14. Cybersecurity Resilience: Withstanding Attacks
According to the essay, what is the primary difference between being "protected" and being "resilient" in cybersecurity?
- Protection is for governments, while resilience is for businesses.
- Protection uses firewalls, while resilience uses anti-virus software.
- Resilience focuses on continuing operations during and after an attack, not just resisting it.
- Protection is more expensive to implement than resilience.
The essay states that cybersecurity resilience is built on three main pillars. What are they?
- Prevention, Resistance, and Analysis
- Firewalls, Data Backups, and Recovery Teams
- Preparation, Defense, and Recovery
- IoT Security, Network Flexibility, and Service Continuity
Based on the description of the "Preparation" pillar, which of the following actions would be most essential?
- Installing the latest anti-virus software on all devices.
- Creating an emergency plan and regularly backing up important data.
- Immediately disconnecting a part of the network that is under attack.
- Hiring a team to analyze the source of the attack after it happens.
The essay gives an example of a "flexible" defense system. What does this example describe?
- Using both firewalls and anti-virus software for layered security.
- Quickly isolating a compromised section of a network to keep the rest running.
- Having teams ready to restore data from backups after a breach.
- Learning from past attacks to improve future system strength.
What is the ultimate goal for an organization that focuses on cybersecurity resilience?
- To completely eliminate the risk of any cyberattacks.
- To ensure the continuous availability of important services, even after an attack.
- To punish the hackers responsible for the security breach.
- To replace all traditional cybersecurity tools with new, resilient ones.