From Data Backup to Data Restoration: A Research Strategy and Policy

##plugins.themes.academic_pro.article.main##

Waleed Younus

Abstract

In an increasingly digital business environment, backing up data is essential for an organization. An unsafe computer program can ruin your hard-earned information. In today's digital landscape, where data plays a crucial role in the success and continuity of businesses and organizations, ensuring its safety and availability is of paramount importance. Data backup and restoration are essential components of any robust IT strategy, as they provide safeguards against data loss, system failures, natural disasters, or malicious attacks. Backup is a practice that combines strategies and solutions to make a backup effective and inexpensive. Data is copied to one or more locations, with pre-determined frequencies, and with varying intensity. Set up a flexible backup job, use your architecture, or use available backup solutions as a (BaaS) backup, and mix them with local storage. Data restoration, on the other hand, involves a set of policies, tools, and procedures to enable the recovery or continuation of vital technology infrastructure and systems following a natural or human-induced disaster. It focuses on restoring IT operations critical to the resumption of business. Policies are high-level statements that are equal to organizational scope and drive the decision-making process within the organization. In this research paper, we explain different aspects of Data Backup and Restoration in organizations. This practice ensures that in the event of hardware failure, accidental deletion, or mishandling, data backup and restoration policy guide in quick resume of essential data for normal operations.

##plugins.themes.academic_pro.article.details##

How to Cite
[1]
Younus, W. 2021. From Data Backup to Data Restoration: A Research Strategy and Policy. Journal of Policy Research. 7, 4 (Dec. 2021), 50–53.

References

  1. S. Ceri et al., Web Information Retrieval, Data-Centric Systems and Applications, DOI 10.1007/978-3-642-39314-3_2, © SpringerVerlag Berlin Heidelberg 201
  2. Falley. P “Categories of Data Structures”, Journal of Computing Sciences in Colleges - Papers of the Fourteenth Annual CCSC Midwestern Conference and Papers of the Sixteenth Annual CCSC Rocky Mountain Conference. Volume 23 Issue 1, October 2007. PP. 147-153, 2007-10-01
  3. Fei Song, W Bruce Croft. A general language model for information retrieval. Proceedings of the eighth international conference on Information and knowledge management (ACM) 1999/11/1. pp316-321
  4. B. Zhou and Y. Yao Evaluating information retrieval system performance based on user preference JIIS, 34:227–248, 2010
  5. Nicholajs. B Elkin, W.B Rucec Roft,. Retrieval Techniques, Annual Review of Information Science and Technology, Volume 22. 1987. Martha E. Williams, Editor Published for the American Society for Information Science (ASIS) bv Elsevier Science Publishers.
  6. . V R, Kanagavalli & Maheeja, G. (2016). A Study on the usage of Data Structures in Information Retrieval
  7. . Jain, Nikita. (2013). Data mining techniques: A survey paper. International Journal of Research in Engineering and Technology. 02. 116-119. 10.15623/ijret.2013.0211019.
  8. Doherty, N.F., and H. Fulford H. (2006) "Aligning The Information Security Policy with The Strategic Information Systems Plan." Comput Secur 25: 55–63. doi: 10.1016/j.cose.2005.09.009.
  9. Nohlberg, M. (2009) "Why Humans are the Weakest Link." Soc. Hum. Elem. Inf. Secur. Emerg. Trends. p. 22.
  10. Barry, L. (2013) Information Security Policy Development for Compliance, Boca Raton, CRC Press Taylor & Francis Group.
  11. Bulgurcu, B., H. Cavusoglu, and I. Benbasat. (2010) "Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness." MIS Q 34: 523–48. doi:10.1093/bja/aeq366.
  12. . Parul Kalra Bhatia, Tanya Mathur, Tanaya Gupta. Survey Paper on Information Retrieval Algorithms and Personalized Information Retrieval Concept. International Journal of Computer Applications. 66, 6 (March 2013), 14-18. DOI=10.5120/11088-6039