System Design, Deployment and Maintenance Flashcards

1
Q

What is a control?

A

Device or mechanism installed on instituted to guide or regulate the activities or operation of a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is security?

A

Protection of assest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does security aim to do?

A

Protect from unathorised access, inappropiate alteration of data, system failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the types of security?

A

Prevention (prevent assets being lost or damaged) Detection (inform about damage to an asset, the nature of what caused it) Reaction (measures by which assets can be recovered or repaired).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are examples of Physical Security?

A

Physical access, envrionmental controcts, uninterrupted power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Contingency Planning?

A

Actions planned to react to disasters - e.g. sites (dr)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Backup?

A

A security copy file of a file or database for use in the event of loss or damage to the original.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Recovery?

A

Bring back the backup copy so that it replace a file or databse which has been lost/damaged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do we classify data?

A

Critical - needed - not important

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Logical Security?

A

Anti-virus, pen testing, encryption, digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Application Access Security?

A

Identification (who you are) Authentication (prove who you are) Authorisation (what right you have) Access (grant access in accordance to authentication rights).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an Audit Trail/Forensics?

A

Record showing who accessed a computer system and what operations they performed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Legislative and Ethical Controls?

A

Software must control that the business is not breaking the law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Verification of Input Data?

A

Process of assessing whether the data is true (correct, accurate)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Validation of Data?

A

Assessing whether the data input is correct according to standards that have been set.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are Input and Output in Validation and Verification?

A

Data input, amount of data falls in input. Data output should be checked too (boundary conditions)

17
Q

What is the Human Computer Interaction (HCI)?

A

Humans vs. Computer have different ways of interpresting data - HCI deals with the most effective way to bridge this difference.

18
Q

What are some Design Principles?

A

Provide value to stakeholders - keep it simple - maintain the vision - what you produce others will consume - be open to the future - plan ahead for reuse - think!

19
Q

What are some Design Contraints?

A

Legal (data protection) ethical (personal data usage) financial (affordability)

20
Q

What is Sign-off and Deployment?

A

Sign off from the project team, configuration and change and release mgmt, user training, data conversion, business readiness

21
Q

What is a Pilot?

A

whole system delivered to a small group of users

22
Q

What is Parallel Running?

A

old and new system run in parallel until an agreed date

23
Q

What is Phased?

A

phase delivery of functionality

24
Q

What is a Big Bang?

A

turn off the old system and turn on the new one

25
Q

What are some handover considerations?

A

cost - risk - time - resource

26
Q

Advantages/Diadvantages of Big Bang?

A

Obtain quick benefits (cheap approach) - high risk, especially in greenfield sites - consider when there is no other way, inescapable deadlines, small change

27
Q

Advantages/Diadvantages of Pilot?

A

Low risk approach, allow for resolution before full go live, easy to roll back - delays benefits, not always possible, are pilot sites representative? - consider when greenfield software or combined process change

28
Q

Advantages/Diadvantages of Phased?

A

concentrates resources, minimises disruption - not always possible, requires special interfaces - cosnider when software that is clearly modular with little coupling elsewhere

29
Q

Advantages/Diadvantages of Parallel?

A

safe approach and build confindence - delays benefits, resource intensive, ability to reconcile systems - safety critical systems or numbers intesnive systems

30
Q

What is a Post Implementation Review?

A

A review done after the system has gone live to validate that we have delivered what the user needs and to verify we met the objectives

31
Q

What are the objectives of a Post Impelementation Review?

A

Review new system - evaluate against orginal objectives (cost/benefit) - document problem areas - prepare post implemenetation review

32
Q

What is the approach to the Post Implementation Review?

A

It should include, incident reports, error logs, performance figures, support requirements. It will evalute the information, identify any problem or opportunity, and the report will include an action plan.

33
Q

What is Corrective?

A

Corrective maintenance is fixing something that is broken

34
Q

What is Perfective?

A

Perfective maintenance is making improvements

35
Q

What is Preventative?

A

Preventative maintenance is making changes to prevent future problems

36
Q

What is Adaptive?

A

Adaptative maintenance is adapting software for a different use