2 hours 27 minutes
welcome back to intermediate endpoint Security course. In this lesson, I will be talking about protecting data from being destroyed or lost.
And when we talk about these topics, we will talk about backing up data and storing dating the club. Because this is we're now not talking about some kind of cyber activities have a crime being in the world. We're just going to talk about
what happens if some harder fails or people just delete something by mistake.
So when we talk about backups, we have storage Bates backup. So you have storage systems in in the company, and you can have. It's a very traditional approach to protecting data
requires, usually in house storage. So it's a separate system than runs in the separate network.
It is very safe because it's Ah, As I said, it's on a separate network. It's really protected. And the access to that storage may be limited through some kind off interface, which is like Web interface, which, for example, prevents you from deleting data there without special privileges
or excessive their data
so it can hear essentially very, very safe system.
Um, also, the way the storage based backup works is that you usually have some kind off agent on users. BC's,
and it performs back up on a regular basis on and usually the users. They don't have to worry about these things, and this is usually the incremental backup. So you ads only those things that have been changed. Only those files,
and also, if some far has been accidentally deleted. It doesn't get deleted. It just adds things that have been changed. It doesn't remove anything from storage. That means that capacity of storage has to grow
in time. It's usually the leaner grown of the exponential growth. So it it adds to the cost.
Uh, but that way you can track things. Even that was that They were created, like, five years ago. There still there, which is very nice thing. Also, if somebody gives his the something play gets a PC stolen or lost,
you have all the data they have been working on because everything has been backed up. So this is very safe
in terms of protecting data.
Now you have clogged
and you can use external cloud, and you have inside internal corporate crock crowd cloud. Sorry. Usually when you use somebody else's cloud. You also search security together with outsourcing the storage space
so you don't have to worry about securing. They tell McLeod it can be cheaper because it's scalable and because it's essentially
done in a way that you
you probably you don't need the basic starter infrastructure. Just paying for the storage you leasing. So it's, um,
it can be cheaper on its potentially more, more vulnerable. Why? Because communication can be
eavesdropped and also if the security and the cloud provider fails.
Yeah, it's a huge thing. And these things are magnet for hackers. You know, if you if you were, if you're aspiring, hacker or cyber criminal and you want to make a name for itself looking after breaking into some cloud like
cloud storage, like Google or Amazon or Microsoft, one drive
is the thing you want to do. It's like the famous gun slingers in the in the old Wild West. They were
constantly called upon a dual because every young hotshot wanted to make the name for themselves. Same thing is here so potentially. These things they're protected by very professional people. A huge amount of money is given into their protection, but it doesn't mean it's absolutely safe because nothing is
what is the learning trick on? The question is, why is cloud better than in how storage. So what is the advantage of cloud? Is it because it's safer?
Is it because it's possible to back up when outside come outside company network? So when they're here, for example, at home? Or is it because it's faster?
And the correct answer is, uh,
it is because it's possible to do back up when you're not connected to corporate network. So if you're somewhere like on a holiday and, for example, your creepy in doesn't work really well, then you you still can do some kind of backup by just connecting toe cloud.
So in this lesson, you have learned about protecting data from being lost or destroyed.
And the next lesson? I'm just going to do a recap off the model that is talking about protecting data