ITEC 85 (SIR CAUREL) Flashcards
is an important
asset to every individual or
organization
Digital information
it is a field the
process the safeguarding of the
integrity of data use by individuals or
organization
Information Assurance
Prevents unwanted access to private
information
Information Security
Development and implementation of
tools and technique for keeping data
safe.
Information Security
Designing of defense mechanism
software
Information Security
Information Security
Similarities of Information Assurance and
Security
CNSS SECURITY MODEL
John McCumber called McCumber
Cube
smartphone that fits a
pocket or large as a super computer
Computer Hardware-
-peripherical devices, such as
keyboards, externals disk, drives and routes
Computer Hardware-
let the hardware
knows what to do
- Computer Software-
-it sends signal task
- Computer Software-
– connects the
hardware together to form a network.
- Telecommunication
a network is a set of computers that
is connected wired or wireless.
- Telecommunication
-LAN & WAN
- Telecommunication
-component where the “material”
that the other component work with resides.
-place where data is collected and
from which it can be retrieved by QUERYING
- Database and Database Warehouse
- the final and possibly most
important component of information system
is the human element. - people that are needed to run the
system and the procedure
- Human Resources and ProcedureS
➢ Should result in a high-quality system
that meets customers expectations,
reaches completion within time and
cost evolutions and works.
(RDITDOM)
* Requirements
* Design
* Implementation
* Testing
* Deployment
* Operation
* MaintenancE
SYSTEM DEVELOPMENT LIFE CYCLE (SDLC)
– Systematic approach which
explicitly breaks down the work into phase
that required to implement (PADIM
PHASE OD SDLC
obtain approval of project
initiate, plan schedule
Planning:
understand business needs
and processing needs
Analysis
solution system based on
requirements and analysis decision
Design
construct, test, train
users, install new system
Implementation
: keep system healthy
and improve
Maintenance
Is defined as the set of procedures
that are executed in a sequence in the
software development cycle (SDLC)
SECURITY SYSTEM DEVELOPMENT LIFE CYCLE
process is
started by the officials/directives
working at the top-level management
- System Investigation
detailed
documentation analysis of the
documents form
- System Analysis
development of tools
and the following blueprints
- Logical Design
technical teams
acquire tool and blueprint
- Physical Design
carried out with the
help of various teams aggressively
testing
- Implementation
the security program
must be kept up to date
- Maintenance-
in layman’s term, is
digital assault on computer network.
cyberattack
Is malicious
act that attempts to damage data,
steal data or destroy life in general
cyber threat
include computer
viruses, data breathes and denial of
service
Cyber threats
Here are 8 biggest threats of businesses.
- Financial Issues
- Laws And Regulation
- Broad Economic Uncertainly
- Attracting And Retaining Talent
- Legal Liability
- Cyber, Computer, Technology
Risk/Data Breaches - Increasing Employee Benefits Cost
- Medical Cost Inflation
extortion of money in
exchange of files
- Ransomware