Resilience Engineering Flashcards

1
Q

Recognition strategy

A
  • Detecting the symptoms of a problem that may lead to system failure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Resistance strategy

A
  • Invoking actions that reduce the probability that a system will fail after a problem of cyberattack has been detected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Recovery strategy

A
  • Critical services are restored as quickly as possible so that the consequences of a failure or cyberattack are minimized.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Reinstatement strategy

A
  • All system services are restored and the system brought back to normal operation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cybersecurity

A
  • Sociotechnical issue
  • Protection of citizens
  • Protection of businesses
  • Protection of critical infrastructures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cybersecurity threats

A
  • Threats to confidentiality of assets
  • Threats to integrity of assets
  • Threats to availability of assets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Two approaches to human errors

A
  • Person approach
  • System approach
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Latent conditions

A
  • Vulnerabilities and weaknesses in a system, that at some stage, may contribute to system failure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Active failures

A
  • Some operational event or human error that triggers a sequence of events that could lead to system failure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Swiss cheese model

A
  • Defensive layers have vulnerabilities.
  • Vulnerabilities are dynamic.
  • Failure occurs when holes line up.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Operational processes

A
  • Processes for using the system
  • Important defense mechanism
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Coping with failures

A
  • Design operational processes to be flexible and adaptable.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Critical service identification

A
  • Services that must always be available to a system to be usable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Diverse barriers in a system

A
  • Close holes and reduce the chance of holes lining up.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Defensive layers

A
  • Use redundancy and diversity to create a set of defensive layers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly