Implementation of Data Backup Management Based on Backup Rule 3-2-1 Strategy

  • ilpan rusilpan STMIK LIKMI

Abstract

This study concern the implementation of data backup management based on 3-2-1 backup stategy using NAS synolgy, which authenticates user access to the server using LDAP (Lightwight Directory Access Protocol) to share data centers per departmental groups. This backup management implementation is implemented at PT Leoco Indonesia where the previous backup system still uses an external 1 tera departmental hard drive and there is no file sharing, this is less effective because it often unplugs the usb hard drive and is prone to damage, the hard drive is often unreadable and data cannot be accessed. The main data on the computer was not spared from damage such as bad sectors hard disk, damaged operating system, ransomware virus attacks which resulted in disrupted work operations hampering business performance. Work data cannot be recovered quickly because there are no other backups. Moreover, data affected by the data ransomware virus cannot be repaired at all. Therefore, data backup management based on the 3-2-1 strategy is needed, to back up layered data backups. and sharing data centers using LDAP authentication, the results of this research are expected to minimize data loss, because data backups have been stored in 3 copies on 2 different types of storage media and there is 1 offsite copy, operating system backup, faster data restoration, data sharing center is running smoothly.

References

[1] M. Putra, “Implementasi Network Attached Storage (NAS) Menggunakan Synology Disk Station Manager (DSM 5.2) Untuk Optimalisasi Data Sharing Center”, [Online]. Available: http://ejournal.bsi.ac.id/ejurnal/index.php/jtk

[2] B. A. Setiawan, N. H. Sutanto, G. F. Rahman, E. Utami, and M. S. Mustafa, “Pengamanan Backup dan Restore Basis Data dengan Penambahan Enkripsi Advanced Encryption Standard (Studi Kasus: Analisis Jabatan Bagian Organisasi Kabupaten Balangan),” J. Sist. Komput. dan Inform., vol. 2, no. 3, p. 277, May 2021, doi: 10.30865/json.v2i3.2940.

[3] S. Pangestu and I. R. Widiasari, “Perancangan Cloud Storage Menggunakan Freenas Melalui Jalur Tunneling,” J. Tek. Inform. dan Sist. Inf., vol. 9, no. 2, 2022.

[4] N. S. Tajriyani, “Pertanggungjawaban Pidana Tindak Pidana Pemerasan Dengan Modus Operandi Penyebaran Ransomware Cryptolocker,” Jurist-Diction, vol. 4, no. 2, p. 685, 2021, doi: 10.20473/jd.v4i2.25785.

[5] A. Sujarwo and S. Kom, “IMPLEMENTASI NETWORK STORAGE DAN INTERNET GATEWAY MENGGUNAKAN AUTENTIKASI OPENLDAP,” 2010. [Online]. Available: http://www.mlp.de

[6] A. Rosano and D. Sudaradjat, “Manajemen Backup Data untuk Penyelamatan Data Nasabah pada Sistem Informasi Perbankan (Studi Kasus : PT Bank XYZ),” REMIK (Riset dan E-Jurnal Manaj. Inform. Komputer), vol. 4, no. 2, p. 1, Apr. 2020, doi: 10.33395/remik.v4i2.10507.

[7] E. Haryadi, dan Robi, S. Nusa Mandiri Jakarta, and K. Kunci---VMware, “Implementasi Sistem Backup Data Perusahaan Sebagai Bagian dari Disaster Recovery Plan Implementation of Corporate Data Backup Systems As Part of a Disaster Recovery Plan,” 2019.

[8] Synology MIS, 2022, [Indonesia] Backup webinar (21 Juni 2022), https://synologypm.clickmeeting.com/backup_id, diakses tanggal 21 juni 2022.

[9] Aaron Raj, 2022, Backup your data or face the consequences, https://techwireasia.com/2022/03/backup-your-data-or-face-the-consequences/ diakses tanggal 20 juli 2022.

[10] Dr Antonius Alijoyo, 2021, Manajemen Resiko Organisasi Manggunakan ISO 31000, Penerbit PT Grasindo, Jakarta.
Published
2023-03-14