by Reashad Hossain | Dec 17, 2022 | Security
An Incremental Backup will backup all the files that have changed since the last Full Backup (the first time it is run after a full backup was previously completed) or after an Incremental Backup (for the second backup and subsequent backups) and sets the archive bit...
by Reashad Hossain | Dec 16, 2022 | Security
Shadow files are an exact live copy of the original active database, allowing you to maintain live duplicates of your production database, which can be brought into production in the event of a hardware failure. Data mirroring In data storage, disk mirroring is the...
by Reashad Hossain | Dec 15, 2022 | Security
Power ExcessSpike –> Too much voltage for a short period of time.Surge –> Too much voltage for a long period of time. Power LossFault –> A momentary power outage.Blackout –> A long power interruption. Power DegradationSag or Dip –> A...
by Reashad Hossain | Dec 14, 2022 | Security
The recovery point objective (RPO) is the maximum acceptable level of data loss following an unplanned “event”, like a disaster (natural or man-made), act of crime or terrorism, or any other business or technical disruption that could cause such data loss. The RPO...
by Reashad Hossain | Dec 13, 2022 | Security
Due Diligence = Due DetectSteps you take to identify risks based on best practices and standards. Due Care = Due Correct.Action you take to bring the risk level down to an acceptable level and maintaining that level over time.
by Reashad Hossain | Dec 12, 2022 | Security
A security kernel is defined as the hardware, firmware, and software elements of a trusted computing base that implement the reference monitor concept A reference monitor is a system component that enforces access controls on an object