Short Paper (*no plagiarism*)

Running Head: Standards and recommnedations of data recovery 0

Standards and Recommendation of Data Recovery

Karun Kumar Sunkara

Wilmington University

In the present generation many industries are dependent on data. Database plays a key role in the growth of the company, industries related to telecom, finance and banking should maintain and update the database on regular basis. Data was stored in a hard drive initially to some extent but due to the advanced technology storage technology helps to deploy lot of scenarios. As data has been the most important part of the industry what would be the case if the company lost the data by any kind of incident such as data corruption, hacking, hard drive failure. Many cases the data cannot be recovered in the olden days, in some special cases experts retrieve the data which was almost destroyed. If the data was stored on hard drive, USB, RAID you can retrieve the data by asking some professional to perform data recovery and so they can retrieve the data which is completely lost. But in some cases the system also gets corrupted and it’s hard to retrieve the data even after the data recovery plan (Albright, 2014).

Standard Methods of Data Recovery

Data can be recovered by having a backup. The type of backup is selected depending upon the frequency and the size of storage. There are different types of backups Let us discuss the most standard backups that are used by small-medium based companies.

Redundancy Array Interactive Devices (RAID)

It is used as back up in the recent time it can be used as mask for disk drives and controller failures. It will also help in increasing the performance of the data, without shutting the system it can swap the disk drive but it cannot replace the disk drive as it is not suggestible in the offshore, since there is no way that it works as protection during the floods or fire (NIST, 2002).


Differential Method:

This method takes less time to complete and it will also stores the data created or modified up to the last full backup. This has been the most used methods in the medium size industries. But the main lagging thing is that it takes longer because the amount of data modified from the last full backup to next full backup is more. The best part is it takes less storage units when compared to other methods (NIST, 2002).

Incremental Method:

This particular method will take the data that was modifies or created from the last back up to now. This method is considered as the most advantageous but the problem if it takes too long for restoration. The efficiency of this method is high when compared to any other method (NIST, 2002).

Disk Replication:

Disk replication is nothing but the data is created and updated on two disks. This way data is available on both the disks and both disks are protected. This is a simple method used by many small0medium based companies but the cost might be high as you need more infrastructures (NIST, 2002).

By having many back up plans still experts are failing to retrieve the data sometimes and they couldn’t protect the data which is very useful for the future reference of the company. Still they are many issued faced by big organizations due to lack of the protection for the data and lack of better infrastructure to the company. Small organization like schools and colleges are facing the issues with backing the data and protecting it. Let explain about it by considering an example (Mah, 2013).

Recommendations:

City University of New York is a big organization serves many students which runs all the year by educating many students on various courses. Since every student’s information need to be created and updated during or later the admission they need to back up the data. They are following the standard methods to back up the data but some of the main recommendations are discussed below.

Periodic Data Backups:

All the units must be backed up periodically by filly this. The data created and modified should be backed up from period to period this way if they lose the original data they can back up the data. And they should also make sure each unit is stored in that particular department it belongs to. All the data should be updated for example student admission, registration, fee records, billing. There are many software’s which would update and back up the data so use of the right software is must which is suitable to the university (Varun, 2010).

Proactive Loss Prevention:

The right infrastructure is needed to back up the data and protect it so CUNY units should ensure that they should have at least the basic infrastructure such as RAID storage, UPS backup and redundant power, which are considered as the most commonly used backup methods in the market in the present days. If the data is lost it is a huge loss to the organization so before it lost it is suggested to be proactive by having the right infrastructure which is recommended. They should also make sure that future admins of the data storage would also follow the equipped infrastructure that is recommended. The university should be proactive as it is running many online facilities in order to maintain the facilities it should follow the recommendations (varun, 2010).

Risk Analysis and Disaster Recovery Planning:

Risk analysis is to be done before the threat occurs for example if a threat occurs the CUNY units should come up with an immediate plan to solve the issue within span of time this analysis are called risk analysis. They should work with IT and network team and should have plan to go against the issues and try to accomplish the task. It is recommended that outside consulting companies and the IT team of CUNY should discuss and should have effective plans for coming years (Varun, 2010).

Conclusion

After understanding the important of the data recovery it is suggested to follow the recommendations suggested by CUNY team. RAID and UPS backup are the common software used for the data backups. There are many backups software’s but each of them has their own advantages and disadvantages companies choose which a better match for them is. Proactive loss prevention is nothing but taking steps before not to lose the data and take necessary steps to maintain and backup the data.

References

Albright, D. (2014, August 17). What is data recovery and how does it work. Retrieved on March 08, 2017, from http://www.makeuseof.com/tag/data-recovery-work/

Mah, P. (2013, September 18). How to overcome small business data recovery challenges. Retrieved on March 08, 2017, from http://www.cio.com/article/2382418/small-business/how-to-overcome-small-business-data-recovery-challenges.html

Martin, B. (2002). SANS Institute InfoSec Reading Room. Disaster recovery plan strategies and processes, 1-3. Retrieved on March 08, 2017, from https://www.sans.org/reading-room/whitepapers/recovery/disaster-recovery-plan-strategies-processes-564

NIST. (2002). Techniques for system and data recovery. ITL Bulletin, 2-4. Retrieved on March 08, 2017, from http://csrc.nist.gov/publications/nistbul/04-02.pdf

Varun, S. (2010). Business continuity and disaster recovery, 1-13. Retrieved on March 08, 2017, from https://www.cuny.edu/about/administration/offices/CIS/security/pnp/CUNY-IT-DR-AdoptedRecommendations-9-16-10.pdf.