Basic Awareness of Hacking Prevention:Backup and Restore

Suppose your house is burglarized today, as having superpower, you rewind time to yesterday, but if you didn’t make any changes, the same thing will happen again. You should take the opportunity to change the locks or hide the money somewhere else.

So the point of backup and restore is to make the time difference and get the system back up and running so that you have a chance to make corrections before the next attack comes. In that case, the hackers can't get in or you have already moved the data to a safe place. This article will explain how to do backup effectively from a hacker-proof perspective.

# Backup Methods

There are different ways to do backup. Many backup methods can help you in daily maintenance, but not much help in blocking hackers. Here are two recommended backup methods that are more effective against hacker attacks. However, no matter which method you choose, you should do your own research before backing up, if you are being too rush, it may be worse than not backing up. You need to pay attention to the backup methods for the important data before you do the backup.

# 1. Off-Site Backup

# Introduction:

Off-site backup simply means backup in another location, such as various kinds of cloud storage (Google Drive, MEGA, etc.) or NAS (note1). If you just back up files from C drive to D drive on your computer, it is like putting eggs in the same basket, but just moving the eggs from the left side to the right side of the basket. It does not help much to prevent hackers, and the chance of being attacked by hackers is very high. More rigid off-site backups will require the backup location to be more than 30 km away from the original work area.

# Recommendation:

# 2. Offline Backup

# Introduction:

Offline backup means the devices that store backup data are not normally connected to a networked device, but only when the backup data is needed, so that hackers do not have a chance to connect to those offline devices. The most commonly seen are various kinds of external hard drives used to store data. If there are only a small amount of data, it can also be put to USB flash drives or CDs.

Be careful to disconnect from the devices after storing the data. If you always connect the backup devices to the computer, hackers can still take the data away in one second.

# Recommendation:

# What Kind of Data Should Be Backed Up?

If we look at data backup from a hacker-proof point of view, we need to understand what kind of data hackers would like to obtain first, which can be roughly divided into 4 categories.

# 1. Account and Password

The first thing hackers look for after entering the devices is whether there is information related to the account and password. With those information, hackers can further attack other systems related to the outflow of accounts, elevate the access right or use those information to try out other services in the current environment.

# 2. Personal Information

If hackers obtain your personal information, they can further do phishing or frauds, or sell it directly to advertisers. They could even guess your account and password indirectly.

# 3. Sensitive Information

All the data that you are willing to pay for after hackers have stolen is considered sensitive data, like ransomware encrypts all documents, pictures, videos, etc. and forces you to buy a key to unlock them, or to disclose them if you refuse to pay the ransom.

# 4. Restored Files and Installation of Serial Numbers

It is common that some ransomware will force you to pay for unlocking files by affecting the system operation. If you have regularly backed up Windows restored files, other systems also have their own restored methods. As long as it helps to quickly restore the system operation, it is recommended to do backup regularly.

# Conclusion

In general, a good backup and restore cannot directly block the hacker's attacks but can minimize the impact of the attacks. Since it cannot directly block the attacks, so here we provide some key points for you to pay attention to when you want to further reduce the risks, in addition to the backup itself.

We have provided some simple examples in previous sections. In fact, there’re more advanced techniques. If there’re more views in this article, we will write other articles to share advanced techniques and examples. Feel free to comment below for any cybersecurity questions or contact us through Cymetrics website.

Note 1: NAS represents Network Attached Storage, which is a private storage device that can be placed at home or in the office. It is also a personal cloud storage device.

Tag

Recommendation

  1. Story of critical security flaws I found in Glints
  2. Cache Strategy In Backend
  3. BSides Ahmedabad CTF 2021 - entrance
  4. Java’s Thread Model and Golang Goroutine
  5. The Difference Between Java and Golang in Writing Concurrent Code to Access Shared Variable

Discussion(login required)