Chapter 9 Resilience and Recovery in Security Architectures

Site: ApexMoodle
Course: Audit
Book: Chapter 9 Resilience and Recovery in Security Architectures
Printed by: Guest user
Date: Saturday, 10 January 2026, 12:15 AM

1. Resilience and Recovery in Security Architectures

Resilience and recovery in security architectures intro slide

Audio

Transcript

1.1. Resilience and Recovery in Security Architectures

Continuity of operations, common elements for redundancy, and high availability

Audio

Transcript

1.2. Resilience and Recovery in Security Architectures 2

UPS, generator systems, dual supply or multisupply, PDUs, systems and storage redundancy, and platform diversity

Audio

Transcript

1.3. Architectural Considerations and Security

List of architectural considerations and security

Audio

Transcript

1.4. Storage Resiliency

Storage resiliency, RAID, replication, journaling, RPOs and RTOs and snapshot

Audio

Transcript

1.5. Raid Levels, Advantages, and Disadvantages (table)

Table for raid levels, advantages, and disadvantages

Audio

Transcript

1.6. Storage Resiliency: Backup Media

List of backup media

Audio

Transcript

1.7. Storage Resiliency: Cloud and Off-site Third Party Backup Options

Cloud and off-site third party backup options

Audio

Transcript

2. Response and Recovery Controls

Response and recovery controls intro slide

Audio

Transcript

2.1. Response and Recovery Controls

List of response and recovery controls

Audio

Transcript

2.2. Restoration Order

Restoration order for backups

Audio

Transcript

2.3. Capacity Planning for Resilience and Recovery

Capacity planning for resilience and recovery

Audio

Transcript

2.4. Testing Resilience and Recovery Controls and Designs

Ways to test resilience and recovery controls

Audio

Transcript

3. Physical Security Controls

Physical security controls intro slide

Audio

Transcript

3.1. Site Security

List of Site Security

Audio

Transcript

3.2. Site Security: Video Surveillance, Cameras, and Sensors

Video surveillance, CCTV, and Sensors for site security

Audio

Transcript

3.3. Detecting Physical Attacks

Detecting physical attacks such as brute-force, RFID, and environmental attacks

Audio

Transcript