Hardware Failure Software Corruption
Malware Attacks Human Error
Natural Disasters Power Outages
Accidental Deletion Network Failures

 

Where the software in ICT systems gets altered or damaged, causing potential data loss. The malfunction or damage of physical components in ICT systems that can lead to data loss.
Mistakes or negligence by individuals operating or managing ICT systems that may result in data loss. Malicious activities targeting ICT systems to compromise data integrity and confidentiality.
Disruptions to power supply such as immediate loss of power Issues such as floods, fires, earthquakes, and hurricanes that can cause physical destruction to ICT systems, leading to data loss.
Disruptions or malfunctions in the communication infrastructure of ICT systems that can cause data loss. The unintentional removal of important data from ICT systems that results in data loss.

 

Inadequate Backup Malware Infections
Power Outage Flood
Fire Earthquake
Hurricane Tornado

 

Malicious software programs that can infiltrate ICT systems and cause data loss. Insufficient or irregular data backup procedures in ICT systems, increasing the risk of data loss.
Overflowing of water which can damage hardware and destroy data storage devices. Loss of electricity supply which can lead to data corruption or loss.
Seismic activity that can cause physical damage to data storage infrastructure leading to data loss. Destructive blaze that can engulf data centers and destroy data stored within them.
Violently rotating column of air that can destroy buildings housing data centers resulting in data loss. Storm with strong winds and heavy rainfall that can damage data centers and cause data loss.

 

Lightning Tsunami
Wildfire Improper Data Handling
Phishing Attacks Unauthorized Access
Data Breaches Misconfiguration

 

Series of large waves caused by underwater earthquakes that can flood data centers leading to data loss. Electrical discharge during thunderstorms that can cause power surges leading to data loss.
Careless or negligent actions that lead to data loss, such as improper storage or transfer practices. Uncontrolled fire that can engulf data centers and destroy data stored within them.
When individuals or entities gain entry to a system without permission, potentially resulting in data loss or theft. Fraudulent attempts to obtain sensitive information, which can result in data loss if successful.
Errors in system setup or configuration that can lead to data loss, such as incorrect permissions or settings. Unauthorized disclosure of sensitive information, leading to data loss and potential harm to individuals or organizations.

 

Lack Of Backup Data Loss
Data Breach Financial Impact
Reputation Damage Legal Consequences
Operational Disruption Data Recovery Costs

 

The unintended loss of data or information stored on a computer or device. The absence of redundant copies of data, increasing the risk of permanent data loss in the event of a mishap.
The negative repercussions on an organization's finances due to data loss, including potential revenue loss and costs associated with data recovery. An incident where sensitive, confidential, or protected data is accessed, stolen, or used by unauthorized individuals or parties.
The potential legal liabilities faced by organizations due to data loss, including fines, penalties, and lawsuits for failing to protect sensitive information. The harm to an individual or organization's reputation caused by data loss incidents, which can lead to loss of trust and credibility.
The expenses associated with recovering lost or corrupted data, including the use of specialized software or hiring data recovery experts. The interruption or shutdown of business operations caused by data loss, leading to productivity losses and service disruptions.

 

Data Privacy Violations Customer Trust Erosion
Regulatory Non-Compliance Backup
Data Recovery Encryption
Data Backup Plan Data Integrity

 

The gradual loss of confidence and loyalty from customers due to data loss incidents, resulting in decreased sales and a damaged brand image. The infringement of individuals' privacy rights as a result of data loss incidents, leading to concerns about data misuse or identity theft.
Creating copies of data to protect against loss in case the original data is corrupted or deleted. The failure to meet legal requirements and industry standards related to data protection and security, leading to penalties and sanctions for non-compliant organizations.
The process of encoding data to make it unreadable to unauthorized users, thus protecting it from data loss. The process of restoring lost or corrupted data from backup copies or other sources.
Ensuring that data is accurate, consistent, and reliable to prevent errors and loss. A detailed strategy outlining how data will be backed up regularly to prevent loss in case of system failure.

 

Disaster Recovery Version Control
Data Archiving Redundancy
Automated Backups RAID
Parity Bits Error Detection

 

Managing different versions of data to prevent loss and track changes over time. A plan outlining steps to be taken to recover data in case of a catastrophic event like a fire or flood.
Having multiple copies of important data to ensure that it is not lost if one copy becomes inaccessible. Storing older or infrequently accessed data in a separate location to prevent loss without cluttering the primary storage.
Redundant Array of Independent Disks, a storage technology that combines multiple disks into a single unit to provide data redundancy and improve data reliability, reducing the risk of data loss. The use of automated software tools to regularly create backup copies of data.
The process of detecting and correcting errors that occur during data transmission or storage. Bits added to binary data to ensure an even or odd count of 1s.

 

Odd Parity Even Parity
Error Correction Parity Blocks
Checksum Fault Tolerance
Striping Parity Calculation

 

A method of error detection where the number of 1s, including the parity bit, is always even. A method of error detection where the number of 1s, including the parity bit, is always odd.
Blocks of data that are used for error checking and correction in a storage system. The process of detecting and correcting errors that occur during data transmission or storage using error correction codes.
The ability of a system to continue functioning properly in the event of hardware or software failures. A value calculated from the data to verify its integrity and detect errors.
The process of deriving parity information from the data blocks. A technique where data is divided into blocks and stored across multiple disks, including parity blocks.

 

Capacity Overhead Md5
CRC Echo Check
Automatic Repeat Query Retransmission
Feedback Packet Loss

 

a widely used cryptographic hash function that produces a 128-bit (16-byte) hash value The additional storage space required to store parity blocks, reducing the overall usable capacity of a RAID system.
The process of verifying the integrity of network data by sending a request packet and comparing the echoed response packet. a cyclic redundancy check algorithm used to detect accidental changes or errors in data
The process of resending data packets that have been lost or corrupted during transmission. A technique used in computer networks to handle lost or corrupted data packets by retransmitting them automatically.
The failure of one or more data packets to reach their destination due to factors like network congestion or transmission errors. Information sent from the receiver to the sender to indicate whether data packets have been successfully received or not.

 

Acknowledgment Timeout
Sequence Number Check Digit
Luhn Algorithm Full Backup
Incremental Backup Differential Backup

 

The period of time after which a sender assumes that a data packet has been lost and triggers retransmission. A signal sent by the receiver to inform the sender that data packets have been successfully received.
A digit added to a number to help detect errors. A unique identifier assigned to each data packet to ensure correct ordering and detect duplicate packets.
A type of backup that copies all data from a source to a storage medium. A mathematical formula used to validate a variety of identification numbers.
A type of backup that copies all data that has changed since the last full backup, providing a middle ground between full and incremental backups. A type of backup that only copies data that has changed since the last backup, reducing backup time and storage space requirements.

 

Storage Medium Backup Time
Source Failover Systems
High Availability System Automatic Failover
Hot Standby Cold Standby

 

The amount of time required to complete a backup process, which can vary depending on the type and size of data being backed up. A device or location used to store backup data, such as a hard drive or cloud storage.
Systems that automatically switch to a redundant or backup system in case of a primary system failure. The original location of the data being backed up, such as a computer or server.
A feature of Failover Systems that seamlessly switches to a backup system without human intervention. Systems that need to be continuously operational without any downtime.
A Failover System where the backup system is not actively running but can be brought online manually. A Failover System where the backup system is running in parallel with the primary system, ready to take over instantly.