Week 7 - Systems And Security Flashcards

1
Q

What are the six strategies?

A
  • centrally planned
  • leading edge
  • free market
  • monopoly
  • scarce resources
  • necessary evil
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What strategies have a strategic advantage and high dependence on day to day operations?

A

Centrally planned

Leading edge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What strategies have a strategic advantage but low dependence on day to day operations?

A

Leading edge

Free market

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What strategies involve little strategic advantage but high dependence in day to day operations?

A

Monopoly

Scarce resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What strategies involve little strategic advantage and little dependence on day to day operations?

A

Scarce resources

Necessary evil

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some things about centralisation?

A

The five components (Hardware, Software, Data, People and Procedures) are under control of the IS department. This limits initiative from other departments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are something about decentralisation?

A

It allows for more initiative, possibly encouraging innovation, poses risk (data integrity, security, duplication of effort, costs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are privacy and security?

A

Privacy is keeping personal or confidential information out of the wrong hands

Security is required to enforce these privacy policies

Security also involves ensuring continued access to required information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 6 privacy principles?

A

Personal information must be collected directly from the individual concerned

The individual should be aware that information is collected, and of the purpose

Impose reasonable safeguards against loss, misuse or disclosure of personal information

Individuals must have access to information about them

Individuals should be able to request correction of their personal information

Personal information obtained in connection with one purpose must not be used for another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security means preventing:

A

Unauthorised access to information
Unauthorised modification of information
Denial of service to authorised users
Provision of service to unauthorised users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are security costs?

A

Expected cost of security failure is cost of an incident times the probability of it happening

A business needs to balance cost of security against expects cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are non-technological security features?

A
Data backups 
Power protection 
Physical disaster protection 
Alternative sites / disaster recovery 
Physical access control 
Precautions against social engineering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some technology based security features?

A
Firewalls 
Access control For: 
Networks
Databases
Applications 
And through the encryption of data
Anti-malware software 
Activity monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly