Name a decision making tool.
pros and cons, paired comparisons, decision matrix
What is a LAN?
What is information security?
protects and safeguards information
What is anonymous browsing?
Not allowing websites to track you?
Traditional system development life cycle provides a disciplined ______ cycle. (hint nature and water)
waterfall
What do very structured environments limit?
control and freedom to make decisions?
What is the Internet of Things?
household and everyday objects that connect to the internet.
What is Risk Management?
Process of identifying, assessing, and prioritizing information systems security risks
-find risks and tell how high the risk
What are cookie managers?
delete unwanted or dangerous cookies
What is a closed source?
prevents users from accessing and modifying the source code
What is the difference between goals and requirements?
Requirements: must have a minimum
Goals: beyond minimum essential requirements
What is intranet?
uses related internet technologies and applications, but inside of an organization (like when you log into lakehead)
What is a the difference between asymmetric and symmetric encryptions?
Asymmetric- uses different keys to encrypt and decrypt messages
Symmetric- same key is used to encrypt and decrypt data
What is privacy?
how the confidentiality of the data collected about you is maintained
If you want something fast and cheap, pick any two of what elements? (3 total)
time, quality, and cost
What are the 4 parts of the decision making process?
1)Intelligence (data analysis, sensing what will require action)
2) Design (developing alternative approaches)
3) Choice (selecting the most effective and efficient alternative)
4) Implementation (the selected alternative is carried out)
Describe the difference between analog and digital signals. You must include shape of signal, continuous and discrete and the word binary.
Analog- waves, continuous, transmission rate is low (video, human voices)
Digital-box, discrete, binary data, transmission rate is fast
Name 3 types of malware?
trojan horses, worms, stealth, polymorphic, spyware, virus hoaxes
What is one of 2 threats to privacy?
data collection or secondary use of information (data charing)
What is the goal of the design phase?
describe in detail how the system will do
What is decision criteria?
objective measures of the requirements and goals that help you choose alternatives
What is DATA hierarchy (in order)?
Bit, Byte, Fields, Records, Files, Database
What are the 3 security goals? (CIA)
Confidentiality
Integrity (data is consistent and complete)
Availability (data or system is available when needed)
What is Ethical decision Making (PLUS)?
P is consistent with organizational policies, procedures and guidelines
L is acceptable under applicable laws and regulations
U conforms to universal values such as empathy, integrity, and justice
-S satisfies your personal definition of what is good, right, and fair
Name one of the 4 IT implementation plans. (hint P.P.DC.P)
Parallel, phased, direct turnover, pilot