Chapter 8: Technology Management Flashcards
What is the Role of the CIO (Head of IT)?
Manages all the other staff of the divisions.
What is the Role of The Head of Production Support?
Provision of all server and desktop facilities to all users and for the day to day running and support of the production.
What is a DBA?
Database administrator.
Reviews and monitors everything, such as SQLs, back up and recivery stratergies etc.
Who reports to them?
What is the Role of The Head of The Head of Development and Implementation?
Commissioning od new applications.
Following postions report to this:
- Business Analysts
- Application designers
- Programmers
What is the Role of The Head of Testing?
Testing new software releases and implementing change control procedures.
What is the Role of The Head of Change?
Managing Major Change Programmes and Individual Projects.
Very Straight Forward
What is the Role of The Head of Business Continuity and Recovery?
Managing the companies business recovery plans.
Head of Information Security of CISO?
Overal direction and all security functions. Must comply with GDPR in the EU ans DPA in the UK
Why Would a Firm Run and Employ Their Own Tehcnology Infrastructure?
To give them a competetive advantage.
What is the Difference Between a “Thin Client” and a “Fat Client”?
Thin = PC or Laptop with web applications
Fat = PC or Laptop with web and installed apps
What is a Business Engine?
A Programme that holds the programs for processing.
What is the Most Common Database?
The Relational Database.
A number of tables that are related to one another.
What is SQL?
Structured Query Language
What is a Distributed System?
Is a configuration which contains a number of hardware elements that are connectedy some tramsission technology.
3 reasons
What are the Reasons for Implementing a Distributed System?
1) Ensures the processing power is a close to the users as possible
2) To ensure a degree of robustness
3) To enable hardware to be easily added
What are OODBs?
Object Oriented Databases
What is a “Go Live” Date?
The day a business change is set to occur
DTUD
What are the Risk Types for Cyber Security?
- Damage
- Theft
- Unauthorised Use
- Disruption
6
What are the Main Methods of Hacking?
- Identity Fraud
- Cyber Espionage
- Phising
- Malware
- Botnets
- Distributed Denial of Service Attacks
What is Spyware?
Software that gathers information about a person or org and sends such information to a third party
What is Ransomware?
Involves the criminal blocking access to a system, threatening to publish personal info unless ransom is paid.
What is Scamming?
Low tech alternative the hacking/
.
What is a Trojan Virus?
A virus that appears legitimate, but really contains mailicious code.
What is a Botnet?
A network of computer controlled by cyber criminals using a trojan or else.
What is a Distriuted Denial of Attacks?
An attempt to make a machine or network resource temporarily unavailible to its intended users.
Prevention and Detection Techniques for Cyber Attacks?
All you can think if as there is 11
- Conduct an Impact Analysis
- Staff Training
- Personal and Portable Devices
- Be open and aproachabel with customers (so they make you aware)
- Install vulnerability scanner
- Identify where firewalls are needed
- Enryption
- Keep anti virus software up to date
- Ensure physical security
- Perform attacks
- Regular defenses
What is an Infrastructure Catalogue?
Inforation that needs to be collated to advise a help desk
What are the 2 Categories for the Help Desk Funtion?
- Planned admin or preventaive maintenance activities
- Unplanned emergency activities
What is “Follow the Sun” Support?
24 hour help line that operates to cater for more than 1 time zone.
What is a Change Control Procedure?
Processes designed to prevent software or hardware from being amended without control, auditability and review of the impact parties.
What are Version Control Systems?
Software applications that manage multiple revisions of the same unit of information.