Skip to main content

让我们复习一下备份的 321 原则,

 

三份数据拷贝:
除了原始的数据之外,要另存两份数据的备份。倘若这三个拷贝丢失的概率相互独立(
均为 1%),那么三份拷贝同时丢失的概率就仅有 0.0001% 了,这比两个拷贝同时丢失
的概率更低。


两种存储介质:
在同一种类型的存储介质上的数据更有可能同时丢失。比如你在电脑的内置存储器上存
了三份数据拷贝,但如果电脑的磁盘彻底损坏、误格式化磁盘或者丢失了电脑,那么这
些数据便一同丢失了。在上述案例中,另一种类型的存储介质可以是移动硬盘、SD 卡
、U 盘、CD、DVD 等。


一个异地备份:多个备份间的物理隔离是很重要的。如果这些备份都放在一个房间里,
那么一场火灾就足以毁掉所有的备份。如果条件允许,跨城市(间隔 100km 以上)存
储备份就已经很安全了。在家和公司分别存放备份也算作异地备份。


此外也应该注意备份的时效性,如果可能,要尽量缩短备份周期。比如每分钟备份的时
效性就强于每小时备份。在数据丢失时,前者只会丢失最近 1 分钟的工作,而后者会
丢失最近 1 小时的工作。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...