One of the key goals of information security is ensuring that data remain accessible when needed, even in the face of hardware failure, accidental deletion or disasters. Backups enable organisations and individuals to restore lost data and resume operations quickly. This directly contributes to the availability and recoverability of information resources. Thus the practice described aligns with the availability and recovery aspect of security.
Option A:
Option A, confidentiality, focuses on preventing unauthorized access to information and is typically achieved through controls like encryption and access permissions rather than simply keeping copies.
Option B:
Option B, authentication, deals with verifying the identity of users or systems and is implemented using passwords, tokens or biometrics. Backups do not by themselves confirm identity.
Option C:
Option C, integrity checking, ensures that data have not been altered in an unauthorized way, often using checksums or hashes; although backups can help compare versions, their primary purpose is not real-time integrity verification.
Option D:
Option D is correct because regular backups are a classic countermeasure to threats against availability, allowing systems to recover data after failures and continue providing services.
Comment Your Answer
Please login to comment your answer.
Sign In
Sign Up
Answers commented by others
No answers commented yet. Be the first to comment!