Chapter 8: Technology Management Flashcards
what is the role of the Head of IT?
- Known as The Chief Information Officer (CIO) or a Chief Technology Officer (CTO).
- sets the company’s technology strategy (in conjunction with the rest of the business)
what is the role of the Head of production support?
- usually responsible for the provision of all server and for the day-to-day running and support of the production (or live) systems.
- Database administrators (DBAs) and Help desk analysts report to this individual
what is the role of the Head of Development and Implementation?
responsible for the commissioning of new applications and ensures smooth operation of the firm’s technology systems
what is the role of the Head of Business Continuity?
responsible for managing the company’s business continuity
plans (BCPs) and disaster recovery plans (DRPs)
what are the building blocks of technology infrastructure?
client side interface, application, middleware/real-time messaging layer (software products that distribute and obtain real-time data to and from other parties)
the database that stores data
what are the 7 operational risk types identified by Basel
- Internal Fraud
- External Fraud
- damage to physical assets
- Employment practices and safety
- Clients and business practices
- Execution, delivery and process management
what two categories can the governance of the risk management be divided into?
maintaining business as usual
introducing business change
what are the technology implications of maintaining business as usual?
systems within the technology function, operational procedures need to be put in place
- Ensuring business applications and the configurations are able to cope with normal business volumes
- Recording deficiencies in the design or operation of systems
- Protecting the organisation from system security issues
- Ensuring system development keeps pace with rapidly evolving user requirements.
- Ensuring minimal manual intervention
what are the technology implications of managing business change?
- aligning technology strategy with the business strategy
- aligning the solution to the strategic business drivers
- managing and monitoring risks of introducing the change
- providing visibility of risks and issues to responsible stakeholders
- risk of over- (and under-) spend
- risk of duplicate systems
- Risk of delivering late, or not delivering what is required
- complexity risk
- scope expansion risk
- managing external parties
what does cyber security involve?
the methods and processes used to protect computer systems’ hardware, software and data from: Damage, theft, unauthorised use, and disruption
what is hacking?
Stealing personal information to pose as someone else, often for financial gain
what is cyber espionage?
Stealing valuable and confidential information about products, services, patents, designs, and intellectual property
what is Malware?
Software designed to gain unauthorized access to computer systems to disrupt operations or gather private information illegally
what is Spyware?
Software that collects information without the user’s knowledge and sends it to a third party. It can gather personal data, interfere with user control, and be challenging to detect
what is Phishing?
Cybercrime designed to trick users into disclosing personal financial details by creating fake websites resembling legitimate ones