• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/57

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

57 Cards in this Set

  • Front
  • Back
Occurs when organizations use software that filters content to prevent the transmission of unauthorized information.
Content filtering
Floods a web site with so many requests for service that is slows down or crashes the site.
Denial-of-service attack
The good guy hackers that look for weaknesses.
White-hat hacker
Bad guy hackers.
Back-hat hackers
Hackers that think they have the right to hack.
Hacktivist
Attack a computer's system by transmitting a virus hoax, with a real virus attached.
Hoaxes
A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
Information Security
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
Insider
Searches out patterns in information and network traffic to indicate attacks and quickly responds to prevent any harm.
Intrusion detection software (IDS)
Includes a variety of threats such as viruses, worms, and Trojan horses.
Malicious code
Altering the contents of packets as they travel over the internet or altering data on computer disks after penetrating a network.
Packet Tampering
Technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.
Phishing
A device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing.
Smart card
A program or device that can monitor data traveling over a network
Sniffer
Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker.
Social Engineering
The forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender.
Spoofing
Benchmarks for systems success in SDLC.
1.Guaranteed Performance
2. Development Costs
3. Scalability
Sequential, activity based process in which each phase in SDLC is performed sequentially from planning through implementation and maintenance.
Waterfall
Emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a a system to accelerate the systems development process.
Rapid Application Development (RAD)
Breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete
Extreme programming (XP)
A form of XP, aims for customer satisfaction through early and continuous delivery of uesful software components. Fast and efficient, small and nimble.
Agile
A framework of best practice approaches intended to facilitate the delivery of high quality IT services. Important in the Agile Methodology.
Role of ITIL
Agile Principles
o Slash the Budget (causes focus on essentials)
o If it Doesn't Work, Kill it (get rid of unnecessary products/systems that aren't doing the job)
o Keep Requirements to a Minimum (Only develop necessary features. Scope creep - increase of the scope of a project. Feature Creep - feature list growth.)
o Test and Deliver Frequently (add working pieces frequently - each week or month)
o Assign non-IT Executives to Software Projects (gives Exec's a feeling of ownership and desire to succeed.)
Project Management Applied to SDLC
Application of knowledge, skills, tools, and techniques to meet or exceed needs and expectations
Feasibility Factors
1. Technical - can we build and integrate this
2. Economical - financial benefits and costs
3. Legal - examines legal ramifications
4. Operational - will it attain desired objectives
5. Scheduling - is it in an appropriate timeframe, will completion date be met
6. ethics - does it match company ethics
Implementation (construction) tasks and strategies
see http://docs.google.com/Doc?docid=0AQiifrdRwm9qZGZnZjhyejdfNWd2a3BxcWY4&hl=en&pli=1
Project Plan needs
Easy to understand and read, communicated to key stakeholders, appropriate for project (size, complexity, etc), and prepared by the whole team. Managers must manage people, make sure the plan is understandable, and increase by-in from stakeholders.
Process of proactive and ongoing identification, analysis, and response to risk factors. Done during plan creation. Identification, quantitative analysis, qualitative analysis, response planning.
Risk Management
Risk Mitigation
promote project leadership skills, learn from previous experience, share knowledge, create project management culture
Sequential, activity based process in which each phase in SDLC is performed sequentially from planning through implementation and maintenance
Waterfall
Emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a a system to accelerate the systems development process
Rapid Application Development (RAD)
Breaks a project into tiny phases, and developers cannot continue on to the next phase until the first phase is complete.
Extreme programming (XP)
A form of XP, aims for customer satisfaction through early and continuous delivery of useful software components. Fast and efficient, small and nimble.
Agile
A framework of best practice approaches intended to facilitate the delivery of high quality IT services. Important in the Agile Methodology.
ITIL
Agile Principles
-Slash the Budget (causes focus on essentials)
-If it Doesn't Work, Kill it (get rid of unnecessary products/systems that aren't doing the job)
-Keep Requirements to a Minimum (Only develop necessary features. Scope creep - increase of the scope of a project. Feature Creep - feature list growth.)
-Test and Deliver Frequently (add working pieces frequently - each week or month)
-Assign non-IT Executives to Software Projects (gives Exec's a feeling of ownership and desire to succeed.)
Application of knowledge, skills, tools, and techniques to meet or exceed needs and expectations
Project Management Applied to SDLC
Discard old system and jump into the new system (Something could go horribly wrong)
Direct/Plunge Conversion
Use both systems till the new one is obviously working well. (Extra effort required by employees)
Parallel conversion
Implement phases of the system until it is apparent that the new one works well (Lots of time to implement, also problems can arise in syncing systems.)
Phased Conversion
Have a small number of people use the new system until it is proven to work well (somewhat the same as above)
Pilot Conversion
Determines whether a system satisfies its acceptance criteria, enabling the customer to decide whether or not to accept the system
Acceptance testing
Process of proactive and ongoing identification, analysis, and response to risk factors. Done during plan creation. Identification, quantitative analysis, qualitative analysis, response planning.
Risk Management
Promote project leadership skills, learn from previous experience, share knowledge, create project management culture
Risk Mitigation
Collaborative webpages that allow users to edit documents, share ideas, or monitor the status of a project
Business wikis
An IT based set of tools that supports the work of teams by facilitating the sharing and flow of information
Collaboration system
Provides tools to manage the creation, storage, editing, and publication of information in a collaborative environment
Content management system
An organization's key strength or business function that it does better than any of its competitors
Core competency
Similar to document management, generally works with binary rather than text files, such as multimedia file types
Digital asset management system
Organizations that cannot adapt to the new demand placed on them for surviving in the information age are doomed to extinction
Digital Darwinism
When those with access to technology have great advantages over those without access to technology
Digital divide
A new way of doing things that initially does not meet the needs of existing customers
Disruptive technology
Supports the electronic capturing, storage, distribution, archival and accessing of documents
Document management system
Global public network of computer networks that pass information from one to another using common computer protocols
Internet
Problem solving done by an expert and a novice
Joint problem solving
involves capturing, classifying, Evaluating, retrieving and sharing information assets in a way that provides context for effective decisions and actions
Knowledge management
Involves shared participation in business processes such as workflow in which knowledge is hardcoded as rules
Process collaboration
Standards that specify the format of data as well as the rules to be followed during transmission
Protocols