14: Technology Flashcards
7 technological developments?
Cloud computing/accounting
- provided in the cloud by service provider
Internet of things
- home automation
- vehicles and transport
Digital asset
- binary source with the right to use it
- media assets or textual context
Digital ledger technology/blockchain
- blocks that are chained together
- only valid info is recorded
Fintech
- peer to peer lending, crowd funding, currency conversion, digital wallets
Crypto currencies
- no involvement of third party
Cognitive technologies
- AI
- Machine learning (detect patterns and learn how to make own decisions)
- Robotic process automation (for routine processes)
5 management information systems?
Executive Information System
- pools data from internal and external sources
Decision Support Systems
- combines analytical models or analytical tools
Expert systems
- benefit from specialised data and rules
Knowledge work systems
- creation and integration of new knowledge
Office automation systems
- increases productivity of information workers
6 types of technology risk?
Obsolescence risk
Inexplicability risk
Data protection
Automation risks
Ethical risks
Cyber risks
4 types of cyber risk?
Hacking
- unauthorised access
Phishing
- bogus emails
Malicious software
- files are hijacked
Denial of service
- overwhelming servers to crash the system
Main component of cyber resilience?
Information security plan
Bonus round of cyber risks?
Keylogging: where criminals record what the user types onto their keyboard
File hijacking
Webcam manager
Screenshot manager
Ad clicker
When do files become digital assets?
Digital files are only classified as digital assets if the right to use the file is included
What is also included in cyber risk?
Mislaying a computer tablet that has sensitive information on about customers!
5 essentials of the Government’s Cyber Essentials scheme:
Malware protection
Software configuration
Implement access controls
Install internet gateways
Use patch management software
Two bits of advice from National Crime Agency?
Install updates to software and operating systems regularly
Use two factor authentication methods