LU4 pt. 2 Flashcards

1
Q

What is business software?

A

It is any software or set of computer programs used by business users to perform various business functions. Used to increase productivity, measure productivity, to perform other business functions accurately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

XXX XXX involve complex pieces of software that are very expensive to purchase and implement. It might take a larger fortune 500 company several
years to complete a large scale implementation of an enterprise system.

A

XENTERPISE APPLICATIONSX involve complex pieces of software that are very expensive to purchase and implement. It might take a larger fortune 500 company several
years to complete a large scale implementation of an enterprise system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Next Gen. Enterprise Applications are:

A

Enterprise solutions, enterprise suites or e-business suites to make their CRM, SCM and ERP (Enterprise Resource Planning) systems work closely with each other and link to systems of customers and suppliers (SAP Business Suite, Oracle E-Business Suite, Microsoft Dynamics Suite).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Advantage of using Social CRM tools:

A

Business can better engage with their customers. They enable a business to connect customer conversations and relationships from social networking sites to CRM processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Corporate systems:

A

People that have the most knowledge in IT; if your
corporate systems is hacked, then the entire system is going to be hacked. This one
needs to be secured the most

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Corporate servers:

A

Where you put your applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

XXX XXX may store information on weapons systems, intelligence
operations, and military targets. These information assets have tremendous value, and the repercussions can be devastating if they are lost, destroyed, or placed in the wrong hands.

A

XGOVERNMENT SYSTEMSX may store information on weapons systems, intelligence
operations, and military targets. These information assets have tremendous value, and the repercussions can be devastating if they are lost, destroyed, or placed in the wrong hands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Inadequate security and control =>

A

Serious legal liability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

XXX XXX and control framework that protects business information assets can produce a high return on investment. Strong security
and control also increase employee productivity and lower operational
costs.

A

XA SOUND SECURITYX and control framework that protects business information assets can produce a high return on investment. Strong security
and control also increase employee productivity and lower operational
costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In a XXX XXX a firm is obligated to respond to a discovery request for access to information that may be used as evidence. Company is required by law to produce those data. If the data is not handed over correctly and completely, the court can impose sever XXX and XXX penalties.

A

In a XLEGAL ACTIONX a firm is obligated to respond to a discovery request for access to information that may be used as evidence. Company is required by law to produce those data. If the data is not handed over correctly and completely, the court can impose sever XFINANCIALX and XCRIMINALX penalties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does Computer Forensics entail?

A

It is the scientific collection, examination, authentication, preservation and analysis of data held on or retrieved from computer storage media in such a way that information can be used as evidence in a court of law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does Computer Forensics deal with?

A
  • Recovering data
  • Secure strong of recovery data
  • Finding significant information
  • Presenting information to a court of law
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is encryption?

A

The process of transforming plain text to data into chipper text it cannot be read by anyone other than the sender and the intended receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who is responsible for the security of data when working in the cloud?

A

For protection of sensitive data, the accountability and responsibility still resides
with the company owning that data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does identity management software do?

A

It automates the process of keeping track of all
these users and their system privileges, assigning each user a unique digital identity
for accessing each system.

It includes the following tools:

  • Authenticating users
  • protecting user identifies
  • controlling access to system resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is authentication?

A

It refers to the ability to know that a person is who he or she
claims to be.

Authentication is established by using passwords, only known by the user.

  • Password systems that are too rigorous hinder employee productivity.
  • Passwords can also be sniffed if transmitted over a network or stolen through
    social engineering.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a token?

A

A physical device, similar to an identification card, that is designed to prove the identity of a single user. Tokens are small gadgets that typically fit on key
rings and display passcodes that change frequently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a smart card?

A

A device about the size of a credit card that contains a chip formatted with access permission and other data.

19
Q

What is biometric authentication?

A

It uses systems that read and interpret individual
human traits, such as finger prints, irises and voices to grant or deny access.

  • Based on a physical and behavioural trait
20
Q

What is a two factor authentication?

A

It means validating users through a multistep process
- Good example can be a bank card; card is a physical item and the PIN (personal
identification number) is the data that go with it.

21
Q

What is a firewall?

A

Prevents unauthorised users from accessing private networks; it is a
combination of hardware and software that controls the flow of incoming and
outgoing network traffic.

  • It is placed between the organisation’s private internal network and distrusted
    external networks, such as the internet;
  • Firewalls can also protect one part of the company’s network from the rest of the
    network.
  • Firewall identifies: IP addresses, applications, incoming traffic.
  • Prevents unauthorised communication into and out of the network.
22
Q

What are some firewall screening technologies?

A

Static packet filtering, stateful inspection,
network address translation, and application proxy filtering.

These are used in
combination to provide firewall protection.

23
Q

What is packet filtering?

A

It examines selected fields in the headers of data packs flowing back and forth between the trusted network and the internet, examining individual
packets in isolation.

24
Q

What is stateful inspection?

A

It is additional security by determining whether packets are part of ongoing dialogues between the sender and a receiver.

25
Q

What is a NAT (Network Address Translation)?

A

It provides another layer of protection the static packet filtering and stateful inspection are employed.

NAT conceals the IP
addresses of the organisation’s internal host computer(s) to prevent sniffer programs outside the firewall from ascertaining them and using that information to penetrate internal systems.

26
Q

What is application proxy filtering?

A

It examines the application content of packets. It
stops data packers originating outside the organisation, inspects them and passes a
proxy to the other side of the firewall.

27
Q

What is an intrusion detection system?

A

It features full-time monitoring tools placed at the most vulnerable points or hot spots of corporate networks to detect and deter intruders continually.

  • System generates an alarm in case of suspicious event.
  • Customised to shut down a particularly sensitive part of the network if it received
    unauthorised traffic.
28
Q

What is antivirus software?

A

It prevents, detects, and removes malware, including
computer viruses, computer worms, Trojan horses, spyware and adware.

  • Most antivirus are effective against malware already known when the software
    was written=> you need to update
29
Q

What are UTMs (Unified Threat Management Systems)?

A

They help businesses reduce costs and improve manageability, security vendors have combined into a single appliance various security tools, including firewalls, virtual private networks, intrusion detection systems, and web content filtering and anti-spam software.

30
Q

What is encyption?

A

It’s the process of transforming plain text or data into cipher text that
cannot be read by anyone other tan the sender and the intended receiver.

  • Data is encrypted by using a numerical code (encryption key), that transforms plain data into cipher text.
31
Q

What are the two methods of encryption?

A
  • Symmetric key encryption

- Public key encryption

32
Q

What is symmetric key encryption?

A
  • The sender and receiver establish a secure internet
    session by creating a single encryption key and sending it to the receiver so both
    the sender and receiver share the same key.
  • Strength is measured by its bit length
  • The longer the key, the more difficult it is to break the key. Downside: the
    longer the key, the more computing power it takes for legitimate users to process
    the information
  • Disadvantage: key must be shared among sender and receivers=> exposes the
    key to outsiders who can intercept and decrypt it
33
Q

What is public key encryption?

A

more secure; it uses two keys:
I. One shared (public)
II. One totally private:
The keys are mathematically related so that data encrypted with one key can be decrypted using only the other key.

34
Q

What are digital certificates?

A

Data files used to establish the identity of users and electronic assets for production of online transactions.

35
Q

Ensuring system availability:

A

As companies increasingly rely on digital networks for revenue and operations, they need to take additional steps to ensure that their systems and applications are always available.

36
Q

XXX XXX XXX contain redundant hardware, software, and
power supply components that create an environment that provides continuous,
uninterrupted service.

A

XFAULT-TOLERANT COMPUTER SYSTEMSX contain redundant hardware, software, and
power supply components that create an environment that provides continuous,
uninterrupted service.

37
Q

What is downtime?

A

It refers to periods of time in which a system is not operational.

38
Q

Controlling network traffic =>

A

Deep packet inspection

39
Q

What is Deep Packet Inspection (DPI)?

A

DPI examines data files
and sorts out low-priority online material while assigning higher priority to
business-critical files.

40
Q

What do Managed Security Service Providers (MSSPs) do?

A

They monitor network activity and perform vulnerability testing and intrusion detection.

41
Q

Mobile device management tools are used for:

A
  • Authorisation
  • Maintaining inventory records
  • Controlling updates
  • Locking down or erasing lost & stolen devices
  • Data loss prevention technology
42
Q

What does data loss prevention technology do?

A

It can identify where critical data are saved, who is

accessing the data, how data are leaving the company, and where the data are going.

43
Q

The costs of technology consist out of:

A
• Original cost of acquiring and installing Hardware & Software 
• Administration cost for upgrades 
• Upgrades of Hardware & Software 
• Maintenance 
• Technical support 
• Training 
• Utilities & real estate costs 
Administration costs: Cost for upgrades beside the software
44
Q

What does the TCO (Total Cost of Ownership Model) do?

A

It analyses direct and indirect costs to help firms determine the
actual cost of specific technology implementations.