lecture 7: security and controls Flashcards

1
Q

system controls

A

mechanisms and procedures that are built into a system to safeguard the system and the information within

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

integrity controls

A

a control that rejects invalid data, inputs, prevented unauthorized outputs, and protects data against accidental or malicious attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

security controls

A

are less application specific but its part of the operating system and network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

input controls

A
  • value limit control
  • completeness control
  • data validation control
  • field combination control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

output controls

A
  • physical access to printers and display devices
  • discarded data (shredding)
  • labeling printed output to identify and verify source
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is security controls

A

a control that protects the assets of an organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

objective of security controls

A
  • maintain a stable and functioning operating environment for users
  • protect information and transactions during transmission on the internet and other insecure environments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

access control

A
  • controlling who accesses the data and their position and level
  • privileged: senior, manager, administrator
  • registered: system developer, supplier
  • unregistered: customers, employees
  • unauthorized: people from competitor company, former employees, hackers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

symmetric key encryptions

A
  • person 1 and person 2 share the same secret key which will encrypt and decrypt data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

asymmetric key encryptions

A
  • person 1 and person 2 share different secret keys which will encrypt and decrypt data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

public key encryptions

A
  • uses public key for ENCRYPTION and a secret key for DECRYPTION
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

digital certificate

A
  • authenticates web credentials and lets the recipient know that the data is from a trusted source
  • it is issued by the certificate authority (CA)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

describe OOA

A

OOA helps in giving a better understanding in the problem we are trying to solve.
It deals with defining the problem, where the models used focus on the understanding of the objectives and defining the functions that will lead to the solution.
Through OOA, we can know the limits, tradeoffs and requirements when discussing how the problem can be overcome.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

describe OOD

A

OOD deals with how the solution is implemented and how it is maintained.
Through OOD we can understand how the solution will flow between the varying users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

how to extend and integrate requirement models

A
  • use case diagrams
  • use case descriptions
  • activity diagram
  • system sequence diagram
  • domain model class diagram
  • ERD
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

steps to SSD

A

1) identify input message
2) describe the message from the external actor to the system
(verb-noun e.g.: addItem)
3) identify any conditions for the input (loop, alternate, optional)
4) identify and add output message from system to actor
(dashed line)