SlideShare ist ein Scribd-Unternehmen logo
NEHRU PLACE IT SERVICES
IT DEPARTMENT
DATA BACKUP PROCESS
DATA BACKUP
Data backup is the process of creating a copy
of important data, so that it can be restored in
the event of data loss. This can be done
through various methods, including:
1. Full Backup: This involves copying all of
the data to a separate location, such as an
external hard drive or a cloud service.
2. Incremental Backup: This involves only
copying data that has changed since the last
backup, reducing the amount of data that
needs to be backed up.
3. Mirror Backup: This involves creating an
exact copy of the data on a separate location,
usually in real-time.
QUALITY OF DATA
Only working data and working emails will be backed up, so we
have created two folders named "Working Data" and "Working Emails"
in the D-Drive and mapped “My Documents”, “Desktop” and
“Downloads” folders in D-Drive’s “Working Data” folder.
The quality of the data should be verified.
Backup of Non-working data should be avoided and if backed up then it
should be deleted.
For backup purpose, we have created two folders in D-drive i.e.
1. Working Data
2. Working Emails
Note: Name and number of folder as shown in the below screenshot may differ for other users.
ROBO COPY SCRIPT SAVE IN 1.85.BAT
ROBOCOPY “source" destination /s /r:1
/log+:“log.txt"
We simply need to click on the "1.85.bat" executable file after
connecting the external USB hard drive (Incremental backup)
Backup time depends upon the data size.
Please don’t interrupt the process.
The backup status can be cross-checked from the log file
available in the path D:IMP7.txt
The backup status should be cross-checked by
verifying the last modified date of the backed-up
files.
After taking the backup and verifying it, click on 'Safely
Remove' to eject the hard drive.
RECOVERY
PROCESS
If data becomes corrupted or deleted
from the original PC, please contact the
IT department.
We will be able to recover emails and
other data from the external hard drive.
Please do not attempt to do this
yourself
Q & A session!
CONCLUSIONS
 Please don’t open unwanted emails and attachment .
 Data backup is a critical process for ensuring the preservation and accessibility of
important information.
 It is important to have a backup in place, including choosing the right backup method,
determining the frequency of backups, and regularly testing the backup process.
 Additionally, it is important to store backups in a secure and separate location, such as
an external hard drive.
 By taking these steps, organizations can minimize the risk of data loss and ensure that
they can quickly recover important information in the event of an unexpected outage
or failure.
THANK YOU
IT DEPARTMENT


Weitere ähnliche Inhalte

Ähnlich wie Data backup and recovery process

Database backup & recovery
Database backup & recoveryDatabase backup & recovery
Database backup & recovery
Mustafa Khan
 
Information management
Information managementInformation management
Information management
Deepak John
 
Remo Outlook Backup and Migrate
Remo Outlook Backup and MigrateRemo Outlook Backup and Migrate
Remo Outlook Backup and Migrate
Remo Software
 
Understanding Memory in Computing part 1.pptx
Understanding Memory in Computing part 1.pptxUnderstanding Memory in Computing part 1.pptx
Understanding Memory in Computing part 1.pptx
Pravash Chandra Das
 
Backing up your data
Backing up your dataBacking up your data
Backing up your data
aaberra
 
database backup and recovery
database backup and recoverydatabase backup and recovery
database backup and recovery
sdrhr
 
Preventive Maintenance
Preventive MaintenancePreventive Maintenance
Preventive Maintenance
Zainab Almugbel
 
Data backup and disaster recovery
Data backup and disaster recoveryData backup and disaster recovery
Data backup and disaster recovery
catacutanjcsantos
 
Power Point example for module 3 assignment
Power Point example for module 3 assignmentPower Point example for module 3 assignment
Power Point example for module 3 assignment
naterator
 
COMPUTER MAINTENANCE.pptx
COMPUTER MAINTENANCE.pptxCOMPUTER MAINTENANCE.pptx
COMPUTER MAINTENANCE.pptx
ALLANGILBERTJAIN1
 
Oaklands college: Protecting your data.
Oaklands college: Protecting your data.Oaklands college: Protecting your data.
Oaklands college: Protecting your data.
JISC RSC Eastern
 
Data loss and data recovery
Data loss and data recoveryData loss and data recovery
Data loss and data recovery
HTS Hosting
 
Disaster Management - Technical
Disaster Management - TechnicalDisaster Management - Technical
Disaster Management - Technical
Nishant Mevawala
 
Modified u drive procedures
Modified u drive proceduresModified u drive procedures
Modified u drive procedures
Alisa San Pedro
 
Host961 PC Backup
Host961 PC BackupHost961 PC Backup
Host961 PC Backup
Host961
 
Backup data
Backup data Backup data
Backup data
Zaibi Gondal
 
Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16
Ken Tucker
 
Data recovery power point
Data recovery power pointData recovery power point
Data recovery power point
tutannandi
 
Disk Speedup- A Powerful Disk Defrag and Maintenance Tool
Disk Speedup- A Powerful Disk Defrag and Maintenance Tool Disk Speedup- A Powerful Disk Defrag and Maintenance Tool
Disk Speedup- A Powerful Disk Defrag and Maintenance Tool
Systweak Software
 
C) ICT Application
C) ICT ApplicationC) ICT Application
C) ICT Application
remotestaffdesignsolution
 

Ähnlich wie Data backup and recovery process (20)

Database backup & recovery
Database backup & recoveryDatabase backup & recovery
Database backup & recovery
 
Information management
Information managementInformation management
Information management
 
Remo Outlook Backup and Migrate
Remo Outlook Backup and MigrateRemo Outlook Backup and Migrate
Remo Outlook Backup and Migrate
 
Understanding Memory in Computing part 1.pptx
Understanding Memory in Computing part 1.pptxUnderstanding Memory in Computing part 1.pptx
Understanding Memory in Computing part 1.pptx
 
Backing up your data
Backing up your dataBacking up your data
Backing up your data
 
database backup and recovery
database backup and recoverydatabase backup and recovery
database backup and recovery
 
Preventive Maintenance
Preventive MaintenancePreventive Maintenance
Preventive Maintenance
 
Data backup and disaster recovery
Data backup and disaster recoveryData backup and disaster recovery
Data backup and disaster recovery
 
Power Point example for module 3 assignment
Power Point example for module 3 assignmentPower Point example for module 3 assignment
Power Point example for module 3 assignment
 
COMPUTER MAINTENANCE.pptx
COMPUTER MAINTENANCE.pptxCOMPUTER MAINTENANCE.pptx
COMPUTER MAINTENANCE.pptx
 
Oaklands college: Protecting your data.
Oaklands college: Protecting your data.Oaklands college: Protecting your data.
Oaklands college: Protecting your data.
 
Data loss and data recovery
Data loss and data recoveryData loss and data recovery
Data loss and data recovery
 
Disaster Management - Technical
Disaster Management - TechnicalDisaster Management - Technical
Disaster Management - Technical
 
Modified u drive procedures
Modified u drive proceduresModified u drive procedures
Modified u drive procedures
 
Host961 PC Backup
Host961 PC BackupHost961 PC Backup
Host961 PC Backup
 
Backup data
Backup data Backup data
Backup data
 
Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16Tech comm presentation 2014 01-16
Tech comm presentation 2014 01-16
 
Data recovery power point
Data recovery power pointData recovery power point
Data recovery power point
 
Disk Speedup- A Powerful Disk Defrag and Maintenance Tool
Disk Speedup- A Powerful Disk Defrag and Maintenance Tool Disk Speedup- A Powerful Disk Defrag and Maintenance Tool
Disk Speedup- A Powerful Disk Defrag and Maintenance Tool
 
C) ICT Application
C) ICT ApplicationC) ICT Application
C) ICT Application
 

Kürzlich hochgeladen

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 

Kürzlich hochgeladen (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 

Data backup and recovery process

  • 1. NEHRU PLACE IT SERVICES IT DEPARTMENT DATA BACKUP PROCESS
  • 2. DATA BACKUP Data backup is the process of creating a copy of important data, so that it can be restored in the event of data loss. This can be done through various methods, including: 1. Full Backup: This involves copying all of the data to a separate location, such as an external hard drive or a cloud service. 2. Incremental Backup: This involves only copying data that has changed since the last backup, reducing the amount of data that needs to be backed up. 3. Mirror Backup: This involves creating an exact copy of the data on a separate location, usually in real-time.
  • 3. QUALITY OF DATA Only working data and working emails will be backed up, so we have created two folders named "Working Data" and "Working Emails" in the D-Drive and mapped “My Documents”, “Desktop” and “Downloads” folders in D-Drive’s “Working Data” folder. The quality of the data should be verified. Backup of Non-working data should be avoided and if backed up then it should be deleted.
  • 4. For backup purpose, we have created two folders in D-drive i.e. 1. Working Data 2. Working Emails Note: Name and number of folder as shown in the below screenshot may differ for other users.
  • 5. ROBO COPY SCRIPT SAVE IN 1.85.BAT ROBOCOPY “source" destination /s /r:1 /log+:“log.txt"
  • 6. We simply need to click on the "1.85.bat" executable file after connecting the external USB hard drive (Incremental backup)
  • 7. Backup time depends upon the data size. Please don’t interrupt the process.
  • 8. The backup status can be cross-checked from the log file available in the path D:IMP7.txt
  • 9. The backup status should be cross-checked by verifying the last modified date of the backed-up files.
  • 10. After taking the backup and verifying it, click on 'Safely Remove' to eject the hard drive.
  • 11. RECOVERY PROCESS If data becomes corrupted or deleted from the original PC, please contact the IT department. We will be able to recover emails and other data from the external hard drive. Please do not attempt to do this yourself
  • 12. Q & A session!
  • 13. CONCLUSIONS  Please don’t open unwanted emails and attachment .  Data backup is a critical process for ensuring the preservation and accessibility of important information.  It is important to have a backup in place, including choosing the right backup method, determining the frequency of backups, and regularly testing the backup process.  Additionally, it is important to store backups in a secure and separate location, such as an external hard drive.  By taking these steps, organizations can minimize the risk of data loss and ensure that they can quickly recover important information in the event of an unexpected outage or failure.