7.5.2 Methods used to improve the resilience of digital environments + 7.5.3 The benefits and drawbacks of methods used to improve the resilience of digital environments Flashcards

1
Q

Fill The Blank:

Data ……………………… is where the same data is stored in multiple locations, and while it can be accidental, is often on purpose for ……………….. purposes to allow for data recovery.

A

Redundancy, Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Fill The Blank:

Another advantage of data …………………….. is that it provides a mechanism for improving the …………………. of the data because it can be …………………… across multiple sites

A

Redundancy, Compared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain:

Briefly, 2 disadvantages of data redundancy

A
  • Data redundancy can cause data inconsistency if it is stored in multiple locations but the data does not match
  • Risk of data corruption due to the transfer and/or storage of data between locations/systems
  • Additional costs required for the storage of the data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain:

Hardware redundancy

A

Consists of one or more additional compelte hardware systems (eg: additonal servers that can be used in case of failure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain:

Briefly, 3 types of redundancy

A
  • Dynamic - Where only one system is working at a time and in case of failure an additional system is started so that the business processes can continue with minimum disruption
  • Static - Where systems run in parallel, all carrying out the same processes - results are continually compared to check accuracy where in case of mismatches a predefined algorithm decides the best outcome
  • Hybrid - Combination of dynamic and static hardware redundancy

These can be applied to both hardware and software redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain:

Disadvantages of hardware redundancy

A
  • Means a more complicated system
  • Additional costs for the components involved
  • Redundant systems also have to be updated, upgraded and maintained alongside the main systems (otherwise it will become unreliable and less resilient)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain:

Software redundancy

A

Where there is additional software that can carry out the same tasks as the current software being used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain:

Back-up systems

A
  • Not just backing up data but whole system (OS, software, configs)
  • If incident occurs, business can restore system to a position prior to the incident
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

State:

3 types of disaster recovery sites

A
  • Hot site
  • Cold site
  • Warm site
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain:

Hot site

A
  • Usually in a different location and runs in parallel to the normal system
  • Replicate primary system and are usually maintained by third party (at a cost)
  • Because they run in parallel they allow prompt restoration of functionality incase of an incident
  • Because these sites have a backup of data, they allow immediate access to up-to-date data without having to source the location of any other data backups
  • Can be in the cloud
  • ‘A fully functioning, up-to-date replica in respect to equipment and data’
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain:

Cold site

A
  • Cheapest option as it does not involve all facilities needed for hot site
  • Only usually used when critical disaster occurs
  • Only a form of data center so incase of an incident technical expertise will be required to install and configure the computer equipment so that the business can continue to function
  • ‘Only have data and none of the equipment for the business environment’
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain:

Warm site

A
  • Combination of a hot and cold site
  • Digital equipment is made readily available but data must be restored onto the system
  • Cost wise is between hot and cold sites
  • ‘Contains basic equipment used in the business environment but does not include any data’
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

State:

4 types of backups

A
  • Full backup
  • Incremental backup
  • Differential backup
  • Mirror backup
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain:

Full backup

A
  • Backup of every file and folder in a system
  • More time consuming and requires sufficient space for all of the data
  • Faster when restoring lost data
  • More robust and reliable than alternatives
  • Only suitable if there is large changes to data on a regular basis
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain:

Incremental backup

A
  • After creating full backup, only backup data that has changed since last backup
  • Use less storage than full backups but use additional resources/compute to compare states of backups/data
  • More time consuming to restore data from an incremental backup than full backup because it has to analyse the data within the backup to establish the timestamp for when data changed - several incremental backups may be required to restore data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain:

Differential backup

A
  • Data initially does full backup
  • Then will only backup the data that has changed since last full backup
  • Easier to recover data as only requires full backup and most recent differential backup
17
Q

Explain:

Mirror backup

A
  • It is only a backup of the data, but entire system (OS, applications, configs)
  • If hard drive fails, new HDD can be installed and mirror backup taken from the failed drive and can be restored onto new hard drive
  • Faster than other backup types and create a ‘clean’ copy without old or outdated files and folders
18
Q

State:

4 ways that device hardening can be done

A

4 of;
* Disabling unused network ports
* Strict password management and file permissions
* Using multi-factor authentication using hardware tokens as well as passwords on networks
* Updating computer systems with security patches as they become available
* Removing all non-essential services and programs
* Setting time limits on access - can be frustrating for the user to be locked out after a short period of time because they have eg: answered a phone call

19
Q

Fill The Blank:

Device ……………………. is the methodss or processes used to eradicate any means of attack

A

Hardening

20
Q

Fill The Blank:

Careful ……………. has to take place when implementing device hardening - the implications to workflow and productivity must be considered as well as the protential for reducing the …………. surface areas of the system

A

Planning, Attack