2.5 Given a scenario, implement cybersecurity resilience. Flashcards
The implementation of alternate means to perform work tasks or accomplish IT functions to support or maintain availability of a resource or service. Redundancy helps reduce single points of failure and improves fault tolerance.
Redundancy
The ability of a network, system, or computer to withstand a certain level of failures, faults, or problems and continue to provide reliable service. Fault tolerance is also a form of avoiding single points of failure.
Fault Tolerance
Redundancy is improved when this is used to place more physical distance between duplicate systems.
Geographic disposal
This high availability solution employs multiple hard drives in a single storage volume with some level of drive loss protection.
RAID
An implementation where multiple pathways are provided between the CPU/RAM and the storage devices.
Multipath
Used to spread or distribute network traffic load across several network links or network devices.
Load balancers
The bonding, binding, or grouping of two or more NICs together to act as a single connection to the network.
NIC Teaming
The duplication of data between two locations.
Replication
The only means of insurance available to your data resources in the event of a loss, disruption, corruption, intrusion, destruction, infection, or disaster.
Backups
Copies all files to the backup media regardless of the archive bit setting.
Full backup
Copies only those files with a set or flagged archive bit. It clears or resets the archive bit, thus selecting only those files that are new or that have changed.
Incremental backup
Copies only those files with a set or flagged archive bit. It doesn’t alter the archive bit, thus selecting only those files that are new or that have changed.
Differential backup
A copy of the live current operating environment.
Snapshot
A computer system that does not allow, support, or retain changes.
Non-persistence
A type of backup or recovery process that returns to a state of data before edits or changes were implemented.
Revert to known state
A concept similar to that of reverting to a known state, but the difference is that a state retention may address a larger portion of the environment than just configuration.
Last known-good confirmation (LKGC)
A portable storage device that can be used to boot a computer. It contains a read-to-run or portable version of an operating system.
Live boot media
The availability of a system has been secured to offer reliable assurance that the system will be online, active, and able to respond to requests in a timely manner, and that there will be sufficient bandwidth to accomplish requested tasks in the time required. RAID offers this solution.
High availability
The order in which a recovery effort should proceed. In most situations, when a disaster strikes, the most mission-critical business processes should be restored first.
Restoration order
Using multiple different technologies, products, and vendors to support cybersecurity resiliency.
Diversity
The use of multiple types of access controls in literal or theoretical concentric circles or layers. It should include vendor diversity and control diversity.
Defense in depth (Layered security)