Chapter 12 - Managing Systems Support and Security Flashcards
(115 cards)
One of four risk control strategies. In __________, the risk is accepted and nothing is done. Risk is usually accepted only if protection from risk is clearly not worth the expense.
acceptance
Adds new capability and enhancements to an existing system.
adaptive maintenance
An account that allows essentially unrestricted access to the application.
administrator account
Documents the system at the end of the design phase and identifies any changes since the functional baseline. The ________________ includes testing and verification of all system requirements and features.
allocated baseline
A person who works on new systems development and maintenance.
applications programmer
The storage of previous version of a system when a new version is installed.
archived
Hardware, software, data, networks, people, or procedures that provide tangible or intangible benefit to an organization.
asset
A hostile act that targets an information system, or an organization itself.
attack
Enables an application to contact the vendor’s server and check for a needed patch.
automatic update service
One of the three main elements of system security: confidentiality, integrity, and _______________ (CIA). ______________ ensures that authorized users have timely and reliable access to necessary information.
availability
One of four risk control strategies. In _____________, adding protective safeguards eliminates the risk.
avoidance
Data storage options, including tape, hard drives, optical storage, and online storage.
backup media
Detailed instructions and procedures for all backups.
backup policy
A formal reference point that measures system characteristics at a specific time. Systems analysts use ______________ as yardsticks to document features and performance during the systems development process.
baseline
A form of testing used by companies to measure system performance.
benchmark testing
Mapping an individual’s facial features, handprint, or eye characteristics for identification purposes.
biometric scanning systems
A password that must be entered before the computer can be started. It prevents an unauthorized person from booting a computer by using a secondary device.
BIOS-level password / Power-on Password / Boot-level password
A plan that defines how critical business functions can continue in the event of a major disruption.
business continuity plan (BCP)
A process that monitors current activity and performance levels, anticipates future activity, and forecasts the resources needed to provide desired levels of service.
capacity planning
A process for controlling changes in system requirements during software development; also an important tool for managing system changes and costs after a system becomes operational.
change control (CC)
The three main elements of system security: confidentiality, integrity, and availability.
CIA triangle
One of the three main elements of system security: ______________, integrity, and availability (CIA). ______________ protects information from unauthorized discloser and safeguards privacy.
confidentiality
A process for controlling changes in system requirements during the development phases of the SDLC. __ also is an important tool for managing system changes and costs after a system becomes operational.
configuration management (CM)
A real-time streaming backup method that records all system activity as it occurs.
continuous backup