Terms in this set (20)
Includes items such as supplies, equipment rentals, and software leases.
Diagnoses and corrects errors in an operational system
Adds enhancements to an operational system and makes the system easier to use.
Involves changing an operational system to make it more efficient, reliable, or maintainable.
Requires analysis of areas where trouble is likely to occur, and try to avoid those problems.
Manages computer and network systems.
All non-critical changes are held until they can be implemented at the same time.
The process of tracking system releases, or versions.
A formal reference point that measures system characteristics at a specific time.
Evaluate system performance and capacity using a set of standard tests.
Performance measurements such as the number of records accessed, or the volume of online data.
Measures the time between submitting a request for information and the fulfillment of the request.
Protects information from unauthorized disclosure and safeguards privacy.
Prevents unauthorized users from creating, modifying, or deleting information.
Ensures that authorized users have timely and reliable access to necessary information.
An internal or external entity that could endanger an assets.
Nothing is done to control the risk.
Shifts the risk to another asset or party.
The main line of defense between a local network or intranet and the Internet.
Involves identification of system users and consideration of user-related security issues.