Recovery procedures
Recovery procedures: A set of actions that are taken in the event of a disaster or other catastrophic event to ensure the continuation of critical business functions. Recovery procedures are used in disaster recovery planning and business continuity planning. Examples include having backup power generators, implementing data backups, and having a communication plan in place.
Recovery testing
Recovery testing: The process of simulating a disaster or other catastrophic event in order to validate the effectiveness of the recovery procedures and strategies. Recovery testing is used in disaster recovery planning and business continuity planning to ensure that the recovery procedures and strategies are effective and can be implemented successfully. Examples of recovery testing […]
Recovery Time Objective (RTO)
Recovery Time Objective (RTO): The maximum amount of time a business or organization can afford to be without a specific IT service or system after a disaster or outage. It is used in business continuity and disaster recovery planning. Examples include a company’s RTO for their email system being 12 hours, their database system being […]
RAID 51 (5+1)
RAID 51 (5+1): A RAID configuration that combines the features of RAID 5, which uses parity-based redundancy for fault tolerance, with RAID 1, which mirrors data for redundancy. This setup requires at least six drives and offers enhanced data protection by creating mirrored pairs of RAID 5 arrays.
RAID 6 (Striping with Double Parity)
RAID 6 (Striping with Double Parity): Similar to RAID 5 but with additional fault tolerance, RAID 6 uses two sets of parity data, allowing it to withstand the failure of two disks. This setup requires a minimum of four disks and is used in environments where data availability and integrity are critical, despite the slight […]
Ransomware
Ransomware: A type of malicious software designed to encrypt a victim’s files, rendering them inaccessible until a ransom is paid. Commonly distributed through email phishing scams or malicious website downloads, ransomware often targets individuals and businesses. Notable examples include the WannaCry attack in 2017, the CryptoLocker attack in 2013, and the Ryuk attack on RR […]