Databases Reference
In-Depth Information
Extended down
time possible
Yes
Tape Backup
No
Fault Tolerance
Required
Yes
No
Tape Backup and low
and Raid 0.5 or
duplexing
24 x 7 Operation
Yes
No
Employ multiple drive
arrays and or
replication, consider a
partioned architecture
for a distrubited
environment
Can any down time
be tolerated
Yes
No
Employ a cluster
architecture
Exhibit 51-4. Decision tree for selecting desired level of protection.
firewall combinations and proxies, it is possible to segregate the database
carefully from the publicly exposed portion of a network. This allows con-
struction of unidirectional paths into and out of the database that cannot
be easily compromised.
CONCLUSION
In the author's experience, there is never too much protection, only too
little. Having a well-thought-out backup-and-recovery procedure in place
will save time, money, and embarrassment when things go wrong. All of the
topics examined within the body of this article detail methods that can be
used to safeguard corporate databases or any other system, for that mat-
ter. Readers should pick and choose the pieces that best suit their needs
when building a fail-safe environment.
Search WWH ::




Custom Search