4-3. Protection of Information Flashcards
Mobile device: What are examples? Benefits?
iPhones, androids, blackberries, tablet computers.
Benefits: Ubiquitous computing - universal data availability.
Mobile device: risks?
- User-installed applications can create security risks (e.g. spyware)
- Loss or theft
Mobile device: challenges?
- Redesigning displays, ensuring functionality across platforms, etc
- Emerging technologies: Siri, Movie her, voice recognition/input, biometric identification
Mobile device: what is SDLC?
System development life cycle.
Mobile device: what are end-user system development risks?
- No knowledge or application of SDLC
- Inadequate system testing and documentation
- Poor data controls
- Poor integration with existing systems
- Poor system design
Mobile device: end-user system development risks: what is the responses?
Software and program development and implementation
- third-party review and testing of user-developed programs
- catalog and store programs in secure and off-site location
Segregation of duties
- third-party review of data entry (if any) and report production
- implement additional supervision and review as feasible
What is SBE?
Small business environment.
SBE: what are end-user computing risks?
- Hard to control
* Higher risk of errors, defalcation, system failure
SBE: characteristics?
- Exclusively microcomputers
- No centralized info. Technology (IT) dept often outsourced
- Poor segregation of duties (incompatible functions often combined)
SBE: computing risks and responses?
Risk: Unprotected computing sites
Response: Give > attention to locked doors and secure storage (e.g. CDs, DVDs, flash drives)
Risk: Logical (electronic) access
Response: Require usernames and strong passwords, automatic log out after unused period
Risk: Data backup
Response: Outsource, or establish and enforce policies (e.g. centralized and automate through network)
SBE: what is a compensating control?
Close involvement of knowledgeable owner.
Mobile device: what items should be included in mobile applications training?
- Organizational policies
- Password maintenance and protection
- When and how to use mobile devices
- Procedures for lost or stolen devices
Mobile device: definition?
Transportable (ubiquitous) computing devices; that is, computing devices that can be carried from place to place.
What are 3 approaches to consolidate data from multiple locations?
- Centralized system: data and processing at central location, user access via telecommunications channel
- Decentralized system: individual location processing and data, summarized data sent to central office, use is declining
- Distributed (hybrid) database system: distribute to locations according to need, seeks the best of centralized and decentralized, increasingly common
Centralized system: Advantages and disadvantages?
A: enables better data security, consistency in processing
D: high transmission costs, input/output bottlenecks at high traffic times (end of period), slow response to information requests
Decentralized system: Advantages and disadvantages?
A: lower transmission cost, lower processing power/storage needs at central site, lower input/output bottlenecks, higher response to local needs
D: higher data redundancy and poor information integration, higher security issues, higher hardware costs
Distributed database system: Advantages and disadvantages?
A: better communication between locations (all connected to distributed database), more current and complete info, reduce or eliminate need for expensive central processing center
B: similar to centralized systems, cost of communications among locations, access and update conflicts among locations
What are computer networks?
2 or more computing devices; Connected by a communications channel
What is node?
- Network access point
* A connected devices (computers, printers, headphones, etc) identified by type (linked to device protocols)
What is critical about nodes and security?
Controlling
What does node also could measure?
Measure of network complexity (e.g. 5 vs 30,000)
What is assigned to node?
A DNS and IP (internet protocol) address.
What is DNS?
Domain name system: translates network node into IP address.
What does network monitors do in relation to node?
Network monitors display node activity - status, extent of traffic, alarms (e.g. prohibited traffic)
Computer network: what are components?
- Switch (0,1) and/or router - router is increasingly common.
- Network Interface Card (NIC) or Network Adapter Card (NAC)
- Transmission media
Computer network: Describe switch and/or router.
- Route traffic and may include security features.
* Routers are smarter, more complex and cost more than switches.
Computer network: describe Network Interface Card (NIC) or Network Adapter Card (NAC).
- Circuit board and software on each node
- Translate between network and computer language
- Matches to transmission media
e. g. in each computer
Computer network: describe transmission media.
- Communication link between nodes (here a cable)
* May be wired or wireless
Computer network: what are types of nodes?
- Client
* Server
Computer network: describe client node.
- Usually an end user’s microcomputer
* Uses but does not provide network resources