System Design, Deployment and Maintenance Flashcards
What is a control?
Device or mechanism installed on instituted to guide or regulate the activities or operation of a system.
What is security?
Protection of assest.
What does security aim to do?
Protect from unathorised access, inappropiate alteration of data, system failure
What are the types of security?
Prevention (prevent assets being lost or damaged) Detection (inform about damage to an asset, the nature of what caused it) Reaction (measures by which assets can be recovered or repaired).
What are examples of Physical Security?
Physical access, envrionmental controcts, uninterrupted power
What is Contingency Planning?
Actions planned to react to disasters - e.g. sites (dr)
What is a Backup?
A security copy file of a file or database for use in the event of loss or damage to the original.
What is Recovery?
Bring back the backup copy so that it replace a file or databse which has been lost/damaged.
How do we classify data?
Critical - needed - not important
What is Logical Security?
Anti-virus, pen testing, encryption, digital signature
What is Application Access Security?
Identification (who you are) Authentication (prove who you are) Authorisation (what right you have) Access (grant access in accordance to authentication rights).
What is an Audit Trail/Forensics?
Record showing who accessed a computer system and what operations they performed.
What are Legislative and Ethical Controls?
Software must control that the business is not breaking the law
What is Verification of Input Data?
Process of assessing whether the data is true (correct, accurate)
What is Validation of Data?
Assessing whether the data input is correct according to standards that have been set.
What are Input and Output in Validation and Verification?
Data input, amount of data falls in input. Data output should be checked too (boundary conditions)
What is the Human Computer Interaction (HCI)?
Humans vs. Computer have different ways of interpresting data - HCI deals with the most effective way to bridge this difference.
What are some Design Principles?
Provide value to stakeholders - keep it simple - maintain the vision - what you produce others will consume - be open to the future - plan ahead for reuse - think!
What are some Design Contraints?
Legal (data protection) ethical (personal data usage) financial (affordability)
What is Sign-off and Deployment?
Sign off from the project team, configuration and change and release mgmt, user training, data conversion, business readiness
What is a Pilot?
whole system delivered to a small group of users
What is Parallel Running?
old and new system run in parallel until an agreed date
What is Phased?
phase delivery of functionality
What is a Big Bang?
turn off the old system and turn on the new one
What are some handover considerations?
cost - risk - time - resource
Advantages/Diadvantages of Big Bang?
Obtain quick benefits (cheap approach) - high risk, especially in greenfield sites - consider when there is no other way, inescapable deadlines, small change
Advantages/Diadvantages of Pilot?
Low risk approach, allow for resolution before full go live, easy to roll back - delays benefits, not always possible, are pilot sites representative? - consider when greenfield software or combined process change
Advantages/Diadvantages of Phased?
concentrates resources, minimises disruption - not always possible, requires special interfaces - cosnider when software that is clearly modular with little coupling elsewhere
Advantages/Diadvantages of Parallel?
safe approach and build confindence - delays benefits, resource intensive, ability to reconcile systems - safety critical systems or numbers intesnive systems
What is a Post Implementation Review?
A review done after the system has gone live to validate that we have delivered what the user needs and to verify we met the objectives
What are the objectives of a Post Impelementation Review?
Review new system - evaluate against orginal objectives (cost/benefit) - document problem areas - prepare post implemenetation review
What is the approach to the Post Implementation Review?
It should include, incident reports, error logs, performance figures, support requirements. It will evalute the information, identify any problem or opportunity, and the report will include an action plan.
What is Corrective?
Corrective maintenance is fixing something that is broken
What is Perfective?
Perfective maintenance is making improvements
What is Preventative?
Preventative maintenance is making changes to prevent future problems
What is Adaptive?
Adaptative maintenance is adapting software for a different use