RAID or Redundant Array of Inexpensive Disks is a technology for storing the same data across different disks to ensure data redundancy. RAID also employs data stripping (a process where data is divided into blocks and spread over several disks) which improves performance. A RAID appears to the operating system as a single logical hard disk. Continue reading “Understanding RAID”
Security Resolutions for 2010
What the Information Security manager should aim for
Clustering vs. Mirroring vs. Log shipping vs. Data Replication
In this article let us analyse the various technologies that ensure high data availability and redundancy. The following table makes a comparative analysis of clustering, mirroring, log shipping & data replication. Continue reading “Clustering vs. Mirroring vs. Log shipping vs. Data Replication”
Full Disk Encryption-Software based or Hardware based?
It is quite common these days to hear of sensitive information being lost when laptops are either stolen or lost. Rarely does a month go by without an organisation revealing the loss or theft of a laptop brimming with sensitive data. Full disk encryption, or FDE, is the preferred mechanism to address this threat. Continue reading “Full Disk Encryption-Software based or Hardware based?”
Backup Types and Backup Rotation Strategy
On the basis of data coverage, backups are of 3 types viz., full backup, differential backup and incremental backup. The following table gives a brief description of each backup type and also compares the backups in terms of backing up speed, restoration speed and storage space required.
Continue reading “Backup Types and Backup Rotation Strategy”