A small data security scenario

Source: Internet
Author: User
Tags backup

Small business or data more important individuals, often in the data application and backup of a lot of confusion, how to more secure and efficient, low-cost use of computer data application is difficult. If only a computer with a single hard disk for data processing, is obviously unsafe, logical failure, misoperation and physical failure of any one of the unexpected events will make users helpless. If you use a U disk, mobile hard disk or even use another computer for data backup, it is only to reduce the risk, not fundamentally solve the problem, such as synchronization problems, physical failure of the hidden trouble or will bring too much inconvenience.

We need to solve the following problems: To avoid data disasters, backup convenience, less input, optional: encryption, for this, we design a simple solution to implement.

Approximate add-on device: A PC-built NAS+ISCSI device that includes a RAID controller for use as backup space.

Connect a user's computer to a backup machine using an iSCSI or NAS protocol.

Use specific software to set up backup scenarios to backup data to NAS devices.

If there is demand, auxiliary secure encryption means.

NAS should have a thousand m NIC and a good build to support raid. A good example is a Dell-enabled system, like Dell 775,dell SC1430,CPU and memory (NAS does not require too much transaction power), and if you feel that your onboard RAID performance is not good, you can buy some standalone RAID cards (hard cards, Includes processing unit and independent buffering, currently Dell PERC SAS 5i/6i can be purchased in thousand Yuan. For disk space, you can deploy the appropriate RAID scenarios on demand, use two hard drives to deploy RAID1, or deploy RAID5 with more than 3 hard drives. Then install NAS systems for this machine, such as FreeNAS, Openfiler.

Personal terminals, taking windows as an example, you can first connect your backup space to your computer via iSCSI or Samba, and you can use second Copy, Super.Flexible.File.Synchronizer software to deploy your backup scenarios ( Later in detail).

For security purposes, you can use encrypted compressed backups based on second copy, or Super.Flexible.File.Synchronizer encrypted backups, or backup using the encryption layers of true crypt, PGP, and so on.

This column more highlights: http://www.bianceng.cnhttp://www.bianceng.cn/Network/Security/

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.