Last day of the OFFER FLAT 20% off & $20 sign up bonus Order Now

Last day of the offer FLAT 20% off & $20 sign up bonus


Free Resources

  • icon 75000+ Completed Assignments
  • icon 1500+ PhD Experts
  • icon 100+ Subjects we cater
  • icon 100% Secure Payment

ISTM283A Disaster Recovery and Business Continuity

Published : 22-Sep,2021  |  Views : 10


Discuss the issue of securing backups. There have been several incidents lately in which backup media containing personal customer information were lost or stolen. How should backup media be secured? What about off-site storage of backups?



This study deals with understanding the importance of securing backups and importance of storing the same. Secondary data had been used in the study from reliable sources like peer-reviewed journals, books and websites. It is essential to secure the backup media files and using variety of options explained in this segment (Kumar et al., 2017). The off-site storage of backups is even explained in the study to make the study easier to understand.

Importance of storing backup files and media 

Data security means effective ways to protect data from any of the unauthorized access, use as well as disclosure and destruction that takes into account network security, file security and physical security. Storage of backup files and media is extremely important in secured location that can be easily being accessible (Hassan, Michael & Mrutu, 2015). Data backup means saving of additional copies in separate locations from data files in storage places.

Here, backup media refers to specialized as well as focused security controls. In order to achieve the goals, business enterprise needs to build a practice around different areas such as assigning accountability, authority and responsibility. It even assesses risk as well as develop a data protection process and communication the process or executing the process in the most effective way (Allu et al., 2017).

There are various steps that need to be taken for enhancing the level of security and operation to the back-up and restored files and the steps required to be followed for securing the backup media (Cahyani et al., 2017). In order to form the backup plan, it is needed to implement the methods such as securing storage device as well as backup media. In addition, data from the stolen media need to be accessed as well as restored to other server. Furthermore, it is important for restoring the entire volume of one operation.

As far as offsite storage of backup is concerned, it needs proper data access from any location either through internet or FTP. In addition, the storage data need to be preserved for an event within the business operations. By this, the backup data can be easily shared from various remote locations.

Backup media need to be distinctly labeled as it helps in defining the content stored in an effective way. Once the backup media is labeled properly, it will be useful for lifetime and stored data at a lower classification level (Allu et al., 2017). It is mostly possible always to recover the data even if the files are deleted with the help of magnetic devices as well as media. Therefore, the media need to be treated as same ways or greater when it comes to security protection warranted by the types of data it actually holds.


At the end of the study, it is concluded that securing the data at locations are important so that none of the saved information are stolen in worst cases. In addition, secure media management need to be addressed or mentioned in the security policy as well as exact procedures need to be followed in the defined standards, documentation and guidelines.


Allu, Y., Douglis, F., Kamat, M., Shilane, P., Patterson, H., & Zhu, B. (2017). Backup to the Future: How Workload and Hardware Changes Continually Redefine Data Domain File Systems. Computer, 50(7), 64-72. (Accessed from:

Cahyani, N. D. W., Ab Rahman, N. H., Glisson, W. B., & Choo, K. K. R. (2017). The role of mobile forensics in terrorism investigations involving the use of cloud storage service and communication apps. Mobile Networks and Applications, 22(2), 240-254. (Accessed from:

Hassan, K., Michael, K., & Mrutu, S. I. (2015). Forward Error Correction for Storage Media: An Overview. International Journal of Computer Science and Information Security, 13(12), 32. (Accessed from:;jsessionid=6B1F353C98E9A9D382428B96204812C0.i-03e6a9200156884f3)

Kumar, V. A., Kumar, V. A., Divakar, H., & Gokul, R. (2017, August). Cloud enabled media streaming using Amazon Web Services. In Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), 2017 IEEE International Conference on (pp. 195-198). IEEE. (Accessed from:

Our Amazing Features


No missing deadline risk

No matter how close the deadline is, you will find quick solutions for your urgent assignments.


100% Plagiarism-free content

All assessments are written by experts based on research and credible sources. It also quality-approved by editors and proofreaders.


500+ subject matter experts

Our team consists of writers and PhD scholars with profound knowledge in their subject of study and deliver A+ quality solution.


Covers all subjects

We offer academic help services for a wide array of subjects.


Pocket-friendly rate

We care about our students and guarantee the best price in the market to help them avail top academic services that fit any budget.

Not sure yet?

Get in touch with us or

get free price quote.

Get A Free Quote