Free Essay

Information Security Policy Essay

In:

Submitted By Dialogue
Words 1234
Pages 5
Deduplication

Kirth A. Prawl

Prof. Eli Weissman

Devry College of New York

October 10, 2012

Deduplication technology is a way to streamline backup and storage of data by making sure that redundant records are filtered out prior to backup. In some cases, using deduplication technology can eliminate as much as 95% of the data traditionally backed up. If that figure seems high, consider the case of corporate documents that are distributed to hundreds or even thousands of employees. Each individual may have an identical copy of electronic files such as procedures manuals.
When all workstations are backed up without considering duplicate records, the backup itself will contain much wasted space. By managing the data more efficiently and identifying files that are identical, deduplication technology can produce a backup that is scaled down in size, making it more manageable in terms of time and resources as well as in terms of physical media such as disk or tape space.
Deduplication technology can be implemented at the network level and consist of only local operations, or it can also be integrated into cloud based technologies that take advantage of economies of scale through the use of remote and managed services.
Deduplicate data Eliminating redundant data can significantly shrink storage requirements and improve bandwidth efficiency. Because primary storage has gotten cheaper over time, enterprises typically store many versions of the same information so that new work can reuse old work. Some operations like Backup store extremely dismissed information. Deduplication lowers storage costs since fewer disks are needed, and shortens backup/recovery times since there can be far less data to transfer. In the context of backup and other near line data, we can make a strong supposition that there is a great deal of duplicate data. The same data keeps getting stored over and over again consuming a lot of unnecessary storage space disk or tape, electricity to power and cool the disk or tape drives, and bandwidth for replication, creating a chain of cost and resource inefficiencies within the organization.
The way that Deduplication works, that the Deduplication segments the incoming data stream, uniquely identifies the data segments, and then compares the segments to previously stored data. If an incoming data segment is a duplicate of what has already been stored, the segment is not stored again, but a reference is created to it. If the segment is unique, it is stored on disk.
For example, if a file or volume that is backed up every week creates a significant amount of duplicate data. Deduplication algorithms analyze the data and can store only the compressed, unique change elements of that file. This process can provide an average of 10-30 times or greater reduction in storage capacity requirements, with average backup retention policies on normal enterprise data. This means that many companies can store 10TB to 30TB of backup data on 1 TB of physical disk capacity, which has huge economic benefits.
The Virtual tape library data deduplication technology is implemented around a VTL, the capabilities of the VTL must be considered as part of the evaluation process. It is unlikely that the savings from data deduplication will override the difficulties caused by using a sub-standard VTL. Consider the functionality, performance, stability and support of the VTL as well as its deduplication extension.
The Impact of deduplication on backup performance is important to consider where and when data deduplication takes place in relation to the backup process. Although some solutions attempt deduplication while data is being backed up, this straight method processes the backup stream as it comes into the deduplication application, making performance dependent on the single node’s strength. Such an approach can slow down backups, jeopardize backup windows and degrade VTL performance over time. For maximum manageability, the solution should allow for granular tape or group level policy based deduplication based on a variety of factors resource operation, production schedules, time since creation and so on. In this way, storage efficiencies can be achieved while optimizing the use of system resources.
Scalability is the solution is being chosen for longer term data storage, scalability, in terms of both capacity and performance, is an important reflection. Consider how much data you will want to keep on disk for fast access over the next five years. How will the data index system scale to your requirements. A deduplication solution should provide an architecture that allows economic right sizing for both the initial implementation and the long term growth of the system. Gathering allows organizations to scale to meet growing capacity requirements even for environments with many petabytes of data without compromising deduplication efficiency or system performance. Clustering also inherently provides a high availability environment, protecting the backup repository interface VTL or file interface and deduplication nodes by offering failover support.
Data deduplication delivers benefits throughout a distributed enterprise, not just in a single data center. A solution that includes replication and multiple levels of deduplication can achieve maximum benefits from the technology. The solution should only require minimal bandwidth for the central site to determine whether the remote data is contained in the central repository. Only unique data across all sites should be replicated to the central site and subsequently to the disaster recovery site, to avoid excessive bandwidth requirements.
It is extremely important to create a highly available deduplication source. Since a very large amount of data has been combined in one location, risk tolerance for data loss is very low. Access to the deduplicated data source is critical and should not be vulnerable to a single point of failure. The solution should have fail over capability in the event of a node failure. Even if multiple nodes in a group fail, the company must be able to continue to recover its data and respond to the business.
The best efficiency and effectiveness way to keep file based deduplication approaches do not reduce storage capacity requirements as much as those that analyze data at a sub file or block level. Consider, for example, changing a single line in a 4 megabyte performance. In a file based solution, the entire file must be stored, doubling the storage required. If the demonstration is sent to multiple people, as presentations often are, the negative effects multiply. Most sub file deduplication processes use some sort of “chunking” method to break up a large amount of data, such as a virtual tape cartridge, into smaller sized pieces to search for duplicate data. Larger chunks of data can be processed at a faster rate, but less duplication is detected.
Based on my conclusion Deduplication technology can help you avoid the costs associated with building massive storage arrays. You can choose to use deduplication to keep your filers hard drives from breaking your budget, for keeping your backup sets from requiring a forklift to transport or both. Choose the type of deduplication very wisely source, target or inline and then implement it carefully choosing the chunk sizes and hashing algorithms among other concerns. If you do, you’ll allow your company to smoothly grow with its storage demands and retain important information for longer periods of time.

Work Citied
Books:
Data Deduplication: High Impact Strategies by Kevin Roebuck
Guide to Data Deduplication by Larry Freeman
Pro Data Backup and Recovry by Steven Nelson

Website: http://www.computerweekly.com/feature/How-data-deduplication-works http://technet.microsoft.com/en-us/library/hh831602.aspx

Similar Documents

Premium Essay

Password Guidance

...cy/index.html Retrieved on February 27, 2014 nist.gov. (2011).NIST Policy on Information Technology Resources Access and Use. Retrieved from http://www.nist.gov/director/oism/itsd/policy_accnuse.cfm Retrieved on February 27, 2014 HHS, 2007. HIPAA Security Series. Retrieved from http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/adminsafeguards.pdf Retrieved on March 8, 2014Task 1Heart Healthy Information Security Policy:The information security policy is divided into two major parts – the policy for any new user entering the organization and the password management:New Users:All the new users will get appropriate access and rights, which will be reflective of their responsibilities in the organization. These accesses will enable the user to access all the required data files and information to complete their tasks. While assigning the rights and accesses to the new user a a document should be signed between the new user and the supervisor which will detail all the roles and responsibilities that the user will perform and also the corresponding access and rights. In case the user requires any administrator access then signature of the respective manager will be required. All the new users will have to undergo an orientation program and some additional training which will tell them about the work place, work culture, security policies, information security policies etc. The additional trainings will focus on password management, remote device protection, file downloads...

Words: 283 - Pages: 2

Premium Essay

Human Resources Security Information

...Human Resources Information Security Standards Human Resources Information Security Standards Standards August 2009 Project Name Product Title Version Number Human Resources Information Security Standards Standards 1.2 Final V1.2 Final Page 1 of 10 Human Resources Information Security Standards Document Control Organisation Title Author Filename Owner Subject Protective Marking Review date Wokingham Borough Council Human Resources Information Security Standards Steve Adamek, Head of Business Systems G\Government Connect\WBC Policies Head of Business Systems IT Policy Internal Public April 2010 Revision History Revision Date Revisor Previous Version Description of Revision V2.1 V2.2 V2.3 V2.4 V1.0 V1.1 V1.2 Laura Howse Laura Howse Steve Adamek Laura Howse Laura Howse Laura Howse Laura Howse 2.0 2.1 2.2 2.3 2.4 1 1.1 Updated to include WBC references Updated to incorporate WBC changes Updated to incorporate Unison changes Updated to incorporate Unison changes Final Version Updated to include feedback from Human Resources Updated to include feedback from Human Resources Document Approvals This document requires the following approvals: Sponsor Approval Name Date Director of Transformation General Manager for Business Services & Section 151 Officer Head of Business Systems Deputy Head of Human Resources Computacenter Service Manager (Outsourced IT Provider) Document Distribution Andrew Moulton Graham Ebers Steve Adamek Maureen Vaughan-Dixon...

Words: 2757 - Pages: 12

Premium Essay

Unit 4 Assignment1

...Unit 4 Assignment 1: Enhance and Existing IT Security Policy Framework Richman Investments Remote Access Standards Purpose: This document is designed to provide definition of the standards for connecting remotely to Richman Investments’ network outside of the company’s direct network connection. The standards defined here are designed to mitigate exposure to potential damage to Richman Investments’ network, resulting from the use of unauthorized use of network resources. Scope: All Richman Investments agents, vendors, contractors, and employees, who use either Richman Investments company property or their own personal property to connect to the Richman Investments network, are governed by this policy. The scope of this policy covers remote connections, used to access or do work on behalf of Richman Investments, including, but not limited to, the viewing or sending of e-mail, and the viewing of intranet resources. Policy: Richman Investments agents, vendors, contractors, and employees with privilege to remote access to Richman Investments’ corporate network are responsible for ensuring that they adhere to these standards, whether using company-owned or personal equipment for data access, and that they follow the same guidelines that would be followed for on-site connections to the Richman Investments network. General access to the Internet by household members via the Richman Investments network will be permitted, and should be used responsibly, such that all Richman...

Words: 474 - Pages: 2

Premium Essay

College

...Principles of Information Security Chapter 3 Review In: Computers and Technology Principles of Information Security Chapter 3 Review Chapter 3 Review 1. What is the difference between law and ethics? The difference between law and ethics is that law is a set of rules and regulations that are universal and should be accepted and followed by society and organizations. Ethics on the other hand was derived from the latin word mores and Greek word Ethos means the beliefs and customs that help shape the character of individuals and how people interact with one another 2. What is civil law, and what does it accomplish? A wide variety of laws that govern a nation or state and deal with the relationships and conflicts between organisational and entities and people. 3. What are the primary examples of public law? Criminal, administrative and constitutional law. 4. Which law amended the Computer Fraud and Abuse Act of 1986, and what did it change? The National Information Infrastructure Protection of 1996 amended the Computer Fraud and Abuse Act of 1986. It modified several sections of the CFA Act, and increased the penalties for selected crime. 5. Which law was specifically created to deal with encryption policy in the United States? The Security and Freedom through Encryption Act of 1999. 6. What is privacy in an information security context? Privacy is not absolute freedom from observation, but rather it is a more precise “State of being free from...

Words: 550 - Pages: 3

Premium Essay

American Democracy In Peril William Hudson Summary

...Democracy in Peril, has given several challenges facing democracy in American. Hudson's seventh challenge to America's democracy is the “national security state”. Hudson starts the chapter off talking about Ronald Reagan's administration and their involvement in Central America. He talks CIA director William Casey involvement in the conflicted and how he created the contra to prevent the Saninistas from supplying the rebels in El Salvador. Hudson also talks about Oliver North and John Poindexter and the Iran-contra and how they, with the support of Casey, created a hidden government inside the government that used government resources to achieve their own political agenda as Hudson puts it. In the end, North and Poindexter claimed they did what they did for national security. As indicated to Hudson "national security state" from the Iran-contra. Hudson believes "national security state" is harmful to democracy. This essay will investigate the four practices and dispositions associated with "national security...

Words: 1491 - Pages: 6

Premium Essay

Tft2 - Cyberlaw

...Overview Kristi Lockett, Course Mentor Kristi.lockett@wgu.edu https://kristilockett.youcanbook.me Performance Assessment • • • Seven (7) Weeks to complete COS Four (4) Tasks Refer to Rubric (in Taskstream) for task requirement details Tasks – submit via Taskstream 1. Task 1 – Policy Statements • For given scenario, develop/revise two policy statements (new users and password requirements). Justify policies based on current federal information security laws/ regulations (i.e., HIPAA) 2. Task 2 - Policy Statements • For given scenario, develop three policy statements that would have prevented a security breach. Justify policies based on national or international standards (i.e., NIST, ISO) 3. Task 3 – Service Level Agreement • • • For given scenario, recommend/justify changes to service level agreement. Address the protection of the parent company’s physical property rights, intellectual property rights and the non-exclusivity clause Use Microsoft Word tracking to track your additions, deletions, and modifications. Insert your justifications after each SLA section, or write an essay describing your changes and justifications 4. Task 4 – Cybercrime • For the given scenario, write an essay responding to the following question prompts (suggested length of 3–5 pages): • • • • • • • • Discuss how two laws or regulations apply to the case study. Discuss how VL Bank will work within the parameters of appropriate legal jurisdiction with specific bodies of law enforcement...

Words: 369 - Pages: 2

Free Essay

Realism Theory Focused Chinese – United States Foreign Policy

...Realism Theory focused Chinese – United States Foreign Policy There is no disputing that the United States (US) has been known around the world as the superior, single most dominating state for decades (Drew & Snow, 2006). There should be no surprise we are now seeing the rest of the world questioning how to deal with taming the American power (Walt, 2005). China along with other nations are facing this daunting question of how to balance the power, even the playing field by striving to become a great power (Forsyth, 2008). This essay will address the realism theory focusing on the three of the instruments of power (IOP) as it applies to the Chinese foreign policy towards the US. To begin with, this essay will touch on Chinas fluctuating military stance. China continues to display the traditional realist view of balancing power plus states gain their power through war and military intimidation (Forsyth, 2010). Chinas strategic culture and historical record shows they are willing to use force to maintain security and power against the US. They are positioning their assets and “threatening potential US conflict over Taiwan” (Gompert & Phillip, 2011, 42). They’ve increased their military budget, showed capabilities by shooting down a satellite, and “acquired military capabilities-including anti-ship cruise missiles, ballistic missiles, and electronic countermeasure technologies—that could hinder US forces if they tried to operate in China’s neighborhood” (Walt...

Words: 898 - Pages: 4

Premium Essay

Accounting Fraud

...5 EFS students: Use this table to create your essay outline in NOTE form. Submit this completed outline on Monday WK 4 together with your articles (4 or 5), a reference list & notes on your articles that will be used as support for your arguments/points. Remember you MUST highlight the sections on the articles that you are going to use as support in your essay and you MUST write next to these sections, what paragraph in your essay the ideas will be used in. i.e. Definition paragraph, BP1, BP2, BP3. (BP = Body paragraph). Note: Students should aim to have 3-4 in text references per paragraph – see model essay in text book p. 109 Name: Thao__________________________Term _ /2014_ Title: How has Vietnam’s response to the global financial crisis helped its manufacturing sector remain viable and other factors should be considered to protect it? (Should be phrased as a question) THE INFORMATION THAT YOU WRITE BELOW SHOULD BE IN DOT POINT FORM USING ABBREVIATIONS AND SYMBOLS WHERE APPROPRIATE. WRITE FULL SENTENCES FOR YOUR THESIS AND TOPIC SENTENCES ONLY!! |THE TOPIC and THE ISSUE | | |(question): |The issue: Vietnam’s response to the global financial | | | ...

Words: 732 - Pages: 3

Free Essay

Wrtg101 Writing Assignment 2 Comparison-Contrast

...assignment #2 will be an essay in which you compare and contrast two objects, concepts, or ideas. You are encouraged to use your field of study to help in generating a topic for this essay. Some sample topics are listed below: If you are majoring in one of the Sciences programs in our SCIP unit, you might be majoring in one of the following: environmental management, biotechnology, laboratory management, social science, gerontology, psychology, or political science You might write a comparison-contrast essay on one of the following: green and non-green buildings two processes in building sustainable communities two countries’ approaches to a particular environmental issue archaeal viruses and bacterial viruses two gene lists in a particular animal community descriptive and prescriptive discriminant analysis in the social sciences two views of a particular field of study in the social sciences two methods of performance appraisal for an employee gender differences in a particular psychological phenomenon two frailty models two cultures’ methods or attitudes toward caring for the elderly If you are majoring in one of the disciplines in our Computer Information Systems and Technology (CITE) unit, you might be majoring in one of the following: computer networks and security, computer science, cybersecurity, digital media and web technology, or information systems management You might write a comparison-contrast essay on one of the following: ...

Words: 883 - Pages: 4

Premium Essay

Windows Server Proposal

...PropAdvwork Proposal University of Maryland University College Shiv LLC will greatly benefit from using Windows Server 2012 to manage their network. Windows Server 2012 brings great updates to security and functionality over past editions of Windows. In this proposal, the major areas I will cover are Active Directory, Group Policy, DNS, File Services, Remote Services, and WSUS (Windows Server Update Services). These major roles have features that will make Shiv LLC Company’s infrastructure run smoothly. Active Directory Shiv LLC will have sites across a large geographic location. Because of this, a regional domain model should be used. Domains will be broken down into where users are working. For example, currently Shiv LLC has three locations, Los Angeles, Dallas, and Houston. This means there will be three domains, representing each of these cities. This strategy will make sure the network can be maintained by regional administrators, who will only worry about users in their area of the network. With this style of deployment, it can be difficult to decide what will be the forest root domain. The main staff for the company is in two cities, Dallas and Houston. This makes it difficult to make one of these sites the forest root domain. To make this decision neutral, a dedicated forest root domain can be suggested. This domain will be created only to function as the forest root. It will not contain and users, except for service administrator accounts for the forest root....

Words: 466 - Pages: 2

Premium Essay

Bpo Cyber Security

...Network Security In Business Process Outsourcing Information Technology Essay The issue of information security and data privacy is assuming tremendous importance among global organizations, particularly in an environment marked by computer virus and terrorist attacks, hackings and destruction of vital data owing to natural disasters. The worldwide trend towards offshore outsourcing of processes and IT services to remote destinations, leading to the placing of valuable data and information infrastructure in the hands of the service providers, is also creating the need for information security solutions that will protect customers' information assets. As crucial information of a financial, insurance, medical and personal nature begins to get handled by remotely located offshore outsourcing service providers, there is a growing concern about the manner in which it is being collected, stored and utilized. Components of security The concept of information security is centered around the following components: · Integrity: gathering and maintaining accurate information and avoiding malicious modification · Availability: providing access to the information when and where desired · Confidentiality: avoiding disclosure to unauthorized or unwanted persons. Indian IT and ITES-BPO service providers today have the responsibility of not just protecting their own internal information, but also that of their customers, who trust them with crucial organizational data. A service providers own...

Words: 1616 - Pages: 7

Premium Essay

Nt1330 Unit 8 Assignment 1

...Group Policy in a Mixed Client OS Environment Unit 8 Assignment 1 ITT Technical Institute Floyd Washington Jr. May 16, 2015 Group policy is a tool used for customizing, controlling, and securing Windows operating systems. It was introduced in Windows 2000 as part of the IntelliMirror technologies. Group policy can be applied at the local computer level or to OU’s, domains, or sites in an Active Directory environment. Group policy was supported by Windows XP Professional, but not XP Home Editions. Group Policy in Vista adds many settings which gives administrators more control over users and computers. In this essay I will discuss five of the newer features that was not in the older versions of windows. * The first policy that I will discuss is the Control Removable Media policy. Devices like thumb drives, flash memory card readers, and external USB hard disks made it easy for users to transfer data between two computers. Although convenient, the ease that removable media created brought about the rise in industry espionage. User could easily copy and share company secrets with competitors by copying the information on to a removable device and uploading it to another computer. Software was made available to block access to USB ports on sensitive terminals. * The second policy that I will discuss is the Control power management settings. Power management on a single computer can save energy and money. Enforcing a power management strategy can save a company...

Words: 532 - Pages: 3

Premium Essay

Project

...Essay Week 2 Daniel Farella I.T.T. Technical Institute Author Note: This essay is being submitted on 5/9/2013 for Earl Robinson intorduction to security class. Essay week 2 * The remote access control policy consists of * Group membership  * Type of connection  * Time of day  * Authentication methods  * Advanced conditions:  * Access server identity  * Access client phone number or MAC address  * Whether user account dial-in properties are ignored  * Whether unauthenticated access is allowed  After the connection is authorized, remote access policies can also be used to specify connection restrictions, including the following: * Idle timeout time  * Maximum session time  * Encryption strength  * IP packet filters  * Advanced restrictions:  * IP address for PPP connections  * Static routes  Additionally, you can vary connection restrictions based on the following settings: * Group membership  * Type of connection  * Time of day  * Authentication methods  * Identity of the access server  * Access client phone number or MAC address  * Whether unauthenticated access is allowed  On this network I recommend a WAN network . Because the wan network is great for going cities to cities or state to state plus there are more security features that can be recommended. The physical and logical access controls are as follows Authentication Identification is usually...

Words: 348 - Pages: 2

Premium Essay

English Only Debate

...and hardware and will develop a personal technology philosophy and classroom technology plan designed to enhance and shape their teaching skills and knowledge to better utilize emerging technology. (APTS 3, INTASC 6) Assessment Tool Selected 1) Comprehensive Classroom Technology Plan 2) Reflection Essay Specific Performance/Task(s) Select and implement appropriate technology and resources. (APTS 3.11) Select and use research-based strategies to engage learners. (APTS 3.12) Relevancy of Task to Teacher Candidate Demonstrate the effective use of technology to foster active inquiry, promote collaboration, and support interaction in the classroom. Assessment: Student Prompts/Teacher Directions Comprehensive Classroom Technology Plan (e-Portfolio Assignment) In Modules 2-6 you will be drafting the component parts of a Comprehensive Classroom Technology Plan for use in a 21st century classroom. The Comprehensive Classroom Technology Plan will include the sections listed below. Drafts of these sections will be submitted throughout the course for instructor feedback and will be revised for inclusion in the Benchmark Assessment, due in Module 7. A Reflection Essay will also be prepared to accompany the plan. The plan is composed of the following components: * Section One: Mission and Vision Statement * Section Two: Communications Plan * Section Three: Integrating Instructional Technology * Section Four: Software to Support Assessment * Section Five:...

Words: 3012 - Pages: 13

Premium Essay

Central Bank

...set of actions that make this possible is called the monetary policy and there are different tools that central banks use to operate a stable economy. The two agencies which control the European monetary policy are called the European Central Bank and the Bank of England. In US, the central bank is called the Federal Reserve. This essay will provide fact and information to what extent central banks control our economy. Initially, central banks are important institutions of our advanced modern economy. Changes in the money supply can affect our economy when it comes to rate of inflation, unemployment, prices and production of goods. Because of the link between the amount of money in an economy and the inflation rate, central banks will act as a price guardian. Their policy is to keep the inflation rate as close to the inflation target as possible. For that reason, central banks are able to increase and decrease the available currency in an economy. Therefore, central banks should be seen as a guardian of inflation stability, rather than a guardian of price stability. There are several tools that central banks use to fulfil their role as a guardian of inflation stability to control the supply of money in an economy and maintain financial stability. One tool is called open-market operations. This means if the central bank is interested in increasing the money supply, it can create currency and use it to buy security from the public. This will raise the amount of currency available...

Words: 897 - Pages: 4