same sub net. The project
understands the security issues in the design and suggests improvement plan by modifying
the network infrastructure and implementing appropriate security configurations in the
design.
CHAPTER 1

Introduction on Networking

1.1 What Is Networking - and What Is It Not?

The basic idea: healthy networks are a community of people who are constantly thinking
about ways to support one anther's growth and success.

“Networking” is not telling everyone you know you’re looking for a job. Asking people for
names of those employed in places where you want to work isn’t networking, nor is
approaching strangers to ask for jobs.

The most successful people view networking as an opportunity to connect with others to
share useful information and resources. That’s right: networking isn’t about asking for
assistance or collecting names. In the most perfect form, it’s about building relationships and
helping others. When you network, you should identify contacts to build mutually beneficial
relationships and follow up with them to nurture the potential for continued engagement and
interaction.
If you don’t like to ask for help and therefore avoid networking, this is great news.
Networking isn’t about asking for help, it’s about people helping each other. Identify what
value you add to a potential or existing relationship. Employers and others gravitate to people
who offer ideas. Know the answer to questions such as, “Why are you an asset?” and “What
do you offer?” Be generous with your resources, knowledge, and skills, and you’ll be
prepared to create two-way networking relationships that can make a big difference in your
career.

1.2 Why Network?

You’re busy and have a lot of things vying for your time and attention. Why should
“networking” be near the top of your list? Recent research by Career -XRoads has shown
that, “A job seeker who is referred is conservatively three to four times more likely to be
hired (some studies found that a job seeker who is referred is 14 times more likely to be
hired) than someone who applies for a position without a referral.”

Those are compelling statistics. When you consider how much better your chances of landing
an opportunity become when a current employee forwards your resume compared to applying
on your own, it is clear why it’s important to spend time making connections with people
who have the potential to send along your resume for consideration.
But, networking isn’t all about finding people who can get you a job — it’s about building
lasting, supportive, relationships. Many good things can come out of those relationships--
ideas, introductions, helpful suggestions, project proposals, and certainly a referral or
recommendation for a job or internship.

1.3 Where Do I Network?

The short answer — everywhere! Networking happens every time you talk with a fellow
student, alumna, peer at work, supervisor, or the endless chance encounters you have with
people at school, work, and life in-general. The key to effective networking is curiosity,
expressed through effective communication and great questions.

There is also one very important issue to consider. Some of you may not have existing
networks that come from family or peer connections. And for those who do have existing
connections, you may be wondering how to expand your network. There are many ways to do
so! Please connect with our Career Communities to explore venues where you can begin or
expand your network.

1.4 Skills and Strategies for Networking

Here are some further resources to help in your effectively building your network to support
your career success.

 Artful Communication - The Foundation for Effective Networking


 These are the “soft skills” and nuances of communication that lead to successful
networking and relationship building
 Crafting your Pitch - Your 30 Second Introduction
 This is the brief, polished introduction you can adapt to use in most any situation where
you are building relationships and networks
 Using Social Media to Network - Your Digital Professional Community
 Today, it is critical to understand how to use social media in building your professional
network.

1.5 Type’s of networks

There are four main types of Computer Networks:

1. LAN (Local Area Network) –

 Systems connected in a small network like in a building or a small office.


 It is inexpensive.
 It uses Ethernet or Token-ring technology.
 Two or more personal computers can be connected through wires or cables acting as
nodes.
 Transfer of data is fast and is highly score.
2. PAN (Personal Area Network) –

 The smallest computer network.


 Devices may be connected through Bluetooth or other infra-red enables devices.
 It has a connectivity range of up to 10 meters.
 It covers an area of up to 30 feet.
 Personal devices belonging to a single person can be connected to each other using PAN.

3. MAN (Metropolitan Area Network) –

 A network that can be connected within a city, for example, cable TV Connection.
 It can be in the form of Ethernet, ATM, Token-ring and FDDI.
 It has a higher range.
 This type of network can be used to connect citizens with the various Organizations.

4. WAN (Wide Area Network) –

 A network which covers over a country or a larger range of people.


 Telephonic lines are also connected through WAN.
 Internet is the biggest WAN in the world.
 Mostly used by Government Organizations to manage data and information.

In this article, we bring to you the detailed information about the LAN(Local Area -Network)

1.6 LAN :

Local Area Network (LAN) is a collection of computers and other devices that are connected
together over a network and are all in the same location within a building like an office or
home.

1. What is LAN(Local Area Network)?


LAN stands for Local-area Network. It is a computer network that covers a relatively small
area such as within a building or campus of up to a few kilometers in size. LAN's are
generally used to connect personal computers and workstations in company offices to share
common resources, like printers, and exchange information. A number of experimental and
early commercial LAN technologies were developed in the 1970s. Cambridge Ring was
developed at Cambridge University in 1974. Ethernet was developed at Xerox PARC
between 1973 and 1974. ARCNET was developed by Data point Corporation in 1976 and
announced in 1977.

2. How Do LAN's Work?

A router serves as the hub where the majority of LAN's connect to the Internet. Home LAN's
often utilize a single router, but bigger LAN's may also use network switches to transmit
packets more effectively.
LAN's nearly always connect devices to the network via Ethernet, WiFi, or both of these
technologies. Ethernet is a physical network connection protocol that calls
for Ethernet cables. WiFi is a protocol for using radio waves to connect to a network.

Servers, desktop computers, laptops, printers, Internet of Things (IoT) devices, and even
game consoles can connect to LAN's. LAN's are frequently used in offices to give internal
staff members shared access to servers or printers that are linked to the network.

3. Types of LAN

There are mainly two types of LAN's exist.

 Client/Server LAN's: Multiple devices (the clients) are connected to a main server in a
client/server LAN. The server controls network traffic, device access, application access,
and file storage. Any connected device that runs apps or accesses the Internet qualifies as
a client. Clients can use wired or wireless connections to connect to the server.
 Peer-to-Peer LAN's: Peer-to-peer LAN's are often smaller because they lack a central
server and can’t support huge workloads like client/server LAN's can. Every device on a
peer-to-peer LAN contributes equally to the network’s operation. Through wired or
wireless connections to a switch or router, the devices share data and resources. Peer-to-
peer networks are the norm in homes.

4. What is a Virtual LAN?

The same physical network can have its traffic divided into two networks using virtual
LAN's, or VLANs. Imagine establishing two independent LAN’s in the same room, each
with its own router and Internet connection. Similar to that, but with only one router and one
Internet connection required, Vlan's divide networks virtually rather than physically.

VLAN’s are beneficial for network management, particularly in very large LAN's.
Administrators may much more simply control the network by segmenting it. (Sub nets,
another method of segmenting networks for increased efficiency, differ greatly from Vlan’s.)

5. What are the Benefits of a LAN?


 Privacy: LAN is a private network, thus no outside regulatory body controls it, giving it
a privacy.
 High Speed: LAN offers a much higher speed(around 100 mbps) and data transfer rate
comparatively to WAN.
 Supports different transmission mediums: LAN support a variety of communications
transmission medium such as an Ethernet cable (thin cable, thick cable, and twisted pair),
fiber and wireless transmission.
 Inexpensive and Simple: A LAN usually has low cost, installation, expansion and
maintenance and LAN installation is relatively easy to use, good scalability.

6. What are the Drawback of LAN?


 The initial setup costs of installing Local Area Networks is high because there is special
software required to make a server.
 Communication devices like an Ethernet cable, switches, hubs, routers, cables are costly.
 LAN administrator can see and check personal data files as well as Internet history of
each and every LAN user. Hence, the privacy of the users are violated.
 LAN's are restricted in size and cover only a limited area.
 Since all the data is stored in a single server computer, if it can be accessed by an
unauthorized user, can cause a serious data security threat.

1.7 Features Of Computer network

Basically, Computer Network is a connection of two or more devices that are connected
through a medium in order to exchange information. With the help of a Computer Network,
you can easily send or receive data to or from a computing device.
A list Of Computer network features is given below.

o Communication speed
o File sharing
o Back up and Roll back is easy
o Software and Hardware sharing
o Security
o Scalability
o Reliability

1. Communication speed

Network provides us to communicate over the network in a fast and efficient manner. For
example, we can do video conferencing, email messaging, etc. over the internet. Therefore,
the computer network is a great way to share our knowledge and ideas.
2. File sharing

File sharing is one of the major advantage of the computer network. Computer network
provides us to share the files with each other.

3. Back up and Roll back is easy

Since the files are stored in the main server which is centrally located. Therefore, it is easy to
take the back up from the main server.

4. Software and Hardware sharing

We can install the applications on the main server, therefore, the user can access the
applications centrally. So, we do not need to install the software on every machine. Similarly,
hardware can also be shared.

5. Security

Network allows the security by ensuring that the user has the right to access the certain files
and applications.

6. Scalability

Scalability means that we can add the new components on the network. Network must be
scalable so that we can extend the network by adding new devices. But, it decreases the speed
of the connection and data of the transmission speed also decreases, this increases the
chances of error occurring. This problem can be overcome by using the routing or switching
devices.

7. Reliability Computer

network can use the alternative source for the data communication in case of any hardware
failure.
1.8 Goals and Applications of Networks

A network consists of two or more nodes (e.g. computers) that are linked in order to share
resources (such as printers and CDs), exchange files, or allow electronic communications.
The computers on a network may be linked through cables, telephone lines, radio waves,
satellites, or infrared light beams.

Networking Elements :
The computer network includes the following networking elements:

1. At least two computers


2. Transmission medium either wired or wireless
3. Protocols or rules that govern the communication
4. Network software such as Network Operating System
Network Goals :
The main goals of network as follows.

1. Cost reduction by sharing hardware & software resources.


2. High reliability by having multiple sources of supply.
3. Greater flexibility because of possibility to connect devices.
4. Increase productivity by making it easier to access data by the several users.
5. Another goal is to increase the systems performance, as the work load increases, by
just adding more processors.
6. Computer networks provide a powerful communication medium.
Network Application :
Some of the network applications in different fields are the following :

· Marketing and sales


· Financial services
· Manufacturing. CAD, CAM etc.
· Information services
· Cellular telephone etc.
Chapter 2

Networking Security

Computer network security consists of measures taken by business or some organizations to


monitor and prevent unauthorized access from the outside attackers.

Different approaches to computer network security management have different requirements


depending on the size of the computer network. For example, a home office requires basic
network security while large businesses require high maintenance to prevent the network
from malicious attacks.

Network Administrator controls access to the data and software on the network. A network
administrator assigns the user ID and password to the authorized person.

2.1 What is Network Security?

All the measures used to safeguard a computer network's integrity and the data on it are
collectively referred to as network security. Network security is crucial because it protects
sensitive data from online threats and guarantees the network's dependability. Multiple
security measures are used in successful network security plans to shield users and
organizations from malware and online threats like distributed denial of service.

Computers, servers, wireless networks, and other associated devices make up a network.
Many of these gadgets are open to possible intruders. Utilizing a range of hardware and
software tools on a network or as software as a service is necessary for network security. As
networks get increasingly complicated and businesses rely more on their networks and data to
operate, security becomes more crucial. As threat actors develop new ways to target these
more complex networks, security techniques must change.
Security is typically described as everyone's duty since every user on the network represents
a potential vulnerability in that network, regardless of the exact method or business security
plan.

2.2 Advantages of Network Security

o Network security is essential for safeguarding client data and information,


maintaining the security of shared data, guaranteeing dependable network
performance, and defending against online attacks.
o An effective network security solution lowers overhead costs and protects businesses
from significant losses brought on by a data breach or other security event.
o Ensuring appropriate access to systems, applications, and data facilitates company
operations and customer service.

2.3 Aspects of Network Security

Following are the desirable properties to achieve secure communication:

o Privacy: Privacy means both the sender and the receiver expects confidentiality. The
transmitted message should be sent only to the intended receiver while the message
should be opaque for other users. Only the sender and receiver should be able to
understand the transmitted message as eavesdroppers can intercept the message.
Therefore, there is a requirement to encrypt the message so that the message cannot
be intercepted. This aspect of confidentiality is commonly used to achieve secure
communication.
o Message Integrity: Data integrity means that the data must arrive at the receiver
exactly as it was sent. There must be no changes in the data content during
transmission, either maliciously or accident, in a transit. As there are more and more
monetary exchanges over the internet, data integrity is more crucial. The data integrity
must be preserved for secure communication.
o End-point authentication: Authentication means that the receiver is sure of the
sender?s identity, i.e., no imposter has sent the message.
o Non-Repudiation: Non-Repudiation means that the receiver must be able to prove
that the received message has come from a specific sender. The sender must not deny
sending a message that he or she send. The burden of proving the identity comes on
the receiver. For example, if a customer sends a request to transfer the money from
one account to another account, then the bank must have a proof that the customer has
requested for the transaction.

2.4 How is Network Security Implemented?

Hardware and software technologies are used in conjunction to ensure network security.
Network security's main objective is to stop unauthorized access to or communication inside
a network.

A security officer or team decides upon an organization's network security plans and policies
to assist the organization in meeting security requirements. These security guidelines must be
followed by everyone using the network. Data can be compromised anywhere in the network
where an authorized user could access it, whether by a violent actor or by a negligent or
mistaken user.

In the modern environment, no method can guarantee complete security. However, measures
may be taken to protect data when it is sent across an unprotected network or the internet.
The most popular method is cryptography.
Encrypting plain-text data using cryptography makes it more difficult to decipher and
understand. Today, a variety of cryptographic algorithms are accessible, as follows:

1. Secret Key Cryptography:

The sender and the receiver share one secret key. The data is encrypted at the sender's end
using this secret key. Data is encrypted before being transferred to the recipient via a public
network. The recipient may readily decipher the encrypted data packets because they are both
aware of and possess the Secret Key.

The Data Encryption Standard (DES) is an illustration of secret key encryption. It is


challenging to administer Secret Key encryption since each computer on the network needs a
unique key.

2. Public Key Cryptography

Each user in this encryption scheme has a unique Secret Key that is not kept in the common
domain. The secret key is kept from the public. Every user has a unique but public key in
addition to a secret key. Senders encrypt the data using a public key that is always made
available to the public. Using the user's personal Secret Key, he can quickly decode the
encrypted data once he receives it. Rivest-Shamir-Adleman (RSA), a kind of public key
encryption, is an illustration.

3. Message Digest

In this approach, a hash value is computed and delivered in place of actual data. The second
end user generates its hash value and contrasts it with the most recent one. It is approved if
both hash values match; otherwise, it is refused.

Message Digest example using MD5 hashing. It is mostly utilized in authentication processes
when server passwords are compared against user passwords.
2.5 Tools and Software for Network Security

Network to network, and with time, there are changes in the security tools and rules available.
Strong security frequently requires various strategies, sometimes known as layered security
or defence, to provide organizations with the most feasible security controls. The following
are some examples of frequently used tools and software for network security:

1. Firewalls

Web pages, pop-ups, and other service entry and departure decisions are made by firewalls,
which are guardian services or devices. Depending on the needs, these firewalls utilize a
preset set of rules to help block or allow traffic. Depending on the requirements of the
system, firewalls might be either software- or hardware-based, or both.

2. Access Control

Access control enables businesses to stop unauthorized people and devices from connecting
to a specific network and to stop prospective attackers from accessing sensitive data. This
limits network access to users who are authorized to utilize the specified resources.

3. Virtual Private Networks (VPN)

In most cases, a VPN encrypts the communication between an endpoint device and a network
via the internet. Additionally, VPN enables experts to verify the connection between the
network and the device. As a consequence, an online tunnel that is encrypted and safe is
created.

4. Intrusion Prevention Systems


Intrusion prevention systems scan network traffic to identify and stop assaults. This is
accomplished by connecting network activity with databases of attack methods that experts
are familiar with.

5. Wireless Security

In comparison to wireless networks, wired networks could be more secure. It would help if
you had control over the computers and people who may access the network of your business.
It would help if you had wireless security, especially in light of the fact that fraudsters are
increasingly extorting people for their private information.

6. Application Security

Applications' weak points may be tracked down and secured using a combination of software,
hardware, and processes, which makes it harder for hackers to access your network.

7. Behavioural Analysis

You need to have a solid understanding of the typical behaviour of your network if you want
to be able to spot abnormalities and different network breaches as they happen. Different
behavioural analytics solutions are available that may quickly identify unusual activity.

2.6 Problems with Network Security

There are several difficulties in maintaining network security, such as the following:

o Changing attack techniques on networks: The rapidity at which cyber attacks


develop presents the largest challenge to network security. As technology advances,
threat actors and their techniques are continuously changing. For instance, emerging
technologies like block chain have given rise to new malware assaults like crypto
jacking. Network security defence tactics must thus change to counter these fresh
dangers.
o User compliance: Every network user is accountable for security, as was previously
stated. It may be challenging for organizations to make sure that everyone is
following the best practices for network security while also adapting those tactics to
deal with the most recent threats.
o Mobile and remote access: As more businesses implement BYOD policies, there
will be a larger and more complicated network of devices for organizations to secure.
Additionally, remote work is becoming common. Given that users are more likely to
access business networks over a personal or public network, wireless security is now
even more crucial.
o Partners from outside parties: A company's network is frequently accessed by
cloud service providers, managed security service providers, and security product
suppliers, creating additional potential security flaws.

2.7 Best Tools for Network Security

The following is a list of some of the security software, hardware, and tools required to
guarantee that the network is, in fact, secure:

1. Wireshark
2. Nessus
3. Snort
4. Netcat
5. Metasploit
6. Aircrack
7. BackTrack
8. Cain and Abel

2.8 Attack against Network Security


Cybercriminals' malicious attempts to undermine a network's security are known as network
security attacks. These assaults are the main causes of the critical need for network security.
These assaults on the network infrastructure must be stopped via network security. Let's find
out more about these types of assaults so you can determine how to stop them.

2.9 Attack Types in Network Security

The following list includes a few of the several network security attack types:

1. Virus

It is a malicious file that may be downloaded, and after a user has opened it, it begins to
overwrite the computer's code with a new set of codes. The system files on the computer will
become corrupt as the infection spreads, which may cause the files on other computer
systems in the network to become corrupt as well.

2. Malware

It is one of the swiftest, most severe, and worst attack methods that aid in gaining
unauthorized access to a system or network of systems. The majority of malware is self-
replicating, which means that once it infects one system, it may quickly infect all other
computers linked to the network through the internet. Malware can corrupt any external
device that is plugged into the system.

Chapter 3
Backup server

A backup server is a computer system used to back up data from other servers and computers
on a network. It is a backup means of protecting data if the primary data is lost or destroyed.
A backup server is a particular computer designed to hold and replicate critical data stored in
the main servers. Its major role is to replicate and preserve essential data so that if the
genuine data is lost or breached, organizations can restore it quickly and continue normal
operations. It functions as a secure fallback in the event of potential data disasters.

3.1 The Role of a Backup Server:


A backup server is like the leader that oversees and organizes all the backup tasks in a
company. It’s in charge of making sure important data is safely copied and stored. Its key
responsibilities include:
 Data Backup: A backup server’s main job is to regularly copy important stuff like files,
databases, apps, and system settings to a safe second place.
 Ensuring Data Availability: With the recent backups, backup servers ensure that if
something goes wrong with the main data. It is not available is not reachable or
something really bad happened. The organization can recover its information and return
to normal operations.
 Minimizing Downtime: When data is lost or the system crashes, a backup server
becomes super important to reduce downtime. Backups help organizations quickly
recover data, so they can get back to business as usual without too much damage to
productivity.
 Managing Backup Policies: The backup servers allow setup and management of backup
rules. These rules determine the frequency of backups, which data should be stored, and
the time the backup copies should be retained.
 Securing Data Integrity: The copies of the data are saved in the backup servers thus
making sure that the data is reliable. They periodically verify and match that stored
copies are the same as the information that was originally stored. This reduces the
probability of having spoiled or incomplete copies of the backups.

3.2 Types of Backup Servers


 On-premises backup servers are located within the organization's physical premises.

 Cloud-based backup servers store data on remote servers accessed via the internet.
 Hybrid backup servers combine on-premises and cloud storage for added flexibility
and redundancy.

3.3 Types of Backup: Understanding Full, Differential, and Incremental Backup

. In fairness, most companies today do back up their data rather diligently. Yet, one-third of
them experience problems with backup restoration. The dichotomy lies in the way a ‘backup
strategy’ is perceived.

For the majority, a backup strategy starts and ends with what to backup. For the rest, it’s
about what and which type of backup to implement.

In light of World Backup Day, let’s move the discussion from ‘why backup’ to the types of
backup. The former gives you a backup strategy while the latter gives you the right backup
strategy.

3.4 How Many Types of Backup are There?


There are mainly three types of backup: full, differential, and incremental.

1. Full Backup

A full backup is the most complete type of backup where you clone all the selected data. This
includes files, folders, SaaS applications, hard drives and more. The highlight of a full backup
is the minimal time it requires to restore data. However, since as everything is backed up in
one go, it takes longer to backup compared to other types of backup.

The other common issue with running full backups is that it overloads storage space. That’s
why most businesses tend to run a full backup and occasionally follow it up with differential
or incremental backup. This reduces the burden on the storage space, increasing backup
speed.

2. Differential Backup

A differential backup straddles the line between a full and an incremental backup. This type
of backup involves backing up data that was created or changed since the last full backup. To
put it simply, a full backup is done initially, and then subsequent backups are run to include
all the changes made to the files and folders.

It lets you restore data faster than full backup since it requires only two backup components:
an initial full backup and the latest differential backup.

Let’s see how a differential backup works:

Day 1 – Schedule a full backup

Day 2 – Schedule a differential backup. It will cover all the changes that took place between
Day 1 and Day 2

Day 3 – Schedule a differential backup. It will make a copy of all the data that has changed
from Day 2 (this includes the full backup on Day 1 + differential backup) and Day 3.
3. Incremental Backup

The first backup in an incremental backup is a full backup. The succeeding backups will only
store changes that were made to the previous backup. Businesses have more flexibility in
spinning these types of backups as often as they want, with only the most recent changes
stored.

Incremental backup requires space to store only the changes (increments), which allows for
lightning-fast backups.

3.5 The Right Backup Strategy With the Right Type of Backup
Which server backup methods are right for you?

Now that you better understand the differences between backup methods, it’s time to decide
what method or types of backup are best for you. Here are a few options to consider:

1. Monthly Image Backup, Weekly Full Backup, and Daily Differential Backups
2. Monthly Image Backup, Weekly Full Backup, and Daily Incremental Backups
3. Quarterly Image Backups, Monthly Full Backups, and Daily Incremental Backups

While it is best to set your backups to automatically run on a set schedule, it is also a good
idea to backup your files or create an image backup before making any type of system
changes like updating your Windows operating system or updating your Windows service
pack, adding new hardware, updating drivers, or making edits to your Windows registry.

Note: Whatever backup method you choose, it should at minimum follow the 3-2-1 backup
rule of keeping 3 copies of data, in at least 2 different media formats, with 1 copy or more
kept offsite.

What server backup storage device to choose?


Now that you know what type of backup schedule you want to use, you will need to decide
what server backup storage destination to select. Here are a few options:

1. External Hard Drive


2. NAS or SAN Devices
3. Tape Drives
4. USB Media (Flash, Thumb Drive)
5. Network Storage
6. Online Backup (Amazon S3, NovaBACKUP Cloud, or other cloud providers)
7. File Sharing Services (Dropbox, OneDrive, etc.)

There are numerous server backup storage options to choose from, but ultimately the decision
as to what data storage device or destination you choose is up to you. We recommend
selecting more than one data storage option or buying two of your storage devices of choice
so that you can have a secondary backup location that is preferably stored offsite.

Some NAS devices, such as Buffalo TeraStations, offer built-in replication and multiple
backup options. For optimum data protection, we recommend that you have one NAS device
onsite and a secondary NAS device stored at an offsite location and the NAS will replicate
your backup to your secondary NAS device.

3.6 Backup Server Technologies


 Incremental backups only save changes made since the last backup, reducing storage
space and time.

 Snapshot technology captures the state of a system at a specific point in time for quick
recovery.
 Deduplication eliminates redundant data to optimize storage efficiency on backup
servers.

3.7 Backup Server Best Practices


 Regularly test backups to ensure data integrity and the ability to restore information
successfully.

 Implement a backup schedule that aligns with the organization's data retention policies
and recovery objectives.

 Secure backup servers with encryption, access controls, and monitoring to protect
sensitive data.
3.7 Backup Server Management
 Monitoring backup server performance and storage capacity helps prevent bottlenecks
and data loss.

 Automate backup processes to streamline operations and reduce the risk of human error.

 Conduct regular audits and updates to maintain the effectiveness and security of backup
servers.
3.8 Disaster Recovery with Backup Server

 Backup servers play a crucial role in disaster recovery by providing copies of data for
restoration.

 Establishing a comprehensive disaster recovery plan that includes backup server


strategies is essential for business resilience.

 Regularly review and update the disaster recovery plan to adapt to evolving threats and
technological changes.
3.9 Advantages Of BackUp Server:
A backup server might seem like an additional expense for organizations, but in the longer
run, it
guarantees business protection from any kind of calamity. Following are the key advantages
associated with
the backup server:
1. Reliable Data Protection
What if your organization gets hit by a cyber-attack, natural disaster, hardware malfunction,
accidental
deletion, or other such incidents, and it caused significant data loss. If you didn’t have a
backup in place,
then how can you recover your data? With a backup server, you are always making a
duplicate of your
organization’s crucial data, so even if your organization encounters an issue causing data
loss, then
your backup solution will be there to protect you.
2. Enhanced Security for Important Data
Organizations today are collecting an unprecedented amount of data, which includes both
vital
information for extracting business insights and unimportant data. The data that is vital for
business should
be backed up to ensure that it can be restored in the hour of need. A backup server is such a
backup
media where you can continuously and automatically store your data crucial for business and
also make it
encrypted for enhanced security. This way, you are having multiple copies of the data, which
brings data
protection and data security.

3. Immediate Recovery of Data


Having backup systems does not only mean that you can have a backup of data instantly, but
it also means
that you can also recover that data quickly. So, in case you have lost business crucial data,
then all you have
to need is to access the recovery drive and restore back the data

.
Chapter 5

You might also like