Redundancy is used to mitigate risks. Examples include:
the use of backups,
stand-by systems, and
cyclic redundancy (CRC) codes.
Complexity: Redundancy costs, and more redundancy costs more. If privacy is
to be retained, redundant systems increase the risk of exposure and must also
be protected. Avoiding common-mode failures requires that redundancy be
implemented using separate and different methods, and this increases costs
still further. Redundancy must be analyzed and considered on a case-by-case
basis.
fc@red.a.net