StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Key Aspects of Data Storage Management - Coursework Example

Cite this document
Summary
This coursework "Key Aspects of Data Storage Management" describes the important data and software in available USB devices. Thi paper outlines the security threat posed by USB drives, implementing USB security, strategy for data storage management, information lifecycle management…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
Key Aspects of Data Storage Management
Read Text Preview

Extract of sample "Key Aspects of Data Storage Management"

Data Storage Management Backing up the important data and software in available USBdevices such as flash drive or cloud may not prove to be the right decision in the direction of protecting such data. While the reasons for this are many, officials responsible for effective data lifecycle management cannot afford to keep the computer data unprotected, without any back up, particularly when the threat of data crashing always looms large. Hence, finding the proper solution to protect the data remains one of the most important tasks with these mangers. However, there is no single solution available presently that can solve the problem for all. It is essential to understand about the type and amount of data that needs protection along with the reason to store the given data. Thereafter, it will become easier to decide about the type of required data storage device or cloud service that will fit the bill. Security threat posed by USB drives With increase in capacity expansion and decrease in prices, the USB drives have become major source of threat for security of data that has business value. Although the threat of stealing data by employees, while working on IT projects exists for a long time, the abundant availability of cheap USB flash drives, now, has given a serious dimension to it. The information stored on such devices can easily be exploited, especially when an employee joins a competitor, after quitting the existing job. In addition, these devices are famous for carrying malware and other virus, thus affecting the data quality and retrieval. The employee can inadvertently carry this malware from personal to office computer, thus damaging other data files and the system. Implementing USB security Businesses must use strong protective software, which can secure the data and scan all external devices such as USB flash drives. Limiting access of data to certain employees by undertaking jobs such as data encryption and ‘auto-run stop’ on office computers can also reduce this threat. Complete ban to access the data may prove ineffective, as interested IT employees would find ways to bypass the ban. However, no amount of security measure undertaken by any company can eliminate this threat. Hence, it is essential to have a full-fledged data storage strategy that involves data lifecycle management. This strategy must consider the following, which may differ from business to business. Strategy for data storage management Conducting research on the following lines shall prove useful, before selecting a particular data storage solution. Knowing the data According to Souvik Choudary, who is the senior director at SunGuard Availability Services’ product management division, it is essential to understand the business value of data for identifying the strategy for its storage. Accordingly, it is important to collect the relevant information before selecting the type of data storage solution. Such information includes knowing the details about the time required for retrieving lost data, time required for accessing the data and retaining it and the level of security required for this data type. In addition, issues related with adherence to regulatory requirements, if any, must be addressed. (Schiff) Storage for structured and unstructured data types When there is a need to combine multi-structured data with semi or unstructured data file systems of the network and email servers, it will take some time to model the data before finding the data storage solution. However, it is necessary that such modeling effort should not take much time. Understanding the regulations According to Jay Atkinson, CEO of AIS Network, the provider for cloud hosting services, certain sectors such as health care and financial services need strict compliance to regulations along with the high level of security. Hence, choosing a solution provider that can ensure highly compliant and secure environment is better than paying high penalties for non-compliance.(Schiff) Data retention policy is required As various data types have different business values, their required retention time also varies. Therefore, it is important to prioritize the storage of most important data types, while selecting the resources for data management. Upfront cost should not prove an obstacle While many data lifecycle management officials compare the offers on the basis of upfront costs and the initial available discounts, the real cost shall be the cumulative cost of storing the data over the years. In addition, the cost factoring includes the costs towards support of renewal and technology updating, which forms part of the overall storage cost. Using tiered storage approach Cost can be saved by using fast storage solutions such as SSD only for data that is used actively, as well as storing all other data types like back-up data or archives on comparatively cheaper platforms that include cloud. Hence utilizing different storage tiers can always help. Storing carefully With growing availability of cheaper storage solutions and devices that can store large quantities of data, there is a tendency to store all data types and even their copies. Hence, it is essential to plan the strategy for storing data carefully that can leave out the redundant data. Data security While the data needs virtual and physical security, it is necessary to encrypt it so that such data becomes useless for hackers and unscrupulous parties. In addition, the enterprise system and related data back up to a secrete tape or other external device can help in creating the relevant data in case of any natural disaster or emergency. Having a disaster recovery plan No solution for data storage is successful, if it does not ensure data recovery at the desired time. Frequent testing of the recovery plan requires that random recoveries be done, almost every week to test the disaster recovery plan while auditing the data pools on weekly basis. In addition, the Mac Geek Gab Podcast host at Mac Observer, David Hamilton suggests keeping three copies of important data in different formats, including one being an offsite solution, naming it as a 3-2-1 rule. (Schiff) Information lifecycle management As businesses accumulate huge volumes of meaningful data that can provide them with the required competitive edge, the storage and access to such data remains one of the daunting IT challenges for them. Accordingly, archiving the database is an important issue, when implementing Information Lifecycle Management (ILM) strategy. The ILM approach requires storage medium selection to be based on the access requirements and value of the relevant information. This reduces the unnecessary expenses for storing all data with a single solution provider. While Hierarchal Storage Management (HSM) is suitable to manage only the files, the ILM is for management of all data types and their storage.(Lee) Data base archiving solution IT organizations can have maximum benefits from HSM and other storage solutions, such as SAN and NAS, with database archiving, which ensures the efficient management of historical relational data. Choosing database archiving solution The requirements for selecting a suitable solution provider for database archiving include the preservation of business context and integrity of the data, for any data model type. In addition, the data must be indexed before the archiving, while storing it on various storage medium/devices to ensure easy access, when needed. The specific archived data must be easily manageable and locatable.(Lee) My reactions The benefits of database archiving, which is an important component of ILM, include implementation of new applications without incurring the cost for upgrading the capacity and hardware. It also reduces the problems arising due to excessive data base growth by releasing huge amount of disk capacity that can be used for other purposes. This eventually saves the cost of managing the storage solution. While data storage and information lifecycle management can prove effective, in the longer run, it may not contribute much to countering the threat of illicit storage of company data by employee on cheap USB drives. However, the checking of the data on daily basis can be result-oriented in tackling the challenge of keeping the company data secure from employees misuse. In addition, encryption of data once or twice a week will ensure its safety. The data lifecycle management involving database archiving is a safe method of keeping the data, which has business value, out of reach for employees. This will prevent the theft of such data, as employees cannot have any access to such data files. In addition, keeping this data in encrypted form will reduce the threat of misusing the data by employees or hackers. The archived data is always a tool in the hands of any business to formulate its competitive strategy taking cues from earlier tasks and competitors’ previous assignments. As employees do not need retrieving such data for their daily routine chores, it is easy to monitor the use of archived data retrieved from this database. Ethical issue involved Businesses cannot eliminate the use of USB drives by employees for storing the company data. For example, stopping the employee to take the company information of an on-going project to come, on a USB drive will prove unethical, apart from being counterproductive. This will amount to doubting the integrity of the employee, without any solid reason. Some interesting nuggets Use of USB storage devices should be discouraged on the pretext that it will spread malware. Cloud services can prove better in storing temporary files, instead of using cheap USB drives. Information management lifecycle must be part of overall storage strategy. Data base archiving should involve efficient data modeling design. Data security must prevail when tackling the issue of data storage on mobile devices. Work-cited Lee, James , “Database Archiving”, Database Journal 2009, 2004, web, 21 April 2015: Schiff. L. J , “14 Things you Ned to Know About Data Storage Management ”, cio.com, 2013, web, 21 April 2015: Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Key Aspects of Data Storage Management Coursework Example | Topics and Well Written Essays - 1500 words - 4, n.d.)
Key Aspects of Data Storage Management Coursework Example | Topics and Well Written Essays - 1500 words - 4. https://studentshare.org/information-technology/1871725-paper
(Key Aspects of Data Storage Management Coursework Example | Topics and Well Written Essays - 1500 Words - 4)
Key Aspects of Data Storage Management Coursework Example | Topics and Well Written Essays - 1500 Words - 4. https://studentshare.org/information-technology/1871725-paper.
“Key Aspects of Data Storage Management Coursework Example | Topics and Well Written Essays - 1500 Words - 4”. https://studentshare.org/information-technology/1871725-paper.
  • Cited: 0 times

CHECK THESE SAMPLES OF Key Aspects of Data Storage Management

The Benefits of Adopting a Different Strategy on the Technological Front

This creates virtual data storage capacities which are virtually unexplored in many cases due to the huge capacity that they possess.... Some of the risks to be incurred include outsourcing to an external provider which gives the flexibility but does not eliminate the risks incurred; storage of data outside the company may be of great concern and the probability of vendor lock-in due to the different services provided by each vendor.... Cloud computing describes the storage of data through internet connections....
9 Pages (2250 words) Research Paper

Designing a database to manage references for a protein structure data set using MySQL

Different aspects of the database are considered for creating models such as logical and physical model diagrams.... The application should be designed such that, on a user level it provides data management across the various database domains shared, by using a schema that allows the required data processing.... The data is manipulated through applications that access the database in the database management system.... The logical schema is constructed as a model independent of the management system and other physical considerations....
16 Pages (4000 words) Essay

Role of Information and Communication Technology

The definition of knowledge is based on the sequential definitions of data and information (Barnes, 2001).... The scope of Information and Communication Technology (ICT) encompasses creation, organization, management and communication of… Knowledge management goes a step further.... Of crucial interest here is the role that ICT has to play in the management of knowledge.... Is Knowledge management entirely out of the scope or reach of ICT?...
6 Pages (1500 words) Essay

Data Encryption

n case of business working this system offer more enhanced features plus aspects of data encryption in case when the system is Logged-off or turned on.... on laptops, desktops as well as removable… This system offers business a centralized management of operations that is possible through the regular, centralized strategy enforcement by means of single web-based organization console for the entire users. PassMonster is able to carry out the insoluble job of data Encryption By Software Brief of the program and what it claims to do Specific business needs being addressed by program and value delivered by itYour reasons why you decided to check it out (first impression)Your overall evaluation of it, to the degree that you can judge; is it something youd use?...
3 Pages (750 words) Essay

Talent Management In Abu Dhabi Aircraft Technologies

The research "Talent management in Abu Dhabi Aircraft Technologies" recommends that ADAT develop a comprehensive framework for Talent management that entails organizational structure and job positions, business goals and future prospects, and employee relations.... hellip; This study evaluates the Talent management process at Abu Dhabi Aircraft Technologies, UAE and assesses the effectiveness of the program and its impact on the employees.... office of personnel management and other global organization like deloitte and CIPD etc, have revealed that organizations that have satisfied and happy employees were able to be more effective and perform better on indices like sales, revenue generation, customer satisfaction and customer loyalty....
69 Pages (17250 words) Dissertation

Three Level Architecture

Database management Systems or DBMSs are mission-critical and complex applications.... Users are sovereign of the storage issues similar to indexing limitations etc of the database.... The conceptual architecture of the database has no influence because of the transform of the physical storage systems.... Every user is able to access the data as of his/her necessities.... That is the one associate with the mode in which the data is observed through particular users....
10 Pages (2500 words) Essay

Organization's Security System

hellip; Loss of data can bring great losses and connectivity challenges may bring great setbacks to such systems.... Disaster monitoring and testing in an organization require an emphasis on four important aspects of the technology used in an organization (Kunz, Reiner, and Gold, 2014).... nbsp;The ever-changing virtual environment at the places of work makes the process of disaster management quite challenging for most organizations in the current society....
2 Pages (500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us