Upgrade to remove ads
system design chapter 12
Terms in this set (28)
system support security
when a system becomes operational and continues until the system reaches the end of its useful life
remote control software
applications that allow IT staff to take over a users workstation and provide support and troubleshooting
to designate positions that require a combo of systems analysts and programming skills
a process for controlling changes in system requirements during software development, also an important tool for managing system changes and costs after a system becomes operational
is a formal reference point that measures system characteristics at a specific time.
3 types are functional, allocated, and product.
includes monitoring the system for signs of trouble, logging all system failures, diagnosing the problem, and applying corrective action
can monitor the number of transactions processed in a given time period, the number of records accessed, ad the volume of online data
uses a set of standard tests to evaluate system performance and capacity
measures actual system performance under specific circumstances and is affected by network loads and hardware efficiency
a process that monitors current activity and performance levels, anticipates future activity, and forecasts the resources needed to provide desired levels of service
analyzes the organizations assets, threats, and vulnerabilities
measures risk likelihood and impact
develops safeguards that reduce risk and their impact
might include company hardware, software, data, networks, people, or procedures. For each one a risk manager rates the impact of an attack and analyzes possible threats.
is an internal or external entity that could endanger an asset.
a security weakness or soft spot
an attack that takes advantage of a vulnerability
boot level password (BIOS-level password)
this password must be entered before the computer can be started. Can prevent an unauthorized person from booting a computer by using a CD-ROM or USB device
concerned with managerial policies and controls that ensure secure operations
A(n) _____ is a centralized resource staffed by IT professionals who provide users with the support they need to do their jobs.
diagnoses and corrects errors in an operational system
expenses vary significantly during a system's operational life and include spending to support maintenance activities.
In maintenance management, _____ means examining the whole in order to learn about the individual elements.
is the overall time between a request for system activity and the delivery of the response.
ensures that authorized users have timely and reliable access to necessary information.
privilege escalation attack
Typically, an intruder accesses a system using a compromised account, and may attempt a(n) _____, which is an unauthorized attempt to increase permission levels.
the main line of defense between a local network, or intranet, and the Internet.
In IT security terms, a _____ is the impact of an attack multiplied by the likelihood of a vulnerability being exploited.
THIS SET IS OFTEN IN FOLDERS WITH...
System Analysis and Design chapter 11
Ch. 12 Systems Support and Security: Managing Syst…
SYSTEMS ANALYSIS & DESIGN I Chapter 11
Chapter 12 - Systems Support & Security
YOU MIGHT ALSO LIKE...
CIS 3350 Quiz 12
My Systems Analysis Ch. 12
OTHER SETS BY THIS CREATOR
systems design chapter 11
system design chapter 10
web based designs
system design chapter 9
OTHER QUIZLET SETS
Y2: Skin - Wounds
History Chapter 20
Exam 1 path class