Week 7 - Systems And Security Flashcards
What are the six strategies?
- centrally planned
- leading edge
- free market
- monopoly
- scarce resources
- necessary evil
What strategies have a strategic advantage and high dependence on day to day operations?
Centrally planned
Leading edge
What strategies have a strategic advantage but low dependence on day to day operations?
Leading edge
Free market
What strategies involve little strategic advantage but high dependence in day to day operations?
Monopoly
Scarce resources
What strategies involve little strategic advantage and little dependence on day to day operations?
Scarce resources
Necessary evil
What are some things about centralisation?
The five components (Hardware, Software, Data, People and Procedures) are under control of the IS department. This limits initiative from other departments
What are something about decentralisation?
It allows for more initiative, possibly encouraging innovation, poses risk (data integrity, security, duplication of effort, costs)
What are privacy and security?
Privacy is keeping personal or confidential information out of the wrong hands
Security is required to enforce these privacy policies
Security also involves ensuring continued access to required information
What are the 6 privacy principles?
Personal information must be collected directly from the individual concerned
The individual should be aware that information is collected, and of the purpose
Impose reasonable safeguards against loss, misuse or disclosure of personal information
Individuals must have access to information about them
Individuals should be able to request correction of their personal information
Personal information obtained in connection with one purpose must not be used for another
Security means preventing:
Unauthorised access to information
Unauthorised modification of information
Denial of service to authorised users
Provision of service to unauthorised users
What are security costs?
Expected cost of security failure is cost of an incident times the probability of it happening
A business needs to balance cost of security against expects cost
What are non-technological security features?
Data backups Power protection Physical disaster protection Alternative sites / disaster recovery Physical access control Precautions against social engineering
What are some technology based security features?
Firewalls Access control For: Networks Databases Applications And through the encryption of data Anti-malware software Activity monitoring