Hardware Failure | Software Corruption |
Malware Attacks | Human Error |
Natural Disasters | Power Outages |
Accidental Deletion | Network Failures |
Where the software in ICT systems gets altered or damaged, causing potential data loss. | The malfunction or damage of physical components in ICT systems that can lead to data loss. |
Mistakes or negligence by individuals operating or managing ICT systems that may result in data loss. | Malicious activities targeting ICT systems to compromise data integrity and confidentiality. |
Disruptions to power supply such as immediate loss of power | Issues such as floods, fires, earthquakes, and hurricanes that can cause physical destruction to ICT systems, leading to data loss. |
Disruptions or malfunctions in the communication infrastructure of ICT systems that can cause data loss. | The unintentional removal of important data from ICT systems that results in data loss. |
Inadequate Backup | Malware Infections |
Power Outage | Flood |
Fire | Earthquake |
Hurricane | Tornado |
Malicious software programs that can infiltrate ICT systems and cause data loss. | Insufficient or irregular data backup procedures in ICT systems, increasing the risk of data loss. |
Overflowing of water which can damage hardware and destroy data storage devices. | Loss of electricity supply which can lead to data corruption or loss. |
Seismic activity that can cause physical damage to data storage infrastructure leading to data loss. | Destructive blaze that can engulf data centers and destroy data stored within them. |
Violently rotating column of air that can destroy buildings housing data centers resulting in data loss. | Storm with strong winds and heavy rainfall that can damage data centers and cause data loss. |
Lightning | Tsunami |
Wildfire | Improper Data Handling |
Phishing Attacks | Unauthorized Access |
Data Breaches | Misconfiguration |
Series of large waves caused by underwater earthquakes that can flood data centers leading to data loss. | Electrical discharge during thunderstorms that can cause power surges leading to data loss. |
Careless or negligent actions that lead to data loss, such as improper storage or transfer practices. | Uncontrolled fire that can engulf data centers and destroy data stored within them. |
When individuals or entities gain entry to a system without permission, potentially resulting in data loss or theft. | Fraudulent attempts to obtain sensitive information, which can result in data loss if successful. |
Errors in system setup or configuration that can lead to data loss, such as incorrect permissions or settings. | Unauthorized disclosure of sensitive information, leading to data loss and potential harm to individuals or organizations. |
Lack Of Backup | Data Loss |
Data Breach | Financial Impact |
Reputation Damage | Legal Consequences |
Operational Disruption | Data Recovery Costs |
The unintended loss of data or information stored on a computer or device. | The absence of redundant copies of data, increasing the risk of permanent data loss in the event of a mishap. |
The negative repercussions on an organization's finances due to data loss, including potential revenue loss and costs associated with data recovery. | An incident where sensitive, confidential, or protected data is accessed, stolen, or used by unauthorized individuals or parties. |
The potential legal liabilities faced by organizations due to data loss, including fines, penalties, and lawsuits for failing to protect sensitive information. | The harm to an individual or organization's reputation caused by data loss incidents, which can lead to loss of trust and credibility. |
The expenses associated with recovering lost or corrupted data, including the use of specialized software or hiring data recovery experts. | The interruption or shutdown of business operations caused by data loss, leading to productivity losses and service disruptions. |
Data Privacy Violations | Customer Trust Erosion |
Regulatory Non-Compliance | Backup |
Data Recovery | Encryption |
Data Backup Plan | Data Integrity |
The gradual loss of confidence and loyalty from customers due to data loss incidents, resulting in decreased sales and a damaged brand image. | The infringement of individuals' privacy rights as a result of data loss incidents, leading to concerns about data misuse or identity theft. |
Creating copies of data to protect against loss in case the original data is corrupted or deleted. | The failure to meet legal requirements and industry standards related to data protection and security, leading to penalties and sanctions for non-compliant organizations. |
The process of encoding data to make it unreadable to unauthorized users, thus protecting it from data loss. | The process of restoring lost or corrupted data from backup copies or other sources. |
Ensuring that data is accurate, consistent, and reliable to prevent errors and loss. | A detailed strategy outlining how data will be backed up regularly to prevent loss in case of system failure. |
Disaster Recovery | Version Control |
Data Archiving | Redundancy |
Automated Backups | RAID |
Parity Bits | Error Detection |
Managing different versions of data to prevent loss and track changes over time. | A plan outlining steps to be taken to recover data in case of a catastrophic event like a fire or flood. |
Having multiple copies of important data to ensure that it is not lost if one copy becomes inaccessible. | Storing older or infrequently accessed data in a separate location to prevent loss without cluttering the primary storage. |
Redundant Array of Independent Disks, a storage technology that combines multiple disks into a single unit to provide data redundancy and improve data reliability, reducing the risk of data loss. | The use of automated software tools to regularly create backup copies of data. |
The process of detecting and correcting errors that occur during data transmission or storage. | Bits added to binary data to ensure an even or odd count of 1s. |
Odd Parity | Even Parity |
Error Correction | Parity Blocks |
Checksum | Fault Tolerance |
Striping | Parity Calculation |
A method of error detection where the number of 1s, including the parity bit, is always even. | A method of error detection where the number of 1s, including the parity bit, is always odd. |
Blocks of data that are used for error checking and correction in a storage system. | The process of detecting and correcting errors that occur during data transmission or storage using error correction codes. |
The ability of a system to continue functioning properly in the event of hardware or software failures. | A value calculated from the data to verify its integrity and detect errors. |
The process of deriving parity information from the data blocks. | A technique where data is divided into blocks and stored across multiple disks, including parity blocks. |
Capacity Overhead | Md5 |
CRC | Echo Check |
Automatic Repeat Query | Retransmission |
Feedback | Packet Loss |
a widely used cryptographic hash function that produces a 128-bit (16-byte) hash value | The additional storage space required to store parity blocks, reducing the overall usable capacity of a RAID system. |
The process of verifying the integrity of network data by sending a request packet and comparing the echoed response packet. | a cyclic redundancy check algorithm used to detect accidental changes or errors in data |
The process of resending data packets that have been lost or corrupted during transmission. | A technique used in computer networks to handle lost or corrupted data packets by retransmitting them automatically. |
The failure of one or more data packets to reach their destination due to factors like network congestion or transmission errors. | Information sent from the receiver to the sender to indicate whether data packets have been successfully received or not. |
Acknowledgment | Timeout |
Sequence Number | Check Digit |
Luhn Algorithm | Full Backup |
Incremental Backup | Differential Backup |
The period of time after which a sender assumes that a data packet has been lost and triggers retransmission. | A signal sent by the receiver to inform the sender that data packets have been successfully received. |
A digit added to a number to help detect errors. | A unique identifier assigned to each data packet to ensure correct ordering and detect duplicate packets. |
A type of backup that copies all data from a source to a storage medium. | A mathematical formula used to validate a variety of identification numbers. |
A type of backup that copies all data that has changed since the last full backup, providing a middle ground between full and incremental backups. | A type of backup that only copies data that has changed since the last backup, reducing backup time and storage space requirements. |
Storage Medium | Backup Time |
Source | Failover Systems |
High Availability System | Automatic Failover |
Hot Standby | Cold Standby |
The amount of time required to complete a backup process, which can vary depending on the type and size of data being backed up. | A device or location used to store backup data, such as a hard drive or cloud storage. |
Systems that automatically switch to a redundant or backup system in case of a primary system failure. | The original location of the data being backed up, such as a computer or server. |
A feature of Failover Systems that seamlessly switches to a backup system without human intervention. | Systems that need to be continuously operational without any downtime. |
A Failover System where the backup system is not actively running but can be brought online manually. | A Failover System where the backup system is running in parallel with the primary system, ready to take over instantly. |