Home Backup terms

23 terms

Backup terms

Backup terms define ways to create recoverable copies of data, allowing you to bounce back from loss or ransomware. Knowing backup terminology helps you meet RPO/RTO targets, apply the 3‑2‑1 rule, use snapshots and immutability, and test restores with confidence.

Bare Metal Restore

A bare metal restore is the act of restoring a computer system from scratch — starting with an entirely empty (or "bare") hardware setup.

Volume Shadow Copy Service

Volume Shadow Copy Service is a Windows feature that allows for the creation of snapshots (or “shadow copies”) of data, even while files are in use.

Virtual tape library

A virtual tape library (VTL) is a storage system that mimics a physical tape library — only it uses a hard disk or other storage media.

Synchronization

Synchronization refers to the process of coordinating and aligning data between different devices, programs, or locations to ensure that they have the same up-to-date information.

Shadow copy

Shadow copy is a technology operating systems use to create backup copies or snapshots of computer files and folders at specific points in time.

Selective backup

Selective backup is a way of backing up data where only specific files, folders, or data sets are chosen to be copied and stored rather than all the data there is.

Robocopy

Robocopy is a command-line tool for file replication.

Network backup

Network backup refers to the process of backing up data from multiple networked devices to a shared storage device or backup server.

The importance of backup terminology

Understanding backup terms shows how data protection is planned, scheduled, stored, and verified across devices and clouds.

Know what to do

This glossary offers practical, high‑level guidance on planning your backup approach. Know what needs protecting, how often to copy it, and where those copies should live.

Understand how backups work

Learning the basics of how copies, history, and recovery fit together helps you reduce the risk of data loss, shorten downtime when something goes wrong, and keep your work moving without unnecessary complexity.

Defend against ransomware

Get simple principles for keeping trustworthy copies separate from everyday systems, limiting the impact of an incident, and practicing recovery helping you to respond to ransomware and other disruptions with confidence.

Two women learning cybersecurity terminology.

Online security starts with a click.

Stay safe with the world’s leading VPN

Can’t find an answer to your question?

Ask the questions that matter to you — and get answers from our cybersecurity experts.