World's most popular travel blog for travel bloggers.

What are different recovery procedures in security implementation? Discuss


Backup and Recovery Procedures


Disaster recovery (DR) security issues pop up frequently in the IT industry. Storage managers often cover the basic security measures in their environment, but that's often not enough; data security issues must be addressed in IT disaster recovery plans. Also, storage managers should always look at data security from the perspective of a malicious attacker. With these two strategies, companies can better recover their systems if they're attacked and/or go down.


The most critical file is the Security File itself. CA Top Secret has an automatic backup feature that is set to copy the Security File to a DASD backup file daily, at 1:00 a.m. by default. This Backup File is critical to the built-in recovery capability. You can change the time of backup or deactivate the automatic backup through the BACKUP control option. Also, a backup can be taken at any time from the console using the BACKUP control option. In a shared environment, a backup is only active on one system

CA Top Secret also includes a recovery mechanism based on the DASD backup and the Recovery File. This procedure is implemented and tested before serious security maintenance begins so that all Security File updates can be recovered. We recommend using backup and recovery procedures to protect your CA Top Secret Security File. These procedures were designed for quick, accurate, and dependable recovery.

Operator Training

When setting up the backup and recovery procedures, you may also take time to train key operations personnel in the use of the backup and recovery routines so that they are prepared to execute them when necessary. Emergencies do not present the appropriate opportunity for training.

Candidates for Offsite Storage

As with all critical files used in your installation, all of the following CA Top Secret files must be backed up to tape daily, and may be candidates for offsite storage:

  • Security File
  • Security File backup
  • Recovery File
  • Audit/Tracking File
  • Parameter File

Offsite storage protects these files if your data center experiences a major disaster.

We recommend that the Security File reside on a different volume and string than that of the Backup and Recovery Files. This allows you to use the Backup and Recovery Files to quickly and easily circumvent minor hardware problems that affect access to the Security File.


  1. Where is the answer of this question
    Plzz dont make us fool

    1. bachwa, free me jan leba ka.. waisne bhaiya mehnat karat hain, ab rahal deba.. etanai bahut hai


Let us know your responses and feedback