Chapter 12 - Managing Systems Support and Security Flashcards
One of four risk control strategies. In __________, the risk is accepted and nothing is done. Risk is usually accepted only if protection from risk is clearly not worth the expense.
acceptance
Adds new capability and enhancements to an existing system.
adaptive maintenance
An account that allows essentially unrestricted access to the application.
administrator account
Documents the system at the end of the design phase and identifies any changes since the functional baseline. The ________________ includes testing and verification of all system requirements and features.
allocated baseline
A person who works on new systems development and maintenance.
applications programmer
The storage of previous version of a system when a new version is installed.
archived
Hardware, software, data, networks, people, or procedures that provide tangible or intangible benefit to an organization.
asset
A hostile act that targets an information system, or an organization itself.
attack
Enables an application to contact the vendor’s server and check for a needed patch.
automatic update service
One of the three main elements of system security: confidentiality, integrity, and _______________ (CIA). ______________ ensures that authorized users have timely and reliable access to necessary information.
availability
One of four risk control strategies. In _____________, adding protective safeguards eliminates the risk.
avoidance
Data storage options, including tape, hard drives, optical storage, and online storage.
backup media
Detailed instructions and procedures for all backups.
backup policy
A formal reference point that measures system characteristics at a specific time. Systems analysts use ______________ as yardsticks to document features and performance during the systems development process.
baseline
A form of testing used by companies to measure system performance.
benchmark testing
Mapping an individual’s facial features, handprint, or eye characteristics for identification purposes.
biometric scanning systems
A password that must be entered before the computer can be started. It prevents an unauthorized person from booting a computer by using a secondary device.
BIOS-level password / Power-on Password / Boot-level password
A plan that defines how critical business functions can continue in the event of a major disruption.
business continuity plan (BCP)
A process that monitors current activity and performance levels, anticipates future activity, and forecasts the resources needed to provide desired levels of service.
capacity planning
A process for controlling changes in system requirements during software development; also an important tool for managing system changes and costs after a system becomes operational.
change control (CC)
The three main elements of system security: confidentiality, integrity, and availability.
CIA triangle
One of the three main elements of system security: ______________, integrity, and availability (CIA). ______________ protects information from unauthorized discloser and safeguards privacy.
confidentiality
A process for controlling changes in system requirements during the development phases of the SDLC. __ also is an important tool for managing system changes and costs after a system becomes operational.
configuration management (CM)
A real-time streaming backup method that records all system activity as it occurs.
continuous backup
Changes to the system to fix errors.
corrective maintenance
Formal qualifications that include degrees, diplomas, or certificates granted by learning institutions to show that a certain level of education has been achieved.
credentials
When risks are categorized and prioritized, ___________ (those with the highest vulnerability and impact ratings) head the list.
critical risks
In normal operating conditions, any transaction that occurs on the primary system must automatically propagate to the hot site.
data replication
A person who focuses on creating and supporting large-scale database systems.
database programmer
An online attack that occurs when an attacking computer makes repeated requests to a service or services running on certain ports.
denial of service (DOS)
A backup that includes only the files that have changed since the last full backup.
differential backup
A documented procedure consisting of an overall backup and recovery plan.
disaster recovery plan
A service attack involving multiple attacking computers that can synchronize DOS attacks on a server.
distributed denial of service (DDOS)
Raiding desks or trash bins for valuable information.
dumpster diving
A new feature or capability.
enhancement
An attack that takes advantage of a system vulnerability, often due to a combination of one or more improperly configured services.
exploit
The timely detection and resolution of operational problems. _____________________ includes monitoring a system for signs of trouble, logging all system failures, diagnosing the problem, and applying corrective action.
fault management
A system or application is said to be ________________ if the failure of one component does not disable the rest of the system or application.
fault tolerant
The main line of defense between a local network, or intranet, and the Internet.
firewall
A complete backup of every file on the system.
full backup
The configuration of the system documented at the beginning of the project. It consists of all the necessary system requirements and design constraints.
functional baseline
Making a system more secure by removing unnecessary accounts, services, and features.
hardening
A separate IT location, which might be in another state or even another country, that can support critical business systems in the event of a power outage, system crash, or physical catastrophe.
hot site
Controls and procedures necessary to identify legitimate users and system components.
identity management
The stealing of personally identifying information online.
identity theft
A security standard for Wi-Fi wireless networks that uses the WPA2 protocol, currently the most secure encryption method for Wi-Fi networks.
IEEE 802.11i