Backups
Backups are the practice of copying and archiving data so that it may be restored to its original state after a data loss event.
Backup Types: 1. Full: Copying all data (slow, high storage). 2. Incremental: Changes since last backup (fast, low storage). 3. Differential: Changes since last FULL backup. Recovery metrics: RPO (Data age limit) and RTO (Recovery time limit). Features: Deduplication, Compression, Encryption, Verification.
graph LR
Center["Backups"]:::main
Pre_distributed_computing["distributed-computing"]:::pre --> Center
click Pre_distributed_computing "/terms/distributed-computing"
Rel_stream_processing["stream-processing"]:::related -.-> Center
click Rel_stream_processing "/terms/stream-processing"
Rel_data_warehouse["data-warehouse"]:::related -.-> Center
click Rel_data_warehouse "/terms/data-warehouse"
classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
linkStyle default stroke:#4b5563,stroke-width:2px;
🧒 5 yaşındaki gibi açıkla
A backup is like a 'Save Game' in a video game. If your character dies or something goes wrong, you can go back to your last save and start again from there. In the real world, it's making a copy of your important photos and files so that if your computer breaks, you don't lose everything forever.
🤓 Expert Deep Dive
Enterprise backup architectures follow the '3-2-1 Rule': 3 copies of data, on 2 different media types, with 1 copy held off-site. Technically, this involves 'Block-level incremental' backups which only transfer changed blocks of a file to save bandwidth and storage. Modern cloud-native backups leverage 'Snapshots' (an instantaneous state of the system) and 'Object Versioning'. To defend against ransomware, 'Immutable Backups' are used, which employ a Write-Once-Read-Many (WORM) policy, ensuring that even if an attacker gains admin access, they cannot delete or encrypt the existing backup files.