Chapter 12 Flashcards
four types of maintenance
corrective maintenance is perform to fix errors
adaptive maintenance adds new capability and enhancements.
perfective maintenance improve efficiency
preventive maintenance reduces the possibility of future system failure
configuration management
sometimes referred to as change control (CC), is a process for controlling changes in a system requirements during software development.
configuration management is also an important tool for managing system changes and costs after a system becomes operational.
Version control
the process of tracking system releases or versions. when an ew version of a system is installed, prior release is archived, stored, if a new version causes a system to fail, a company can reinstall the prior version to restore operations.
baseline
a formal reference point that measures system characteristics at a specific time, systems analysts use baselines as yardsticks to document features and performance during the systems development process. the three types of baselines are functional, allocated, and product.
functional baseline
the configuration of the system documented at the beginning of the project. it consists of all the necessary system requirements and design constraints
allocated baseline
documents the system at the end of the design phase and identifies any changes since ethe functional baseline. the allocated baseline includes testing and verification of all system requirements and features.
product baseline
describes the system at the beginning of system operation. the product baseline incorporates any changes made since the allocated baseline and includes the results of performance and acceptance tests for the operational system.
benchmark testing
uses a set of standard tests to evaluate system performance and capacity.
throughput
measures actual system performance under specific circumstances and is affected by network loads and hardware efficiency. like bandwidth, throughput is expressed as a data transfer rate, such as Kbps, Mbps, or Gbps, just as traffic jams delay highway traffic, throughput limitations can slow system performance and response time.
turnaround time
applies to centralized batch processing operations, such as customer billing or credit card statement processing. turnaround time measures the time between submitting a request for information and the fulfillment of the request. turnaround time can be also used to measure the quality of IT support or services by measuring the time from a user request for help to the resolution of the problem.
CIA triangle
the three main elements of system security: confidentiality, integrity, and availability.
confidentiality protects information from unauthorized disclosure and safeguards privacy.
integrity prevents unauthorized users from creating, modifying, or deleting information
availability ensures that authorized users have timely and reliable access to necessary information.
Risk management
managers must balance the value of the assets being protected, potential risks to the organization, and security costs. to achieve the best results most firms use a risk management approach that involves constant attention to three interactive tasks: risks identification, risk assessment, and risk control.
risk identification analyzes the organization’s assets, threats, and vulnerabilities.
risk assessment measures risk likelihood and impact.
risk control develops safeguards that reduce risks and their impact.
threat
in risk management, an internal or external or external entity that could endanger an asset
vulnerability
a security weakness or soft spot
spoofing
IP address is forced to match a trusted host, and similar content may be displayed to simulate the real site for unlawful purposes.