Week 2 Flashcards

1
Q

What are the components of an Information System

A

-Software
-Hardware
-Data
-People
-Procedure
-Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

-An IS includes application (programs), OS, and assorted command utilities.
-is perhaps the most difficult IS components to secure
-carries the lifeblood of information through an organization

A

Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The physical technology that houses and executes the software, stores and transport data, and provides interfaces for the entry and removal of information from the system.

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Policies deal with hardware as a physical asset from harm or theft.

A

Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data stored, processed, and transmitted by a computer system must be protected.

-Data is the most valuable asset of an organization and therefore is the main target of intentional attacks

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Though often overlooked in computer security considerations, _____ have always been a threat to information system.

A

People

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Are written instructions for accomplishing a specific task. When an unauthorized user obtains an organization’s procedure, it poses a threat to the integrity of the information.

A

Procedure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

2 APPROACHES TO INFORMATION SECURITY IMPLEMENTATION

A

Bottom-Up Approach
Top-Down Approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A method of establishing security policies and/or practices that begins as a grassroots in system administrator attempt to improve the security of their systems.

A

Bottom-up approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A methodology of establishing security policies and/or practices that is initiated by upper management.

A

Top-down approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a methodology for the design and implementation of an information system. Using a methodology ensures a rigorous process with clearly defined goal and increases the probability of success.

A

SDLC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A type of SDLC in which each phrase of the process “flows from” the information gained in the previous phase, with multiple opportunities to return to previous phase, with multiple opportunities to return to previous phases phrase and make adjustments.

A

Waterfall model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WATERFALL MODEL
-A type of SDLC in which each phrase of the process “___ ____” the information gained in the previous phase, with multiple opportunities to return to previous phase, with multiple opportunities to return to previous phases phrase and make adjustments.

A

flows from

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

6 type of Waterfall model

A

Investigation
Analysis
Logical Design
Physical Design
Implementation
Maintenance and Change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

-Begins by examining the event or plan that initiates the process
-During this phase, the objectives constraints, and scope of the project and specified.

A

Investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

-This phase consists primarily of assessment of the organization, its current systems, and its capability to support the proposed systems
-Begin by determining what the new system is expected to do and how it will interact with existing systems.

A

ANALYSIS

17
Q

Begin in creating a streams solution for a business problem. In any system solution, the driving factor must be the business need.

A

logical design

18
Q

-Specific technologies are selected to support the alternatives identified and evaluated in the logical design.

A

PHYSICAL DESIGN

19
Q

-Any needed software is created.
-Components are ordered, received and tested/ afterwards. Users are trained and supporting documentation created.

A

IMPLEMENTATION

20
Q

-Longest and most expensive of the process. This phase consists of the task necessary to support and modify the system for the remainder of its useful life cycle.

A

MAINTENANCE AND CHANGE