Lab 3.docx - Joseph Butler(Acronis True Image 2018 is...

This preview shows page 1 - 3 out of 9 pages.

Joseph Butler(Acronis True Image 2018 is available for release but not enough is known about it nor has it been validated against any other software through its capabilities that are listed)Title: Back up a System with Acronis True Image Tool Identification: Acronis True Image 2017 Description of the Tool: Publisher: AcronisAcronis True Image is a software suite that guarantees and can satisfy the need at Sifers-Grayson to keep the data on a computer secured, protected, and backed up. Acronis True Image creates backups of all data including: email, all partitions or selected individual partitions, disk drives [in entirety if needed], pictures, documents, applications, settings, and the operating system. Arconis is also capable of recovering and restoring in case of data loss in the backup, accidental deletion, attack, and a disaster.Features: Hard disk cloning: a process which allows for the copying of the data on a HDD to place on a new HDD (usually larger or significantly larger) without the reinstallation process (todo-backup.com)Data Protection: This includes Acronis’ Security Dashboard, Artificial Intelligence-based defenses, and Active ProtectionDisk backup to local storage / Acronis Cloud File backup to local storage / Acronis Cloud 1
Data archiving: process of moving information or data (usually old or not actively being used overtime) to another storage device such as a Portable HDD or to cloud storage.Capabilities:Ransomware protectionCreate bootable media Backing up all data on a PCCloning hard drivesRecovering files and foldersThe features and capabilities of Acronis True Image pertain to the backing, recovery and restoration, and the protection of data. Their anti-ransomware software monitors running processors and procedures on your computer by conducting a real-time detection mechanism for ransomware. Acronis can also notarize files for backup. It’s a process of creating and sending a hash code of a file (which contains an arbitrary set of data) to Acronis Notary service to store. The hash is then used a reference on if the integrity of a file is kept or if the file is authentic or not. The data protection including Acronis’ Security Dashboard, Artificial Intelligence-based defenses, and Active Protection also works on smartphones and tablets.Typical Uses for Incident Response: The preparation phase in the incident response recovery process requires readiness of assets around a system in the (hopefully not occasional) incident of disaster or data failure

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture