• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/19

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

19 Cards in this Set

  • Front
  • Back
What are the four main risks with respect to systems?
1. strategic risk
2. operating risk
3. financial risk
4. information risk
What is strategic risk?
The risk of choosing inappropriate technology.
What is operating risk?
The risk of doing the right things in the wrong way?
What is financial risk?
The risk of having financial resources lost, wasted, or stolen.
What is information risk?
The risk of loss of data integrity, incomplete transactions, or hackers.
Risks can be divided into what three categories?
1. errors
2. intentional acts
3. disasters
What are errors?
Mistakes, lost or misplaced data, application or system software problems or other temporary equipment problems, transmission errors, and computer equipment lost or stolen.
What are intentional acts?
Sabotage, embezzlements, viruses, denial of service attacks, and other types of computer fraud.
What are disasters?
Fire, flood, earthquakes, high winds, terrorism, and ware.
In general, what is risk?
The possibility of harm or loss.
What is a threat?
Any eventuality that represents a danger to an asset or a capability linked to hostile intent.
What are the four types of controls?
1. general controls
2. application controls
3. physical controls
4. segregation of duties
What are file attributes?
Set to restrict writing, reading, and/or directory privileges for a file.
What are firewalls?
A system, often both hardware and software, of user IDs and authentication that prevents unauthorized users from gaining access to network resources; acting as a gatekeeper, it isolates a private network from a public network.
What are five threats in a computerized environment?
1. virus
2. worm
3. trojan horse
4. denial-of-service attack
5. phishing
What is disaster recovery?
Plans for continuing operations in the event of destruction of not only program and data files but also processing capability.
What are the five steps in disaster recovery?
1. assess the risks
2. identify mission-critical applications and data
3. develop a plan for handling the mission-critical applications
4. determine responsibilities of the personnel involved in disaster recovery
5. test the disaster recovery plan
What is a cold site?
An off-site location that has all the electrical connections and other physical requirements for data processing, but it does not have the actual equipment.
What is a hot site?
An off-site location that is "completely" equipped to "immediately" take over the company's data processing.