Explain how the complementary strategies of resistance, recognition, recovery and reinstatement may be used to provide system resilience.

What will be an ideal response?


System resilience reflects a system’s ability to maintain its critical services in the
face of adverse external events such as system failures or cyberattacks.
1. Resistance. Resistance is concerned with trapping an external event or
attack before it damages the system. Improving resistance leads to a more
resilient system as it reduces the number of possible events that can
compromise the system’s services.
2. Recognition. Recognition is concerned with recognising either that there has
been an adverse external event that may compromise the system or that the
system has already been damaged by such an event. Early recognition can
mean that sociotechnical approaches can be used to minimize the
consequences of the event or that recovery strategies can be immediately
invoked to restart the system’s essential services.
3. Recovery. Recovery is concerned with getting critical services back up and
running as quickly as possible. Contributes directly to resilience as it is
concerned with ensuring that critical services are maintained.
4. Reinstatement. Reinstatement is concerned with getting the system back to
its normal operating state after an adverse event or sequence of events. This
also contributes to resilience because it is often the case that critical services
may use less critical services and without these services, the system is less
efficient.

Computer Science & Information Technology

You might also like to view...

The National Institute of Standards and Technology chose the __________ design as the winning candidate for AES.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Sid2User, UserInfo, and UserDump are examples of password cracking tools

Indicate whether the statement is true or false.

Computer Science & Information Technology

__________ encompasses a requirement that the implemented standards continue to provide the required level of protection.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When opened, how does a book file appear in InDesign?

A. as a dialog box B. as a panel C. as a library D. as part of the Pages panel

Computer Science & Information Technology