Chapter 8: Technology Management Flashcards

1
Q

what is the role of the Head of IT?

A
  • Known as The Chief Information Officer (CIO) or a Chief Technology Officer (CTO).
  • sets the company’s technology strategy (in conjunction with the rest of the business)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is the role of the Head of production support?

A
  • usually responsible for the provision of all server and for the day-to-day running and support of the production (or live) systems.
  • Database administrators (DBAs) and Help desk analysts report to this individual
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is the role of the Head of Development and Implementation?

A

responsible for the commissioning of new applications and ensures smooth operation of the firm’s technology systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is the role of the Head of Business Continuity?

A

responsible for managing the company’s business continuity
plans (BCPs) and disaster recovery plans (DRPs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what are the building blocks of technology infrastructure?

A

client side interface, application, middleware/real-time messaging layer (software products that distribute and obtain real-time data to and from other parties)

the database that stores data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are the 7 operational risk types identified by Basel

A
  • Internal Fraud
  • External Fraud
  • damage to physical assets
  • Employment practices and safety
  • Clients and business practices
  • Execution, delivery and process management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what two categories can the governance of the risk management be divided into?

A

maintaining business as usual
introducing business change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are the technology implications of maintaining business as usual?

A

systems within the technology function, operational procedures need to be put in place

  • Ensuring business applications and the configurations are able to cope with normal business volumes
  • Recording deficiencies in the design or operation of systems
  • Protecting the organisation from system security issues
  • Ensuring system development keeps pace with rapidly evolving user requirements.
  • Ensuring minimal manual intervention
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are the technology implications of managing business change?

A
  • aligning technology strategy with the business strategy
  • aligning the solution to the strategic business drivers
  • managing and monitoring risks of introducing the change
  • providing visibility of risks and issues to responsible stakeholders
  • risk of over- (and under-) spend
  • risk of duplicate systems
  • Risk of delivering late, or not delivering what is required
  • complexity risk
  • scope expansion risk
  • managing external parties
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what does cyber security involve?

A

the methods and processes used to protect computer systems’ hardware, software and data from: Damage, theft, unauthorised use, and disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is hacking?

A

Stealing personal information to pose as someone else, often for financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is cyber espionage?

A

Stealing valuable and confidential information about products, services, patents, designs, and intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is Malware?

A

Software designed to gain unauthorized access to computer systems to disrupt operations or gather private information illegally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is Spyware?

A

Software that collects information without the user’s knowledge and sends it to a third party. It can gather personal data, interfere with user control, and be challenging to detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is Phishing?

A

Cybercrime designed to trick users into disclosing personal financial details by creating fake websites resembling legitimate ones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is Ransomware?

A

Blocking access to systems and threatening to publish or destroy data unless a ransom is paid

17
Q

what are Viruses, Worms and trojans?

A

Viruses are programs that copy and infect multiple files, while worms replicate without infecting other files. Trojans appear legitimate but result in unauthorized access to computer files

18
Q

what is Keylogging?

A

Recording keystrokes on a keyboard without the user’s knowledge, often used to capture personal details

19
Q

what is Form Grabbing?

A

Intercepting and collecting data submitted to web browsers before it passes over the internet

20
Q

what are Botnets?

A

Networks of computers controlled by cybercriminals through malware.

21
Q

what are DDoS Attacks?

A

Distributed Denial of Service (DDoS) attacks aim to make a machine or network resource unavailable by overwhelming it with a high volume of requests. The motives can range from vandalism and political reasons to revenge or competitor sabotage

22
Q

what are the functions of a help desk?

A
  • Receive issues from users and prioritise them
  • pass them to the appropriate individuals for action
  • monitor whether the issue has been actioned, close the issues or escalate them to management
  • provide a database of ‘FAQs that can be used by help desk
  • provide statistical and trend reports to management
23
Q

what is an SLA?

A

contract between a service provider and its customers, in which a
certain level of service is agreed upon

refers to both the quality of the service, the time deadlines, and specifies penalties to be paid by either party

24
Q

what are Key Performance Indicators (KPIs)?

A

metrics used to measure the performance of a service or process

25
Q

what is Service level management (SLM)?

A

management of SLAs to ensure that they are up to date and current

26
Q

what is the Disaster Recovery Planning Process?

A
  • Obtain Top Management Commitment
  • Establish a Planning Committee
  • Perform a Risk Assessment
  • Establish Priorities for Processing and Operations
27
Q

what is a BCP?

A

Business continuity plans (BCPs): concerned with ensuring that the
firm is able to recover from an emergency such as utility disruptions, software failures and hardware failures

28
Q

what is DR?

A

Disaster recovery (DR): the process of regaining access to the data, hardware and software necessary to resume critical business operations after Loss of internal or external application, Physical damage events, Natural disaster

29
Q

what is operational resilience?

A

firms are expected to proactively take ownership of their operational resilience and treat it as a priority activity

30
Q

what are change control procedures?

A

processes designed to prevent software or hardware from being amended without control, auditability and review of the impact by all interested parties

31
Q

what is technology risk?

A

the risk that technology configuration complexity creates a business risk because, the configuration is costly and complex to run and this
makes changes challenging

32
Q

how can technology business risk be managed?

A

 management of applications
 implementing solid processes for DR and BCP
 employing solid and rigorously reinforced change control process
 implementing an organisation-wide business change process

33
Q
A