Week 2 Flashcards
What are the components of an Information System
-Software
-Hardware
-Data
-People
-Procedure
-Network
-An IS includes application (programs), OS, and assorted command utilities.
-is perhaps the most difficult IS components to secure
-carries the lifeblood of information through an organization
Software
The physical technology that houses and executes the software, stores and transport data, and provides interfaces for the entry and removal of information from the system.
Hardware
Policies deal with hardware as a physical asset from harm or theft.
Physical security
Data stored, processed, and transmitted by a computer system must be protected.
-Data is the most valuable asset of an organization and therefore is the main target of intentional attacks
Data
Though often overlooked in computer security considerations, _____ have always been a threat to information system.
People
Are written instructions for accomplishing a specific task. When an unauthorized user obtains an organization’s procedure, it poses a threat to the integrity of the information.
Procedure
2 APPROACHES TO INFORMATION SECURITY IMPLEMENTATION
Bottom-Up Approach
Top-Down Approach
A method of establishing security policies and/or practices that begins as a grassroots in system administrator attempt to improve the security of their systems.
Bottom-up approach
A methodology of establishing security policies and/or practices that is initiated by upper management.
Top-down approach
a methodology for the design and implementation of an information system. Using a methodology ensures a rigorous process with clearly defined goal and increases the probability of success.
SDLC
A type of SDLC in which each phrase of the process “flows from” the information gained in the previous phase, with multiple opportunities to return to previous phase, with multiple opportunities to return to previous phases phrase and make adjustments.
Waterfall model
WATERFALL MODEL
-A type of SDLC in which each phrase of the process “___ ____” the information gained in the previous phase, with multiple opportunities to return to previous phase, with multiple opportunities to return to previous phases phrase and make adjustments.
flows from
6 type of Waterfall model
Investigation
Analysis
Logical Design
Physical Design
Implementation
Maintenance and Change
-Begins by examining the event or plan that initiates the process
-During this phase, the objectives constraints, and scope of the project and specified.
Investigation
-This phase consists primarily of assessment of the organization, its current systems, and its capability to support the proposed systems
-Begin by determining what the new system is expected to do and how it will interact with existing systems.
ANALYSIS
Begin in creating a streams solution for a business problem. In any system solution, the driving factor must be the business need.
logical design
-Specific technologies are selected to support the alternatives identified and evaluated in the logical design.
PHYSICAL DESIGN
-Any needed software is created.
-Components are ordered, received and tested/ afterwards. Users are trained and supporting documentation created.
IMPLEMENTATION
-Longest and most expensive of the process. This phase consists of the task necessary to support and modify the system for the remainder of its useful life cycle.
MAINTENANCE AND CHANGE