disaster recovery plan Flashcards
(20 cards)
What is a Disaster Recovery Plan (DRP)?
A documented process to recover IT systems and data after a disaster or major disruption.
Key components include risk assessment, recovery objectives, backup sites, and testing and drills.
What are the key components of a Disaster Recovery Plan?
- Risk Assessment
- Recovery Objectives
- Backup Sites
- Testing and Drills
These components help ensure business continuity and minimize downtime.
What does RTO stand for in the context of disaster recovery?
Recovery Time Objective
RTO defines the maximum acceptable amount of time to restore systems after a disaster.
What does RPO stand for in disaster recovery?
Recovery Point Objective
RPO defines the maximum acceptable amount of data loss measured in time.
What is a Backup?
The process of creating copies of data to restore it in case of loss or corruption.
Best practices include regular backups, offsite storage, incremental and full backups, and encryption.
What are the best practices for data backup?
- Regular Backups
- Offsite Storage
- Incremental and Full Backups
- Encryption
These practices help protect against data loss and facilitate quick restoration.
What is an Uninterruptible Power Supply (UPS)?
A device that provides temporary power during outages or voltage fluctuations.
Key features include battery backup and surge protection.
What are the key features of a UPS?
- Battery backup
- Surge protection
These features prevent data loss and hardware damage during power interruptions.
What is the purpose of Surge Protectors?
Devices that protect electrical equipment from voltage spikes.
They absorb excess voltage to prevent damage to connected devices.
What is a Firewall?
A security system that monitors and controls incoming and outgoing network traffic based on predefined rules.
Types include hardware firewalls and software firewalls.
What are the two types of Firewalls?
- Hardware Firewalls
- Software Firewalls
Hardware firewalls protect entire networks, while software firewalls provide control on individual devices.
What is Authentication?
Verifying the identity of users or devices before granting access to systems or data.
Methods include usernames and passwords, key cards, and biometric devices.
What are some methods of Authentication?
- Usernames and Passwords
- Key Cards
- Biometric Devices
Multi-factor authentication enhances security.
What is Encryption?
The process of converting data into a coded format to prevent unauthorized access.
Use cases include encrypting data at rest and in transit.
What is Intrusion Detection Software (IDS)?
Tools that monitor network or system activities for suspicious behavior or policy violations.
Types include Network-Based IDS (NIDS) and Host-Based IDS (HIDS).
What are the types of Intrusion Detection Software?
- Network-Based IDS (NIDS)
- Host-Based IDS (HIDS)
NIDS monitors network traffic, while HIDS monitors individual devices.
What is Antivirus Software?
Programs designed to detect, prevent, and remove malware (e.g., viruses, worms, ransomware).
Features include real-time scanning and regular updates.
What are Audit Trails?
Records of system activities that provide a chronological log of events.
Use cases include tracking user actions and supporting forensic investigations.
What are Transaction Logs?
Records of all transactions performed within a system or database.
They ensure data integrity and facilitate troubleshooting.
What is a key strategy for maximizing risk mitigation?
Adopt a layered approach by combining multiple strategies.
Examples include using firewalls with IDS and implementing encryption and authentication.