Microsoft Word Hardware Reconfiguration Methodology V final2


Download 242.15 Kb.
bet44/70
Sana02.04.2023
Hajmi242.15 Kb.
#1321952
1   ...   40   41   42   43   44   45   46   47   ...   70
Bog'liq
LInux1

Testing


Before actually proceeding with any backup or restoration, it is important that both sets of procedures be adequately tested ahead of time in order to ascertain the applicability and efficacy of the procedures to adequately safeguard the data and the systems. In addition, the backup and restoration procedures should be tested and verified in order to determine that they do in fact


work within the organization’s operational environments and conform to policy. The procedures should also be periodically retested to verify that they continue to conform to the operational environment and policy as changes can be made to the environment without the administrator’s knowledge, input, or consent, and as such, the procedures as they stand may no longer be suitable. Testing should always be done in a controlled laboratory or environment where changes can be made to the systems and network without affecting the operational network. However, once the tests and procedures have been tested and are considered ready for use, they should then be briefly tested on the operational network. The operational network test should consist of a short series of trial runs to determine if several of the most likely to be used procedures will work under varying conditions. However, this can only be done if the operational environment and organizational policy permit this and the affected systems can be taken offline, otherwise, laboratory-based testing will suffice. Once most or all of the tests are conclusive then the procedures can be rolled out into the operational environment.


    1. Summary


As examined, performing data backups and restorations can be both a cumbersome and time- consuming process. There are many issues and sources of potential complication that must be analyzed and contended with before actually implementing and proceeding with any specific backup or restoration. After having read this section the reader should be ready to develop his own backup and restoration methodology. However, it is important to bear in mind that any methodology that is developed should always be specific to the organization’s requirements, policies, computer and operating systems.

In attempting to determine the necessary backup and restoration methodology, it is possible that much trial and error will be required in order to determine the best overall approach. Furthermore, until such time that a definitive backup and restoration policy and methodology are in place it may make more sense to use more than one type of backup tool and media until an appropriate combination is found that works and fits within the operational context as defined by the various requirements. In addition, the type of backup tool, the media to be used, as well as the type of data, and its size will largely determine the overall methodology and approach that will be used and implemented.



  1. Methodology II system maintenance steps and

procedures

    1. Download 242.15 Kb.

      Do'stlaringiz bilan baham:
1   ...   40   41   42   43   44   45   46   47   ...   70




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling