SDLC
It's in the IS Dept.
Now that's a Threat!
Are You Secure?
Terminology Gone Wild!
100
Process of creating and maintaining information systems
What is systems development? (page 255)
100
A common title given to the vice president of information services
What is a CIO? (284)
100
A person or organization that seeks to obtain or alter data or other assets illegally, without the owner's permission or knowledge.
What is a threat? (309)
100
Use of https at trusted, reputable vendors
What is considered a personal security safeguard? (316)
100
Use of personal physical characteristics such as fingerprints, facial features, and retinal scans to verify users.
What is biometric authentication? (320)
200
According to Brooks' Law, this makes the project later.
What is adding more people to a late project? (Pg 258)
200
someone who works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine system test plans.
What is a systems analyst?
200
Procedural mistakes, incorrect procedures, development and installation errors, accidents...
What are examples of human error? (301)
200
A technical safeguard against security threats
What is identification and authorization? (319)
200
A computing device that prevents unauthorized network access.
What is a firewall? (322)
300
Defining the goals and scope of the new system.
What is the initial step in the first phase of the SDLC? (260)
300
Plan the use of IS; manage outsourcing relationships, and protect information assets
What are some of the major functions of the IS department? (283)
300
Take computers with wireless connections through an area and search for unprotected wireless networks.
What do drive-by sniffers? (311)
300
Users of smart cards are required to enter this to be authorized.
What is a PIN? (320)
300
The cost of data communications and data storage is essentially zero.
What is Moore's Law?
400
What is the step in the SDLC process aimed at eliminating obviously nonsensible projects?
what is assess project feasibility?(pg 260)
400
The process of hiring another organization to perform a service.
What is outsourcing? (288)
400
Pretending to be a legitimate company and sending email requests for confidential data.
What is phishing? (311)
400
Viruses, worms, Trojan horses, spyware, and adware...
What is malware? (323)
400
The ability to model the components of the system, to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed.
What is systems thinking?
500
System installation process that is to your advantage if the system fails; the failure is contained within a limited boundary
What is Pilot? (267)
500
Loss of control, benefits outweighed by long-term costs, and no easy exits.
What are risks of outsourcing? (p 292)
500
Pretexting, hacking, DOS attacks, and theft...
What are examples of computer crime? (310)
500
Every organization should have this as part of the security program which should include how employees are to react to security problems, whom to contact, reports, and steps to prevent further loss
What is an incident-response plan? (330)
500
The management and use of information systems that help businesses achieve their strategies.
What is MIS?
M
e
n
u