IT Flashcards
what are the inputs to the initiation phase (2)?
User req.
User cons.
what are the outputs from the initiation phase(2)
success criteria
feasibility decision
outputs from the planning phase(4)
Project targets (SMART)
Project steps
risk and mitigation
test plan
outputs from the execution phase
finished product
test results
outputs from the evaluation phase
deliverable product
user documentation
3 types of IT system testing
iterative.
final.
Normal, extreme and destructive
(4)draw backs of plf
requires managements skill
bureaucratic
time to put in place
need effective communication
3 planning tools that are data based
gantt
pert/critical path
charts and graphs
3 image based planning tool
visualisation
mind map
chart, graph
What is a SWOT analysis
-Our strengths and weaknesses
-Competitors opportunities and threats.
Identity’s risks and responses
how do we turn data into information
we give it structure, context and meaning
what software can be used to process data
Database
spreadsheet
features of a database(6)
tables for each focus queries forms reports switchboard validation and input masks
features of a spreadsheet(4)
functions(e.g. sum, max, min)
formula
charts and graphs
“what if analysis”
primary methods of data collection(6)
questionnaire observation interview loyalty schemes email requests consumer panels
secondary methods of data collection(4)
internet
books
magazines
government data sets
IT based methods of data collection
3
sensors
online questionnaires
cctv
big data
data collected on national/international scale
how can big data be used(3)
spot trends and patterns
identify solutions
spot emerging issues
hazard of big data
tend to be national and ignore local variation
ways we can judge data collection methods(5)
reliability bias cost two way style possible primary/secondary
benefits of an it network
share data and devices as well as cooperation
data types.(10)
text alphanumeric integer currency percentage decimal date/time limited choice object boolean
why set data types before collecting them
validate user inputs
why does data need to be stored (4)
has to be like that before processing
portability
backup
devices dont have limitless storage
4 portable storage media
p hard drive
external hard drive
memory stick
cloud
benefits of cloud storage
limitless
secure
accessible from any device
dont need local storage
ways we can back up data
full
incremental
validation
preventing data entry error
ways of validation(4)
presence check
length
input mask
look up list
verification
checking data is accurate
how to verify data(3)
physical checks
two step V
double entry
data destruction(name methods)
overwriting magnetic wipe(degaussing) physical destruction
what can security attacks do to data(4)
destruction
theft
modification
denial
types of security threats(5)
malware social ENG DDoS Hacking Botnet
types of malware(7)
Adware Bot-takes control of system bug-caused by human error ransomware-takes files/syst. hostage spyware-tracks user activity trojan-disguised attempt to take control of system Virus-breaks files/syst.
social engineering types(6)
phishing-fake links pretexting-criminal asks for ID info baiting-offering tempting links Quid pro quo-baiting with promise shoulder surfing Tailgating
logical ways of securing It network(6)
control access AV and firewalls control usr acces levels to resources encryption timed access back up
physical ways of securing it network(4)
locked facilities
security staff
entry pass cards and ID cards
CCTV
name biometric mthods
eyes.
voice
fingerprint
facial recognition
what can data attacks disrupt?
system
operations
communication
what can data attacks disrupt the safety of?(4)
customers
premise and equipment
staff
general public
what can be lost from data attacks?(3)
data and information
reputation
income
IT systems vulnerabilities(3)
Physical damage
system being out of data or system dont work
environmental damage
laws affecting IT users (7)
Copyright GDPR misuse of computers health and safety defamation freedom of information WEEE- disposal of it
features of GDPR(5)
Only store needed data can not store forever must get subjects permission can not share with others must be up to date
how can we present data (6)
report presentation graphs and charts integrated documents end user documents Tables
methods of information distribution(6)
messaging services websites Video or voice calls Multimedia cloud based IT Mobile apps