LU4 pt. 2 Flashcards
(44 cards)
What is business software?
It is any software or set of computer programs used by business users to perform various business functions. Used to increase productivity, measure productivity, to perform other business functions accurately.
XXX XXX involve complex pieces of software that are very expensive to purchase and implement. It might take a larger fortune 500 company several
years to complete a large scale implementation of an enterprise system.
XENTERPISE APPLICATIONSX involve complex pieces of software that are very expensive to purchase and implement. It might take a larger fortune 500 company several
years to complete a large scale implementation of an enterprise system.
Next Gen. Enterprise Applications are:
Enterprise solutions, enterprise suites or e-business suites to make their CRM, SCM and ERP (Enterprise Resource Planning) systems work closely with each other and link to systems of customers and suppliers (SAP Business Suite, Oracle E-Business Suite, Microsoft Dynamics Suite).
Advantage of using Social CRM tools:
Business can better engage with their customers. They enable a business to connect customer conversations and relationships from social networking sites to CRM processes.
Corporate systems:
People that have the most knowledge in IT; if your
corporate systems is hacked, then the entire system is going to be hacked. This one
needs to be secured the most
Corporate servers:
Where you put your applications.
XXX XXX may store information on weapons systems, intelligence
operations, and military targets. These information assets have tremendous value, and the repercussions can be devastating if they are lost, destroyed, or placed in the wrong hands.
XGOVERNMENT SYSTEMSX may store information on weapons systems, intelligence
operations, and military targets. These information assets have tremendous value, and the repercussions can be devastating if they are lost, destroyed, or placed in the wrong hands.
Inadequate security and control =>
Serious legal liability.
XXX XXX and control framework that protects business information assets can produce a high return on investment. Strong security
and control also increase employee productivity and lower operational
costs.
XA SOUND SECURITYX and control framework that protects business information assets can produce a high return on investment. Strong security
and control also increase employee productivity and lower operational
costs.
In a XXX XXX a firm is obligated to respond to a discovery request for access to information that may be used as evidence. Company is required by law to produce those data. If the data is not handed over correctly and completely, the court can impose sever XXX and XXX penalties.
In a XLEGAL ACTIONX a firm is obligated to respond to a discovery request for access to information that may be used as evidence. Company is required by law to produce those data. If the data is not handed over correctly and completely, the court can impose sever XFINANCIALX and XCRIMINALX penalties.
What does Computer Forensics entail?
It is the scientific collection, examination, authentication, preservation and analysis of data held on or retrieved from computer storage media in such a way that information can be used as evidence in a court of law.
What does Computer Forensics deal with?
- Recovering data
- Secure strong of recovery data
- Finding significant information
- Presenting information to a court of law
What is encryption?
The process of transforming plain text to data into chipper text it cannot be read by anyone other than the sender and the intended receiver.
Who is responsible for the security of data when working in the cloud?
For protection of sensitive data, the accountability and responsibility still resides
with the company owning that data.
What does identity management software do?
It automates the process of keeping track of all
these users and their system privileges, assigning each user a unique digital identity
for accessing each system.
It includes the following tools:
- Authenticating users
- protecting user identifies
- controlling access to system resources
What is authentication?
It refers to the ability to know that a person is who he or she
claims to be.
Authentication is established by using passwords, only known by the user.
- Password systems that are too rigorous hinder employee productivity.
- Passwords can also be sniffed if transmitted over a network or stolen through
social engineering.
What is a token?
A physical device, similar to an identification card, that is designed to prove the identity of a single user. Tokens are small gadgets that typically fit on key
rings and display passcodes that change frequently.
What is a smart card?
A device about the size of a credit card that contains a chip formatted with access permission and other data.
What is biometric authentication?
It uses systems that read and interpret individual
human traits, such as finger prints, irises and voices to grant or deny access.
- Based on a physical and behavioural trait
What is a two factor authentication?
It means validating users through a multistep process
- Good example can be a bank card; card is a physical item and the PIN (personal
identification number) is the data that go with it.
What is a firewall?
Prevents unauthorised users from accessing private networks; it is a
combination of hardware and software that controls the flow of incoming and
outgoing network traffic.
- It is placed between the organisation’s private internal network and distrusted
external networks, such as the internet; - Firewalls can also protect one part of the company’s network from the rest of the
network. - Firewall identifies: IP addresses, applications, incoming traffic.
- Prevents unauthorised communication into and out of the network.
What are some firewall screening technologies?
Static packet filtering, stateful inspection,
network address translation, and application proxy filtering.
These are used in
combination to provide firewall protection.
What is packet filtering?
It examines selected fields in the headers of data packs flowing back and forth between the trusted network and the internet, examining individual
packets in isolation.
What is stateful inspection?
It is additional security by determining whether packets are part of ongoing dialogues between the sender and a receiver.