EXAM 3 Flashcards
(35 cards)
definition
software development lifecycle (SDLC)
process for planning, creating, testing and deploying an information system-usually 6 steps involved:
-planning
-analysis
-design
-testing
-implementation
-maintenance
definition
scrum
an approach to developing software (there’s 4 approaches)
approach to organizing and managing agile projects that breaks deliverables into “sprints: delivered into one to six week increments by teams of less than ten
defines functions as roles, artifacts, and ceremonies
definition
roles
a function of the scrum approach to developing software
product ownwer, scrum master, and team
definition
artifacts
a function of the scrum approach to developing software
product vision, product backlog, sprint backlog, task board and burndown chart
definition
ceremonies
a function of the scrum approach to developing software
sprint planning, daily scrum, sprint demo and review and retrospective
definition
Project Management Office (PMO)
a centralized team or department within an organization that standardizes and oversees project management practices to improve efficiency, consistency, and alignment with the organization’s strategic goals
5 main functions of a PMO:
-setting standards
-resource management
-governance
-performance tracking
-training and support
definition
portfolio management
the process of managing a collection of projects, programs, or initatives (known as a “portfolio”) in a way that aligns with the organization’s overall strategic goals and maximizes value
What’s the difference between portfolio management and program management?
Project management focuses on individual projects, whereas portfolio management looks at the bigger picture and considers how all the organization’s projects work together to meet its objectives
5 legal considerations of AI models:
-data usage and retention
-ownership of inputs and outputs
-copyright infringement risk
-privacy and regulatory compliance
-disclaimers and liability
4 things you must have when dealing with US privacy laws
-transparency and purpose
-consent and control
-data quality and security
-accountability and enforcement
4 factors that can amplify a firm’s vulnerability of a security breach:
-personnel issues
-technology problems
-procedural factors
-operational issues
definition
white hat hackers
someone who uncovers computer weaknesses without exploiting them. Contributes to improving system security.
definition
black hat hackers
computer criminals
definition
red team
when a firm employs a group to act like bad actors in an attempt to uncover weaknesses before they are exploited
definition
blue team
defensive security professionals responsible for maintaining internal network defenses against cyberattacks and threats
definition
spoofed
e-mail transmissions and packets that have been altered to forge or disguise their origin or identity
ex: Bank of America
definition
deepfakes
sophosticated media created by AI that attempts to look/sound like a real person/event
definition
script kiddies
an unsophisticated hacker that relies on scripts/downloaded programs to perpetrate hacking, rather than develop original exploits
definition
public-key cryptography
a type of security where two keys are generated, a public key and a private key
a way that an organization can take action:
lock down networks:
-firewalls
-intrusion detection systems
-honeypots=tempting, bogus targets meant to lure hackers
definition
peer production
collaboration between users to create content, products, and services
definition
collaborative consumption
participants share access to products and services, rather than having ownership
definition
inbound marketing
leveraging online channels to draw consumers to the firm with compelling content rather than conventional forms of promotion like advertising, email marketing, traditional mailings, and sales calls