Vous êtes sur la page 1sur 1

Inadvertent data likely unless likely to be varies from backup data; staff

acts eg integrity, file managed unexpected nuisance to training and physical


turning off identity catastrophic access controls
power,
discarding
carriers,
reformatting
storage
devices
Natural data very likely likely to be may be disaster
disasters eg integrity, file over long sudden but localised and preparedness; well
fire, flood identity, term may be minimal or placed storage areas;
equipment warning total loss offsite backup
assets period
Business access to varies may be likely loss of business planning
failure data gradual or access as and management;
sudden carriers are continuity/succession
dumped or arrangements; clear
re-used identification of
important assets

Table 16-2 Sample risk analysis of data protection threats

FOR PRESERVATION PROGRAMMES WITH FEW RESOURCES


16.13 Fundamental responsibilities
Data protection is such a critical responsibility that even programmes with few
resources must give it a high priority. The simplified risk analysis above may suggest
areas of lower risk for some programmes. It also suggests that some risks may be
reduced at the cost of reducing the level or speed of access. This may be perfectly
acceptable for some collections.

16.14 Prioritisation
It may be possible to prioritise parts of the collection for additional protection, and to
offer lower protection (such as less frequent backups, use of lower quality carriers,
less frequent transfer of data to new carriers) to less important data.

CASE STUDIES
16.15 Case study 1
A typical arrangement that makes use of redundancy holds data on tape in three
copies: one held near-line in a tape library attached to the system, one offline but on
site, and one offsite. All copies are identical and the system maintains them so. For
access, a temporary copy is made to disks organised as a RAID (Redundant Array of
Inexpensive Disks) in which failure of one disk is compensated for by copies on other
disks. To achieve carrier redundancy, there may also be a separate copy stored offsite

116

Vous aimerez peut-être aussi