ENGR 107 Final Exam Review Flashcards
What is the product verification process?
It is a process that verifies that a system or product meets system specifications or requirements.
What question does the verification process answer?
Are we building the product right?
What is the product validation process?
It is a process that validates that a system or product meets customer requirements or needs.
What question does the product validation process answer?
Are we building the right product?
What are the four fundamental methods of verification?
Inspection, Demonstration, Test, and Analysis
What does inspection involve?
Visual examination of an end product,
When is inspection generally used?
It is generally used to verify physical design features or specific manufacturer identification
What is an example of the inspection method being utilized?
Visually examining a car to ensure that it has windows, power adjustable seats, AC, etc.
What does demonstration involve?
Using the product as it is intended to be used to verify the results are as planned or expected
What is an example of the demonstration process being used?
The portion of the Design Project where a demonstration of the project is given. The purpose of this demonstration is to prove that the product works like it should and fulfills the given requirements.
What is the purpose of testing?
Producing data at specific points for each specified requirement under controlled conditions.
What are some examples of tests that could be performed on a product?
Wanting to show that a car speeds up within a certain time frame, it accelerates properly, and it slows down appropriately.
What does analysis involve?
Verification of a product or system using models, calculations, and testing equipment
Includes the use of mathematical modeling and simulation as analytical tools
What are some examples of analysis being used?
Completing a series of tests for a car. Which rev the engine is at at a specific revolution per minute (rpm) for a set length of time, while monitoring engine vibration and temp, to verify that the expected results have been achieved.
The info can be used to model the failure point of the engine, such as the max rpm sustained over a specific time period.
What are the different types of verification outputs?
Product Verification Report, Discrepancy Reports, and Compliance Documentation
What is a Product Verification Report?
A report that shows the results of
the verification activities.
What is a Discrepancy Report?
A report where results that do not make sense are recorded.
What is Compliance Documentation?
Documentation to ensure that all applicable rules / regulations are complied with.
What is an example scenario that would require Compliance Documentation?
If an electrical product is being created, you need to make sure that it complies with the rules / regulations in your country. (Only a consideration when the product is being released to the market.)
The National Society of Professional Engineers (NSPE) created a list of 5 standards of ethical behavior for engineers to follow in their professional lives. What are they?
- Protecting Public Safety
- Acting with Integrity
- Being honest in public
communications - Only performing tasks that they are qualified to do
- Remaining faithful and trustworthy to employers
How does an engineer protect public safety?
- By using standard and approved materials.
- By following the appropriate set(s) of engineering procedures.
How do engineers act with integrity and honesty?
- By remaining honest in all of their transactions
- Even when faced with a dilemma or other pressures in their duty, remaining honest.
How do engineers protect clients and employers?
- By maintaining discretion when dealing with their clients’ info.
Ex. name, age, gender, location, etc. - By preserving this info unless the client states otherwise.
How do engineers ensure ethical decision making in areas of uncertainty?
By choosing the decision that is ethical and serves the interest of the society rather than individual gain.
What is a verified product?
A final product once it has gone through the verification process and it complies with all of the established rules / requirements.
What is an example of a verified product?
The pill dispenser my group presented, since we tested it out and made sure it met all of the rules / requirements.
What is Cybersecurity?
The practice of protecting systems, networks, and programs from digital attacks.
How can you ensure data confidentiality?
- Encrypt sensitive data, such as credit card numbers or PII, when you transmit it over networks or store it on computers.
- Use access controls, such as user authentication and authorization, to limit who can access sensitive data and what they can do with it.
- Use physical controls, such as locks and security cameras, to prevent unauthorized access to sensitive data in physical locations, such as data centers or office buildings.
Which aspect of CIA does phishing mainly impact? How would you prevent a phishing attack by knowing this info?
Confidentiality
- Encrypt sensitive data, such as credit card numbers or PII, when you transmit it over networks or store it on computers.
- Use access controls, such as user authentication and authorization, to limit who can access sensitive data and what they can do with it.
- Use physical controls, such as locks and security cameras, to prevent unauthorized access to sensitive data in physical locations, such as data centers or office buildings.
How can you ensure data availability?
- Deploy redundant systems, so that if one system fails the others can continue to operate and provide the data needed.
- Use load balancers, which distribute incoming requests across multiple systems so that no one system becomes overwhelmed and unavailable
- Run regular quality control tests to help identify availability issues before they cause disruptions
What is a phishing attack?
Email, text, or voice messages that trick users into downloading malware, sharing sensitive info, of sending funds to the wrong people
Fraudulent emails that resemble emails from reputable sources
Which aspect of the CIA Triad is Malware most related to? How would you prevent a malware attack based on this info?
Integrity
- Data should be stored in physically secure locations
- Encrypt data and securely store the encryption key
- Audit data access and changes regularly
- Use cyber analysis tools to monitor the flow of info and users into, through, and out of your systems, and address irregularities quickly
- Create a data backup and restoration strategy
How can you ensure data integrity?
- Data should be stored in physically secure locations
- Encrypt data and securely store the encryption key
- Audit data access and changes regularly
- Use cyber analysis tools to monitor the flow of info and users into, through, and out of your systems, and address irregularities quickly
- Create a data backup and restoration strategy
What is Ransomware?
A type of malicious software (malware)
Designed to extort money by blocking access to files or the computer system until the ransom is paid
Paying the ransom does not guarantee that the files will be recovered or the system restored
Which aspect of the CIA Triad is Ransomware most related to? How would you prevent a ransomware attack based on this info?
Availability
1. Deploy redundant systems, so that if one system fails the others can continue to operate and provide the data needed.
- Use load balancers, which distribute incoming requests across multiple systems so that no one system becomes overwhelmed and unavailable
- Run regular quality control tests to help identify availability issues before they cause disruptions
What is a Distributed Denial of Service (DDos) attack?
Attempts to crash a server, website, or network by overloading it with traffic (usually from a botnet)
Which aspect of the CIA Triad is a DDos most related to? How would you prevent a DDos attack based on this info?
Availability
- Deploy redundant systems, so that if one system fails the others can continue to operate and provide the data needed.
- Use load balancers, which distribute incoming requests across multiple systems so that no one system becomes overwhelmed and unavailable
- Run regular quality control tests to help identify availability issues before they cause disruptions
What is a botnet?
A network of multiple distributed systems that a cybercriminal hijacks using malware and operates via remote control