Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
57 Cards in this Set
- Front
- Back
Occurs when organizations use software that filters content to prevent the transmission of unauthorized information.
|
Content filtering
|
|
Floods a web site with so many requests for service that is slows down or crashes the site.
|
Denial-of-service attack
|
|
The good guy hackers that look for weaknesses.
|
White-hat hacker
|
|
Bad guy hackers.
|
Back-hat hackers
|
|
Hackers that think they have the right to hack.
|
Hacktivist
|
|
Attack a computer's system by transmitting a virus hoax, with a real virus attached.
|
Hoaxes
|
|
A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
|
Information Security
|
|
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
|
Insider
|
|
Searches out patterns in information and network traffic to indicate attacks and quickly responds to prevent any harm.
|
Intrusion detection software (IDS)
|
|
Includes a variety of threats such as viruses, worms, and Trojan horses.
|
Malicious code
|
|
Altering the contents of packets as they travel over the internet or altering data on computer disks after penetrating a network.
|
Packet Tampering
|
|
Technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.
|
Phishing
|
|
A device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing.
|
Smart card
|
|
A program or device that can monitor data traveling over a network
|
Sniffer
|
|
Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker.
|
Social Engineering
|
|
The forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender.
|
Spoofing
|
|
Benchmarks for systems success in SDLC.
|
1.Guaranteed Performance
2. Development Costs 3. Scalability |
|
Sequential, activity based process in which each phase in SDLC is performed sequentially from planning through implementation and maintenance.
|
Waterfall
|
|
Emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a a system to accelerate the systems development process.
|
Rapid Application Development (RAD)
|
|
Breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete
|
Extreme programming (XP)
|
|
A form of XP, aims for customer satisfaction through early and continuous delivery of uesful software components. Fast and efficient, small and nimble.
|
Agile
|
|
A framework of best practice approaches intended to facilitate the delivery of high quality IT services. Important in the Agile Methodology.
|
Role of ITIL
|
|
Agile Principles
|
o Slash the Budget (causes focus on essentials)
o If it Doesn't Work, Kill it (get rid of unnecessary products/systems that aren't doing the job) o Keep Requirements to a Minimum (Only develop necessary features. Scope creep - increase of the scope of a project. Feature Creep - feature list growth.) o Test and Deliver Frequently (add working pieces frequently - each week or month) o Assign non-IT Executives to Software Projects (gives Exec's a feeling of ownership and desire to succeed.) |
|
Project Management Applied to SDLC
|
Application of knowledge, skills, tools, and techniques to meet or exceed needs and expectations
|
|
Feasibility Factors
|
1. Technical - can we build and integrate this
2. Economical - financial benefits and costs 3. Legal - examines legal ramifications 4. Operational - will it attain desired objectives 5. Scheduling - is it in an appropriate timeframe, will completion date be met 6. ethics - does it match company ethics |
|
Implementation (construction) tasks and strategies
|
see http://docs.google.com/Doc?docid=0AQiifrdRwm9qZGZnZjhyejdfNWd2a3BxcWY4&hl=en&pli=1
|
|
Project Plan needs
|
Easy to understand and read, communicated to key stakeholders, appropriate for project (size, complexity, etc), and prepared by the whole team. Managers must manage people, make sure the plan is understandable, and increase by-in from stakeholders.
|
|
Process of proactive and ongoing identification, analysis, and response to risk factors. Done during plan creation. Identification, quantitative analysis, qualitative analysis, response planning.
|
Risk Management
|
|
Risk Mitigation
|
promote project leadership skills, learn from previous experience, share knowledge, create project management culture
|
|
Sequential, activity based process in which each phase in SDLC is performed sequentially from planning through implementation and maintenance
|
Waterfall
|
|
Emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a a system to accelerate the systems development process
|
Rapid Application Development (RAD)
|
|
Breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete.
|
Extreme programming (XP)
|
|
A form of XP, aims for customer satisfaction through early and continuous delivery of useful software components. Fast and efficient, small and nimble.
|
Agile
|
|
A framework of best practice approaches intended to facilitate the delivery of high quality IT services. Important in the Agile Methodology.
|
ITIL
|
|
Agile Principles
|
-Slash the Budget (causes focus on essentials)
-If it Doesn't Work, Kill it (get rid of unnecessary products/systems that aren't doing the job) -Keep Requirements to a Minimum (Only develop necessary features. Scope creep - increase of the scope of a project. Feature Creep - feature list growth.) -Test and Deliver Frequently (add working pieces frequently - each week or month) -Assign non-IT Executives to Software Projects (gives Exec's a feeling of ownership and desire to succeed.) |
|
Application of knowledge, skills, tools, and techniques to meet or exceed needs and expectations
|
Project Management Applied to SDLC
|
|
Discard old system and jump into the new system (Something could go horribly wrong)
|
Direct/Plunge Conversion
|
|
Use both systems till the new one is obviously working well. (Extra effort required by employees)
|
Parallel conversion
|
|
Implement phases of the system until it is apparent that the new one works well (Lots of time to implement, also problems can arise in syncing systems.)
|
Phased Conversion
|
|
Have a small number of people use the new system until it is proven to work well (somewhat the same as above)
|
Pilot Conversion
|
|
Determines whether a system satisfies its acceptance criteria, enabling the customer to decide whether or not to accept the system
|
Acceptance testing
|
|
Process of proactive and ongoing identification, analysis, and response to risk factors. Done during plan creation. Identification, quantitative analysis, qualitative analysis, response planning.
|
Risk Management
|
|
Promote project leadership skills, learn from previous experience, share knowledge, create project management culture
|
Risk Mitigation
|
|
Collaborative webpages that allow users to edit documents, share ideas, or monitor the status of a project
|
Business wikis
|
|
An IT based set of tools that supports the work of teams by facilitating the sharing and flow of information
|
Collaboration system
|
|
Provides tools to manage the creation, storage, editing, and publication of information in a collaborative environment
|
Content management system
|
|
An organization's key strength or business function that it does better than any of its competitors
|
Core competency
|
|
Similar to document management, generally works with binary rather than text files, such as multimedia file types
|
Digital asset management system
|
|
Organizations that cannot adapt to the new demand placed on them for surviving in the information age are doomed to extinction
|
Digital Darwinism
|
|
When those with access to technology have great advantages over those without access to technology
|
Digital divide
|
|
A new way of doing things that initially does not meet the needs of existing customers
|
Disruptive technology
|
|
Supports the electronic capturing, storage, distribution, archival and accessing of documents
|
Document management system
|
|
Global public network of computer networks that pass information from one to another using common computer protocols
|
Internet
|
|
Problem solving done by an expert and a novice
|
Joint problem solving
|
|
involves capturing, classifying, Evaluating, retrieving and sharing information assets in a way that provides context for effective decisions and actions
|
Knowledge management
|
|
Involves shared participation in business processes such as workflow in which knowledge is hardcoded as rules
|
Process collaboration
|
|
Standards that specify the format of data as well as the rules to be followed during transmission
|
Protocols
|