This post serves as an 'interview checklist' of things that are important for a potential future penetration tester or somebody going into a cybersecurity career. This post will cover the tools I have used at university, and their place within the suite of tools one might use.
Disclosure: Some of the links below are affiliate links. This means that, at zero cost to you, I will earn an affiliate commission if you click through the link and finalise a purchase. Learn more.
You've likely heard of the 3-2-1 rule for backups. If not, it's really simple:
You want 3 copies of your data,
of these copies, 2 on different mediums (e.g., HDD/tape),
and finally there should be 1 offsite copy.
When forming your backup plan, you should consider each of these requirements, and formulate a plan for how you'll fulfill them. You also want to consider the type of data you'll be storing, how frequently it'll be accessed, and whether the data is truly irreplaceable, or something that can be re-downloaded or imported from another medium.
In this article, I'll be explaining my 3-2-1 backup solution, including the architecture, costs, and overall performance.