Know and understand the characteristics of backing (secondary) storage, its uses, media, advantages/disadvantages and how it differs from internal (primary) memory.
1. What is Backing Storage and Why Is It Needed?
Backing storage (also called secondary storage) is non‑volatile memory that retains data when the computer is powered off.
It provides the large‑capacity, permanent repository for operating‑system files, applications, user data and backups that cannot be held in the limited, volatile primary memory (RAM).
In a typical system the hierarchy is: CPU → Cache → RAM (primary) → Backing storage (secondary) → Archive/Cloud.
2. Families of Backing Storage (Syllabus 1.3 – Section 3)
Magnetic storage – Hard‑disk drives (HDD), Magnetic tape (LTO)
Durability: No moving parts, but easy to lose or physically damage.
Typical uses: Portable data transfer, small backups, camera storage.
Cost: ≈ $0.10 per GB.
Advantages/Disadvantages: See Table 4.
7. Emerging Technologies – Impact (Syllabus 1.5)
Recent advances such as NVMe SSDs, cloud‑based object storage, and AI‑driven data deduplication are increasing the speed and efficiency of backing storage while reducing physical footprints. In schools and businesses these trends mean faster access to large data sets, more reliable automated backups, and a shift toward “storage as a service” rather than on‑site hardware.
8. Physical Safety of Storage Devices – Syllabus 8.1
Handle HDDs and SSDs by the edges; avoid dropping or exposing them to strong magnetic fields.
Store optical discs in protective cases, away from direct sunlight and extreme temperatures.
Keep tape cartridges upright in a climate‑controlled vault; never bend or crush the tape.
Before inserting or removing flash drives, discharge static electricity by touching a grounded metal object (static discharge can corrupt flash memory).
Keep all storage media away from fire sources; consider fire‑proof safes for critical backups.
9. Data Protection & e‑Safety – Syllabus 8.2
Key points for students
Encrypt sensitive data on removable media (e.g., BitLocker, VeraCrypt).
When a device is no longer required, securely erase it (overwrite, degauss magnetic media, manufacturer’s Secure Erase for SSDs).
Comply with data‑protection legislation (e.g., GDPR): store personal data only as long as necessary and keep it protected.
Maintain regular backups on a separate device or cloud service (the 3‑2‑1 rule).
Assessment Objective Checklist (AO) – This section covers:
AO1 – Recall: definitions of volatility, encryption, secure erase.
AO2 – Apply: choose appropriate protection measures for a given storage medium.
AO3 – Analyse: evaluate the adequacy of a backup strategy against data‑protection regulations.
10. Security Threats to Data – Syllabus 8.3
Malware / ransomware – encrypts files on HDDs, SSDs, NAS and removable media.
Physical theft – loss of laptops, external drives, USB sticks.
Accidental deletion / formatting – mitigated by versioned backups.
Data corruption – caused by power surges, magnetic interference, or flash‑cell wear.
Simple mitigation steps (AO2):
Install and keep anti‑virus/anti‑malware software up to date.
Use strong passwords and encryption for all removable media.
Store critical devices in locked cabinets or use cable locks.
Perform regular integrity checks and keep at least two independent backups (3‑2‑1 rule).
11. Storage in the Systems Life‑Cycle – Syllabus 7
Analysis – Identify data volume, speed requirements and budget.
Design – Specify type and capacity (e.g., “1 TB HDD for archive, 512 GB SSD for OS”).
Implementation – Install devices, configure RAID or backup software.
Testing – Verify read/write performance, run error‑checking, confirm restore from backup.
Documentation – Record specifications, serial numbers, warranties, backup schedules.
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources,
past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.