7- Digital Resilience (D.R) Flashcards

1
Q

What is digital resilience?

A

The ability of digital environments to withstand and recover from cyber attacks or hardware failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is it important to ensure digital environments are resilient?

A

We rely on digital systems for many aspects of our daily lives, including communication, banking, shopping, and learning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the impacts on organisations and stakeholders if digital resilience isn’t achieved?

A

Loss of critical business data and customer information due to hardware failures, human errors, or cyber attacks.

Significant financial loss due to costs to repair or replace damaged systems, and potential fines for not complying with regulations, affecting the business’s ability to invest in future growth and retain employees.

Reputation damage as customers and partners will lose trust in its ability to safeguard their data, leading to loss of business and long-term damage to the organisation’s brand and credibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What methods are used to improve the resilience of digital environments?

A

Data and system redundancy

Back-up systems

Hot, cold and warm sites

Data back-up and recovery procedures

Device hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is data and system redundancy?

A

Creating multiple copies of data or systems to ensure reliability and availability during a failure or disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is hardware redundancy?

A

Duplicating hardware components, like servers and storage devices, to provide backup in case of a failure, so if one component fails, another can take over instantly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is software redundancy?

A

Duplicating software systems to ensure continuous operation and fault tolerance in case of failures or errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the benefits of data and system redundancy?

A

Improves fault tolerance because redundant systems continue to work even if other components stop working, ensuring reliability and efficiency.

Enhances data protection because if one copy is lost or corrupted, there are backups available, reducing the risk of data loss and increasing data reliability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the drawbacks of data and system redundancy?

A

It’s costly as duplicating hardware and software requires additional storage components.

management is difficult as they require all copies of data and components to be in sync so they all have the same information at the same time, preventing data loss and corruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the benefits of back-up systems?

A

Data protection regularly copying important info reduces the chances of data loss during security breaches or hardware failures, ensuring data is still accessible even if something goes wrong.

Allows faster recovery and restoration of data and systems after a failure,
minimised downtime as organisations have copies of their data and systems stored securely which allows them to resume normal operations instantly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the drawbacks of back-up systems?

A

Require large storage capacities as they store multiple copies of data, which accumulate over time.

Time-consuming to create and manage backups as it involves scheduling when they occur, ensuring they’re stored in the right place, and verifying the accuracy and reliability of the backup copies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are back-up systems?

A

Secondary copies of data, hardware components, or applications created on-site or off-site to restore information if it’s lost or damaged, providing redundancy and ensuring data availability in case of failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are data backup and recovery procedures?

A

Regularly creating copies of important data and storing them securely in separate locations with a systematic process to restore the data when needed, protecting against data loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are two benefits of data backup and recovery procedures?

A

Minimises data loss through copies of important data, so they can be used to restore lost data, ensuring critical data is still accessible, so business operations aren’t stopped.

Reduces downtime as backups are readily available, so organisations can quickly recover from hardware failures or security breaches, reducing the time taken to restore critical data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are two drawbacks 🔙 of data backup and recovery procedures?

A

Resource-intensive as backing up large volumes of data requires lots of storage space, increasing operational costs as organisations have to invest in more storage to accommodate the growing volume of backup data through regular backups.

Complex to manage as backup tasks need to be scheduled across multiple systems, ensuring data integrity, and backup systems need to be regularly checked if they work well by people with expertise in backup technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is device hardening?

A

Strengthening the security of a device by reducing its vulnerability to security threats, through data encryption to protect against data breaches, and implementing strong authentication and access controls to prevent unauthorised access.

17
Q

What are two benefits of device hardening?

A

Enhances security by strengthening defenses against threats through measures like keeping software and firmware up-to-date to address known vulnerabilities, reducing the device’s vulnerability to exploitation.

It makes devices compliant to security standards and regulations, maintaining trust with stakeholders, and reducing the risk of penalties for non-compliance.

18
Q

What are two drawbacks of device hardening?

A

time and resource-intensive as it involves identifying and addressing vulnerabilities, applying security measures and more to ensure the device remains secure against potential threats.

Impacts performance as it involves implementing additional security, which slows down the device, affecting it’s performance and how well it runs certain programs.