Which of the following is the PRIMARY objective of cyber resiliency?
Which of the following is the PRIMARY objective of cyber resiliency?
The primary objective of cyber resiliency is to limit the severity of security breaches and maintain continuous operations. Cyber resiliency encompasses the ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises. It is not solely about prevention (option B) or recovery (option A and D) but ensuring that essential functions continue despite cyber incidents.
C: the key is "maintain continuous operations."
The PRIMARY objective of cyber resiliency is to limit the severity of security breaches and maintain continuous operations. Cyber resiliency involves not only recovering from incidents but also proactively planning and implementing measures to prevent, detect, respond to, and recover from cyber threats. It focuses on the organization's ability to adapt to and recover from adverse cyber events while maintaining essential functions and minimizing the impact on operations.
Why not A?
c is answer
The PRIMARY objective of cyber resiliency is: C. To limit the severity of security breaches and maintain continuous operations
C. To limit the severity of security breaches and maintain continuous operations
Cyber resiliency emphasizes the ability of an organization to bounce back from cyber incidents, ensuring that operations can resume quickly and with minimal disruption (option A). This objective is crucial because it acknowledges the inevitability of cyber attacks and focuses on minimizing their impact rather than solely preventing them. Therefore, option A best describes the primary goal of cyber resiliency.
B. To prevent potential attacks or disruptions in operations: This is another crucial aspect, but it's just one part of the broader goal of managing the impact of breaches. Cyber resiliency encompasses not just prevention, but also the ability to withstand and adapt to attacks that do happen.
efinition(s): The ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber resources.