Chapter 3 - Information Systems Flashcards
End Point Devices?
Any device that connects to the network
What Device is used to collect Environmental Data? Challenges?
Internet of Things Senors, Challenge is Secuity and not easy to upgrade
What is a UML Diagram sometimes called? What is it?
ERD & Visual Representation of a conceptual Data model that shows tables in a database and the Associations between them.
What Do Availability Reports Address?
Uptime and Downtime Durations
What is a CSP always responsible for? Examples?
Infrastructure - Networking, Storage, Servers
Firewall
What does it do?
Isolates what?
Device that controls the flow of data into and out of an information system at network entry points.
o separates or isolates a network segment from the main network while maintaining the connection between networks
Switches
moves data between connected devices in a network.
Servers
3 things they do?
are powerful computers that store, process, and manage data
- Routers
infrastructure components that receive and send data packets to their intended destinations and determine the best path.
Progressive Steps to Test Continuity plan
- Checklists - Help to execute the complete plan
- Tabletop exercise - Walkthrough a potential scenario
- Simulation - Perform all the tasks at the alternate site (except processing)
- Parallel – Process at both the primary and alternate sites to determine if they are the same
- Full interruption – Perform all tasks only at the alternate site.
BCP (business continuity plan). The correct sequence is:
- Consider possible threats
- Assess potential impacts
- Evaluate critical needs
- Establish recovery priorities
- Refers to a company’s ability to keep providing products and services despite.
Recovery Time Objective (RTO)
Established how?
2 things it calculates?
maximum amount of downtime a business can tolerate
* Established by doing a business impact analysis (BIA)
o Calculates the cost of downtime
Tangible – Loss of revenue
Intangible – Harm to reputation
Mean Time to recover (MTTR)
- Tracks the average time it takes to restore a service or system after an outage.
Which Backup is the most efficient for minimizing backup time and storage usage?
Incremental
Which Backup has a longer restoration time than a full backup?
differential
Continuous integrations are validated how?
name order 1-4
automated test
1.unit - test on individual components /functions
2. integration - group testing of components /functions
3 system -all components are integrated and the whole system is tested
4. acceptance - final testing is done by end users
What does Strategy development remediate?
It bridges the gap between the business impact analysis by looking at the risk and seeing how the business continuity plan should address it.
What two steps are after the strategy development phase and what do they do?
- Provisions and process - measures and procedures are created to mitigate risks
- Resource prioritization - prioritizes and allocates resources to different identified tasks.
Internally encrypted passwords
access control designed to prevent unauthorized access by use of a utility program to identify passwords.
What control
1 automatically resubmits correct data
2. Ensures the integrity, accuracy, and completeness of data
Online data entry controls
Who is responsible for networks and security, servers and storage, and infrastructure facility?
IAAS
Who is responsible for infrastructure, networks and security, servers and storage, operating systems, and database and analytic tools?
Platform as a software
Who is responsible for infrastructure, networks and security, servers and storage, operating systems, hosted apps, and databaseand analytic tools?
Software as a service
How do you calculate system availability?
Downtown- agreed service time/ agreed service time