- Recovery procedures A set of actions that are taken in the event of a disaster or other catastrophic event to ensure the continuation of critical business functions. Recovery procedures are used in disaster recovery planning and business continuity planning. Examples include having backup power generators, implementing data backups, and having a communication plan in place.
- Recovery Procedures and Site Strategies Actions and plans designed to restore business operations after a disaster, incorporating both on-site preparations like backup generators and off-site solutions such as redundant infrastructure. Effective disaster recovery involves data backups, clear communication protocols, and reliable recovery sites equipped with failover capabilities. Regular testing ensures these strategies can promptly reactivate critical functions, minimizing downtime and data loss.
- Recovery testing The process of simulating a disaster or other catastrophic event in order to validate the effectiveness of the recovery procedures and strategies. Recovery testing is used in disaster recovery planning and business continuity planning to ensure that the recovery procedures and strategies are effective and can be implemented successfully. Examples of recovery testing include disaster recovery drills, tabletop exercises, and full-scale tests.
- Recovery Time Objective (RTO) The maximum amount of time a business or organization can afford to be without a specific IT service or system after a disaster or outage. It is used in business continuity and disaster recovery planning. Examples include a company's RTO for their email system being 12 hours, their database system being 24 hours, and their web server being 36 hours.
- Red team A team of individuals who simulate an adversary or attacker in order to test the security defenses of an organization. Red Teams are used in cybersecurity to identify weaknesses and vulnerabilities in an organization's security posture. Examples of Red Team activities include penetration testing, social engineering attacks, and simulated cyber-attacks.
- Reducing risk The process of identifying, assessing, and mitigating risks in order to protect an organization from potential threats and vulnerabilities. Reducing risk is an important part of cybersecurity, as it helps organizations prevent, detect, and respond to potential security incidents. Examples of risk reduction strategies include implementing strong passwords, conducting regular security audits, and implementing security awareness training for employees.
- Redundancy The duplication of critical components or systems in order to provide backup in the event of a failure or outage. Redundancy is used in disaster recovery planning and business continuity planning to ensure that critical systems and functions can continue to operate in the event of a disaster. Examples of redundancy include having multiple servers, having backup power generators, and implementing data backups.
- Redundancy Check A process used to ensure data integrity during storage or transmission by including additional data (such as parity bits or checksums). This added data allows the detection and sometimes correction of errors that may have occurred, enhancing the reliability of the data being delivered or retrieved.
- Redundant Array of Independent Disks (RAID) A method of storing the same data in different places on multiple hard disks or solid-state drives to protect data in the case of a drive failure. Depending on the RAID level used, the benefits can include increased data reliability, improved system performance, or a combination of both. The RAID level chosen depends on the specific needs and resources of the organization.
- Redundant Server A backup server that duplicates the functions and data of a primary server. It is typically kept in standby mode and is designed to take over immediately in the event of a failure or downtime of the primary server, ensuring minimal or no disruption to the services. This level of redundancy is a vital part of maintaining high availability and disaster recovery capabilities in a network environment. It provides an additional layer of protection against data loss and service interruptions.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.