Discussion learning Objectives: The learning objectives focused on the  basic telnet of information security, which is the CIA triad. Making information available when we need it is the utmost importance of any security strategy. However, it requires planing to ensure that unauthorized  person cannot have access to information, but make information available to authorized users. Therefore, week 8 discussion will focus on creating backup images and using them to restore information. We will also learn different scenarios that can result in loss of information and how to recover from different types of losses. 
Therefore, you are tasked to discuss the following scenario:
DQ1:  Senior management were of the opinion that if there is a disaster in the organization, data could be lost and business operations could be impacted.  As a data administrator in your organization, management have asked you to recommend data backup and recovery strategy.  Based on your reading in chapter 8, discuss strategies that could be used to address the management concerns. Please, highlight only three strategies of your choice.Security Strategies in Windows
Platforms and Applications
Lesson 8
Microsoft Windows Backup
and Recovery Tools
© 2021 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Cover image © Sharpshot/Dreamstime.com
Learning Objective(s)
▪ Implement security controls to protect
Microsoft Windows systems and networks.
Security Strategies in Windows Platforms and Applications
© 2021 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 2
Key Concepts
▪ Backup and restore procedures for
Microsoft Windows servers, Windows
clients, and networks
▪ Cloud backups
▪ The Microsoft Windows Backup and
Restore utility
▪ Virtual image backups
Security Strategies in Windows Platforms and Applications
© 2021 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 3
The Need for Backups
▪ Primary copy
• The copy of information you use most
frequently
▪ Data is a valuable asset
• Can be damaged or destroyed
▪ Backups provide secondary copy
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 4
The Need for Backups: Reasons for Data
Loss
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 5
The Need for Backups
Anytime you lose the primary copy of your
data, you have two choices.
Reconstruct the
data.
Security Strategies in Windows Platforms and Applications
Recover the data
from a
secondary
source.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 6
Backup Process
Identify
files
Security Strategies in Windows Platforms and Applications
Select
target
location
Set
schedule
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 7
Backup Planning
▪ Which files or folders will you back up?
▪ Will you use a static list of files or dynamically identify
the items for backup?
▪ Where will the backed-up files be copied?
▪ Will you use removable media?
▪ Does the backup require human intervention?
▪ How will you label and identify backup media?
▪ What controls will you use to protect the C-I-A
properties of the backup media?
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 8
Backup Planning (Cont.)
▪ How frequently will you create a backup?
▪ Will you back up all your data each time, or just what
changed since the last backup?
▪ How many generations of backups will you keep?
▪ How will you use the backup to recover lost data?
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 9
Restore Process
Select target
location
Security Strategies in Windows Platforms and Applications
Transfer secondary
file copies back to
primary locations
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 10
Restore Process (Cont.)
▪ Considerations before running restore process:
• Copy all files and folders from the backup media back
to their original locations or only some files and
folders?
• How long will it take to restore the selected data?
• What data will I lose in the restore process?
• Will I be able to use the data I restore?
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 11
Restore Process (Cont.)
▪ Recovery time objective (RTO)
• Is amount of time it should take to recover a resource
and bring it back to normal operation
• For critical resources
▪ Example
• RTO for a server is 3 hours
• Full restore takes 4 hours
• You can reenter and verify lost data in 2 hours
• A restore is not the most efficient choice
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 12
Workstation Backups
▪ File History
• Allows users to identify personal files and
designate a location to where they will be
automatically backed up
▪ Windows Backup and Restore (Windows 7)
utility
• Wizard-driven utility
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 13
Windows File History Backup
Options
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 14
File History File Versions Browser
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 15
Previous Versions of a File via File
Explorer
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 16
Windows Backup and Restore
(Windows 7) Utility
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 17
Backup and Restore (Windows 7)
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 18
Server Backups
▪ Servers:
• Store large volumes of data
• Provide software and data-dependent
services to an organization’s users
▪ Use Windows Server Backup utility
▪ Backup plan should include methods to
easily and quickly retrieve backup images
on demand
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 19
Windows Server Backup
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 20
Network Backups
▪ Back up files and folders to a network
shared folder or device
▪ Benefits:
• Protects backed-up data from damage to
primary computer or storage device
• Local disk space not used to create
backups
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 21
Network Backups (Cont.)
▪ Drawbacks:
• Can degrade network performance
• May be slower than using a local disk
• May time out and fail more frequently than
local resources
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 22
Cloud Backups
▪ Backing up data across the Internet to
remote cloud servers
▪ Benefits:
• Physically separate from your local
computer
▪ Drawbacks:
• Lack of bandwidth
• Anyone with a network sniffer between you
and backup destination can intercept data
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 23
Disaster Recovery and Business
Continuity Plans
Disaster recovery plan (DRP)
Business continuity plan (BCP)
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 24
Disaster Recovery Plan
▪ Contains steps to restore an IT
infrastructure to a point where an
organization can continue operations
• Identifies each component of an IT
infrastructure that is critical to primary
business functions
• States the steps to take to replace
damaged or destroyed components
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 25
Disaster Recovery Options
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 26
Business Continuity Plan
▪ DRP
• Ensures IT infrastructure is operational and ready
to support primary business functions
• Focuses mainly on IT
▪ BCP
• An organizational plan; doesn’t focus only on IT
• Ensures organization can survive any disruption
and continue operating
• If disruption is major, BCP will rely on DRP to
provide an IT infrastructure
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 27
Recovery/Restoration Process
Fix the
problem
Security Strategies in Windows Platforms and Applications
Open
restore
utility
Select
backup
image;
restore
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 28
Windows Workstation Backup
and Restore (Windows 7)
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 29
Windows Server Recovery
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 30
Rebuilding Systems from Bare
Metal
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 31
Managing Backups with Virtual
Machines
▪ Virtualization
• The ability to run multiple virtual machines (VMs)
simultaneously on a single physical computer
• Allows organizations to do more with less physical
hardware
▪ VM
• A software implementation of a physical computer
▪ Windows Server includes Microsoft’s Hyper-V technology
▪ Third-party virtualization products include VMware,
VirtualBox, and VirtualPC
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 32
Best Practices for Microsoft
Windows Backup and Recovery









Identify critical business functions.
Develop a plan to continue critical business functions.
Define recovery time objectives for critical resources.
Develop a backup plan.
Automate backup operations.
Verify backup operations.
Document backup and recovery.
Test recovery procedures.
Review recovery plan quarterly.
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 33
Summary
▪ Backup and restore procedures for
Microsoft Windows servers, Windows
clients, and networks
▪ Cloud backups
▪ The Microsoft Windows Backup and
Restore utility
▪ Virtual image backups
Security Strategies in Windows Platforms and Applications
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Page 34

Purchase answer to see full
attachment




Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.