23 terms
Backup terms
Backup terms define ways to create recoverable copies of data, allowing you to bounce back from loss or ransomware. Knowing backup terminology helps you meet RPO/RTO targets, apply the 3‑2‑1 rule, use snapshots and immutability, and test restores with confidence.
Bare Metal Restore
A bare metal restore is the act of restoring a computer system from scratch — starting with an entirely empty (or "bare") hardware setup.
Volume Shadow Copy Service
Volume Shadow Copy Service is a Windows feature that allows for the creation of snapshots (or “shadow copies”) of data, even while files are in use.
Virtual tape library
A virtual tape library (VTL) is a storage system that mimics a physical tape library — only it uses a hard disk or other storage media.
Synchronization
Synchronization refers to the process of coordinating and aligning data between different devices, programs, or locations to ensure that they have the same up-to-date information.
Shadow copy
Shadow copy is a technology operating systems use to create backup copies or snapshots of computer files and folders at specific points in time.
Selective backup
Selective backup is a way of backing up data where only specific files, folders, or data sets are chosen to be copied and stored rather than all the data there is.
Robocopy
Robocopy is a command-line tool for file replication.
Network backup
Network backup refers to the process of backing up data from multiple networked devices to a shared storage device or backup server.
Incremental backups
Incremental backups are a type of backup that only creates copies of data that has changed or recently created.
Hot spare
A hot spare is a backup component or device that is kept ready and available to replace a failed or faulty component in a system.
Disk-to-disk-to-cloud
Disk-to-disk-to-cloud is a hybrid data storage strategy.
Disk cloning
Disk cloning is the process of creating a replica of a computer's hard drive, including data on the drive, operating system, applications, system settings, and personal files.
Data vaulting
Data vaulting is a type of data backup strategy that involves copies of important data stored in an offsite location, usually a secure facility operated by a third-party provider.
Data resiliency
Data resiliency refers to a company’s readiness to quickly recover data access and functionality after significant events such as hardware failure or even a cybersecurity incident.
Data replay
Data replay is a process that creates ongoing data snapshots, enabling data backup and restoration.
Data Protection as a Service
Data Protection as a Service (DPaaS) refers to a cloud-based service that provides protection against data loss by offering backup, recovery, and archiving solutions.
Data loss
Data loss is the unintentional or accidental loss of data stored on electronic devices (e.g., computers, mobile phones, or hard drives).
Data backup
Data backup refers to the practice of copying data from a primary to a secondary location so a user or organization can retrieve it after a data loss event.
Computer imaging
In terms of cybersecurity, computer imaging can be explained as creating and storing complete backups or various snapshots of a computer's hard drive.
Cold standby
A cold standby is a backup system in case the main one stops working.
Bak file
A bak file is a file saved with the .bak extension created for the purpose of backing up other data.
Backup as a Service
Backup as a Service (BaaS) is a cloud-based solution that offers businesses automated and scalable data recovery.
The importance of backup terminology
Understanding backup terms shows how data protection is planned, scheduled, stored, and verified across devices and clouds.
Know what to do
This glossary offers practical, high‑level guidance on planning your backup approach. Know what needs protecting, how often to copy it, and where those copies should live.
Understand how backups work
Learning the basics of how copies, history, and recovery fit together helps you reduce the risk of data loss, shorten downtime when something goes wrong, and keep your work moving without unnecessary complexity.
Defend against ransomware
Get simple principles for keeping trustworthy copies separate from everyday systems, limiting the impact of an incident, and practicing recovery helping you to respond to ransomware and other disruptions with confidence.
Online security starts with a click.
Stay safe with the world’s leading VPN
Explore related glossary categories
Can’t find an answer to your question?
Ask the questions that matter to you — and get answers from our cybersecurity experts.