System Design, Deployment and Maintenance Flashcards
What is a control?
Device or mechanism installed on instituted to guide or regulate the activities or operation of a system.
What is security?
Protection of assest.
What does security aim to do?
Protect from unathorised access, inappropiate alteration of data, system failure
What are the types of security?
Prevention (prevent assets being lost or damaged) Detection (inform about damage to an asset, the nature of what caused it) Reaction (measures by which assets can be recovered or repaired).
What are examples of Physical Security?
Physical access, envrionmental controcts, uninterrupted power
What is Contingency Planning?
Actions planned to react to disasters - e.g. sites (dr)
What is a Backup?
A security copy file of a file or database for use in the event of loss or damage to the original.
What is Recovery?
Bring back the backup copy so that it replace a file or databse which has been lost/damaged.
How do we classify data?
Critical - needed - not important
What is Logical Security?
Anti-virus, pen testing, encryption, digital signature
What is Application Access Security?
Identification (who you are) Authentication (prove who you are) Authorisation (what right you have) Access (grant access in accordance to authentication rights).
What is an Audit Trail/Forensics?
Record showing who accessed a computer system and what operations they performed.
What are Legislative and Ethical Controls?
Software must control that the business is not breaking the law
What is Verification of Input Data?
Process of assessing whether the data is true (correct, accurate)
What is Validation of Data?
Assessing whether the data input is correct according to standards that have been set.