DM4: IS Business Resilience and Maintenance Management Flashcards
What is the purpose of using separate conduits for data and electrical cables?
To reduce data corruption due to magnetics fields created by electrical currents.
What are the primary operating system access control functions?
log user activities and log events (think Event Viewer on PC)
Which types of cabling are insecure?
Coaxial and copper wire
Which type of cabling is most secure?
Fiber optic cable
What are the risks involved in spooling printed reports for offline printing?
Additional report copies can be printed by unauthorized individuals
What is a common gateway interface (CGI)?
it’s the standard way for a web server to pass a user’s request to an application and move data back and forth
What are the common types of enterprise back-end devices?
print servers, file servers, application servers, web servers, proxy servers, database servers, and appliances
What are enterprise appliances (specialized devices)?
devices that provide a specific services such as firewalls, IDS’s, IPS’s, switches, routers, VPNs, and load balancers
What is the purpose of a proxy server?
the provide a link between users and resources and access resources on behalf of the user, sometimes providing more secure and faster response
What are the common risks related to USBs?
viruses and malicious software;
data thefts;
data/media loss;
corruption of data;
loss of confidentiality
What are some security controls for use of USBs?
encryption;
granular control;
security personnel education;
locked desktop policies;
antivirus policy
What are areas to review when auditing a hardware maitenance program?
hardware acquisition plan;
actual acquisition;
IT asset management;
capacity management;
preventative maintenance schedule;
problem logs
What information do you need for each asset in an IT asset management system?
Owner, designated custodian, ID of asset, value of asset, loss implication/priority, location, security classification, asset group
What does a job scheduling software provide?
control over scheduling jobs, tape backups, and other maintenance activities
What should be done for high-priority jobs in a job scheduler?
they should be given optimal resources and be performed in nonpeak times
In regards to system interfaces, what is a critical area that should be verified?
data residing on sending systems are precisely the same data being recorded in the receiving system; encryption is being used
What is the goal of data governance?
stakeholder needs can be managed;
direction for data management;
performance management;
What are the three types of data quality?
intrinsic, contextual, and security/accessibility
What is intrinsic data quality?
the extent to which data values are in conformance with actual or true values
What is contextual data quality?
the extent to which information is applicable to the task of the information user and is presented in an intelligible and clear manner, recognizing that information quality depends on the context of use
What is accessibility data quality?
the extent to which information is available or obtainable
What are the five phases of the data life cycle?
- Plan
- Design
- Build/Acquire
- Use/Operate
- Monitor
- Dispose
What are the FIRST 3 phases of the data life cycle and their purpose?
- Plan - creation, acquisition, and use of the information resource is prepared. (E.g., understanding information, value of information, identifying objectives)
2 - Design - how the information will look and how the systems processing the information will have to work (e.g., standards, data definitions)
- Build/acquire - when the information resource is actually acquired (e.g., creation of data, purchase of data, loading of data)
What are the LAST 3 phases of the data life cycle and their purpose?
- Use/operate - storing/sharing/use of information resources
- Monitor - ensuring that information resources continue to work properly
- Dispose - information is transferred or retained for a specified period, destroyed, or archived
What is the significance of Operating System (OS) integrity?
protects itself from deliberate and inadvertent modification;
ensures that privileged programs cannot be interfered with by user programs;
provides process isolation to ensure that concurrent processes wont interfere with each other and least privilege is enforced for processes
What is one way to protect system logs from being altered by intruders?
Using a security information and event management (SIEM) software
What are the three components of a data communication system?
- transmitter (source)
- transmission patch (channel or line)
- receiver
What is a utility program?
system software used to perform maintenance and routines that frequently are required during normal processing operations.
What is the primary functional uses of a utility programs?
understanding application systems; assessing or testing data quality; testing a programs ability to function correctly; assisting in faster program development; improving operational efficiency
What are the two types of licensing?
free and paid
What are example of free licensing?
open source, freeware, shareware
What are examples of paid licensing?
licensing per: CPU, seat, concurrent user, utilization, workstation, enterprise
If reviewing licensing for an organization, what should an IS auditor look for?
list of all standard, used, and licensed software;
all contracts;
network scans of software;
compare contracts to installed software