Chapter 8: Technology Management Flashcards

(33 cards)

1
Q

what is the role of the Head of IT?

A
  • Known as The Chief Information Officer (CIO) or a Chief Technology Officer (CTO).
  • sets the company’s technology strategy (in conjunction with the rest of the business)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is the role of the Head of production support?

A
  • usually responsible for the provision of all server and for the day-to-day running and support of the production (or live) systems.
  • Database administrators (DBAs) and Help desk analysts report to this individual
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is the role of the Head of Development and Implementation?

A

responsible for the commissioning of new applications and ensures smooth operation of the firm’s technology systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is the role of the Head of Business Continuity?

A

responsible for managing the company’s business continuity
plans (BCPs) and disaster recovery plans (DRPs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the building blocks of technology infrastructure?

A

client side interface, application, middleware/real-time messaging layer (software products that distribute and obtain real-time data to and from other parties)

the database that stores data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are the 7 operational risk types identified by Basel

A
  • Internal Fraud
  • External Fraud
  • damage to physical assets
  • Employment practices and safety
  • Clients and business practices
  • Execution, delivery and process management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what two categories can the governance of the risk management be divided into?

A

maintaining business as usual
introducing business change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are the technology implications of maintaining business as usual?

A

systems within the technology function, operational procedures need to be put in place

  • Ensuring business applications and the configurations are able to cope with normal business volumes
  • Recording deficiencies in the design or operation of systems
  • Protecting the organisation from system security issues
  • Ensuring system development keeps pace with rapidly evolving user requirements.
  • Ensuring minimal manual intervention
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are the technology implications of managing business change?

A
  • aligning technology strategy with the business strategy
  • aligning the solution to the strategic business drivers
  • managing and monitoring risks of introducing the change
  • providing visibility of risks and issues to responsible stakeholders
  • risk of over- (and under-) spend
  • risk of duplicate systems
  • Risk of delivering late, or not delivering what is required
  • complexity risk
  • scope expansion risk
  • managing external parties
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what does cyber security involve?

A

the methods and processes used to protect computer systems’ hardware, software and data from: Damage, theft, unauthorised use, and disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is hacking?

A

Stealing personal information to pose as someone else, often for financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is cyber espionage?

A

Stealing valuable and confidential information about products, services, patents, designs, and intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is Malware?

A

Software designed to gain unauthorized access to computer systems to disrupt operations or gather private information illegally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is Spyware?

A

Software that collects information without the user’s knowledge and sends it to a third party. It can gather personal data, interfere with user control, and be challenging to detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is Phishing?

A

Cybercrime designed to trick users into disclosing personal financial details by creating fake websites resembling legitimate ones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is Ransomware?

A

Blocking access to systems and threatening to publish or destroy data unless a ransom is paid

17
Q

what are Viruses, Worms and trojans?

A

Viruses are programs that copy and infect multiple files, while worms replicate without infecting other files. Trojans appear legitimate but result in unauthorized access to computer files

18
Q

what is Keylogging?

A

Recording keystrokes on a keyboard without the user’s knowledge, often used to capture personal details

19
Q

what is Form Grabbing?

A

Intercepting and collecting data submitted to web browsers before it passes over the internet

20
Q

what are Botnets?

A

Networks of computers controlled by cybercriminals through malware.

21
Q

what are DDoS Attacks?

A

Distributed Denial of Service (DDoS) attacks aim to make a machine or network resource unavailable by overwhelming it with a high volume of requests. The motives can range from vandalism and political reasons to revenge or competitor sabotage

22
Q

what are the functions of a help desk?

A
  • Receive issues from users and prioritise them
  • pass them to the appropriate individuals for action
  • monitor whether the issue has been actioned, close the issues or escalate them to management
  • provide a database of ‘FAQs that can be used by help desk
  • provide statistical and trend reports to management
23
Q

what is an SLA?

A

contract between a service provider and its customers, in which a
certain level of service is agreed upon

refers to both the quality of the service, the time deadlines, and specifies penalties to be paid by either party

24
Q

what are Key Performance Indicators (KPIs)?

A

metrics used to measure the performance of a service or process

25
what is Service level management (SLM)?
management of SLAs to ensure that they are up to date and current
26
what is the Disaster Recovery Planning Process?
* Obtain Top Management Commitment * Establish a Planning Committee * Perform a Risk Assessment * Establish Priorities for Processing and Operations
27
what is a BCP?
Business continuity plans (BCPs): concerned with ensuring that the firm is able to recover from an emergency such as utility disruptions, software failures and hardware failures
28
what is DR?
Disaster recovery (DR): the process of regaining access to the data, hardware and software necessary to resume critical business operations after Loss of internal or external application, Physical damage events, Natural disaster
29
what is operational resilience?
firms are expected to proactively take ownership of their operational resilience and treat it as a priority activity
30
what are change control procedures?
processes designed to prevent software or hardware from being amended without control, auditability and review of the impact by all interested parties
31
what is technology risk?
the risk that technology configuration complexity creates a business risk because, the configuration is costly and complex to run and this makes changes challenging
32
how can technology business risk be managed?
 management of applications  implementing solid processes for DR and BCP  employing solid and rigorously reinforced change control process  implementing an organisation-wide business change process
33