Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
19 Cards in this Set
- Front
- Back
What are the four main risks with respect to systems?
|
1. strategic risk
2. operating risk 3. financial risk 4. information risk |
|
What is strategic risk?
|
The risk of choosing inappropriate technology.
|
|
What is operating risk?
|
The risk of doing the right things in the wrong way?
|
|
What is financial risk?
|
The risk of having financial resources lost, wasted, or stolen.
|
|
What is information risk?
|
The risk of loss of data integrity, incomplete transactions, or hackers.
|
|
Risks can be divided into what three categories?
|
1. errors
2. intentional acts 3. disasters |
|
What are errors?
|
Mistakes, lost or misplaced data, application or system software problems or other temporary equipment problems, transmission errors, and computer equipment lost or stolen.
|
|
What are intentional acts?
|
Sabotage, embezzlements, viruses, denial of service attacks, and other types of computer fraud.
|
|
What are disasters?
|
Fire, flood, earthquakes, high winds, terrorism, and ware.
|
|
In general, what is risk?
|
The possibility of harm or loss.
|
|
What is a threat?
|
Any eventuality that represents a danger to an asset or a capability linked to hostile intent.
|
|
What are the four types of controls?
|
1. general controls
2. application controls 3. physical controls 4. segregation of duties |
|
What are file attributes?
|
Set to restrict writing, reading, and/or directory privileges for a file.
|
|
What are firewalls?
|
A system, often both hardware and software, of user IDs and authentication that prevents unauthorized users from gaining access to network resources; acting as a gatekeeper, it isolates a private network from a public network.
|
|
What are five threats in a computerized environment?
|
1. virus
2. worm 3. trojan horse 4. denial-of-service attack 5. phishing |
|
What is disaster recovery?
|
Plans for continuing operations in the event of destruction of not only program and data files but also processing capability.
|
|
What are the five steps in disaster recovery?
|
1. assess the risks
2. identify mission-critical applications and data 3. develop a plan for handling the mission-critical applications 4. determine responsibilities of the personnel involved in disaster recovery 5. test the disaster recovery plan |
|
What is a cold site?
|
An off-site location that has all the electrical connections and other physical requirements for data processing, but it does not have the actual equipment.
|
|
What is a hot site?
|
An off-site location that is "completely" equipped to "immediately" take over the company's data processing.
|