Definitions and Key Terms Flashcards
(28 cards)
Data Integrity
Accuracy
Authenticity
Reasonableness
Relevance
Correctness
Timeliness
Effectiveness
Accessibility
Accuracy
Attractiveness
Clarity
Communication of message
Completeness
Readability
Relevance
Timeliness
Usability
Efficiency
Time, cost and effort
Data
Raw, unmanipulated, unorganised fact
Information
Organized and manipulated data
Characteristics of information for educating targeted audiences
Age
Gender
Commonality of language
Culture inclusiveness
Data types
Character
Numeric
Boolean (true or false/ yes or no / 1 or 0)
Binary (images and sounds)
Design Principles - Functionality and Usability
Robustness
Flexibility
Ease of use
Accessibility - including navigation and error tolerance
Design Principles - Appearance
Alignment
Balance
Contrast
Image use
Space
Text and table formatting
Design Tools
Data dictionary
IPO (Input-process-output) charts,
Object descriptions
Pseudocode
For an infographic - mockups, layout diagrams
Design Idea Tools
Brainstorming
Mind maps
PMI (plus, minus, interesting) charts
POOCH (problem, options, outcomes, choices) charts
Venn diagrams
Disaster Recovery Plan
Evacuation Plan
Backup Plan
Restoration Plan
Test Plan
Accidental Threats
Unintentional and unexpected threats.
- User error
- Power loss
- Hardware/Software malfunction
- Hardware loss
- Lack of security/knowledge
Deliberate Threats
Threats that are created to cause loss or damage to the data or information system.
- Malware
- Hacking
- Phishing
- Denial of Service (Ddos) Attacks
- Theft
Event-Based Threat
Threats to data and information that are a result of a natural, uncontrollable event.
- Extreme weather events such as fires, floods, heatwaves, storms, earthquakes
- Power surges
Software Security Controls
- Usernames and Passwords
- Access Logs
- Audit Trails
- Access restrictions
- Firewalls
- Two factor authentication
- Encryption
- Firewalls
- System protection eg: antivirus
- Security Protocols (Transport Layer Security (TLS))
Physical Security Controls
- Zone Security Strategies: Involves breaking down network into discreate sections or zones (Damage caused by security threats can be limited to one zone and the zone can be blocked off)
- Barrier techniques: Fences, gates, bars on windows, doors with locks using swipe cards, password touch pads, active badges, voice recognition and biometrics, guards, CCTV
- Biometrics: unique physical attribute of an individual e.g. fingerprint
- Uninterrupted Power Supply (UPS): Battery backup, provides backup power when your main power cuts out; stops everything from cutting out at the same time
Physical Procedures
Backups
Shredding Documents
Checking Authorization Credentials
Solution Constraints
The conditions or limitations that must be taken into account when designing a solution.
* Economic – time and cost
* Technical – speed of processing, capacity, availability of equipment, compatibility and security
* Social – level of expertise of user
* Legal – ownership and privacy of data requirements
* Usability – usefulness and ease of use of a solution
Validation
Checks that data is reasonable and complete
- Existence check
- Data type check
- Range check
Verification
Proofreading and checking against the source data
Archiving
Removing the files from the everyday file storage system to store in an archiving system
Flat file database
One or more unlinked tables
Relational database
Multiple tables linked together in structures such as one to one, one to many, many to one, many to many