Systems Analysis and Design Chapter 12| 50 questions fully solved
adaptive maintenance Adds enhancements to an operational system and makes the system easier to use applications programmer Works on new systems development and maintenance avoidance Eliminates risk by adding protective safeguards backup Copying data at prescribed intervals, or continuously baseline Formal reference point that measures system characteristics at a specific time busy Metric that measures the time that a given resource is unavailable change control Process for controlling changes in system requirements during development confidentiality Protects information from unauthorized disclosure and safeguards privacy corrective maintenance Diagnoses and corrects errors in an operational system database programmer Focuses on creating and supporting large-scale database systems differential backup Backs up only the files that are new or changed since the last full backup exploit Attack that takes advantage of a vulnerability fault management Includes monitoring a system for signs of trouble and logging system failures firewall Main line of defense between a local network, or intranet, and the Internet hardening Increases security by removing unnecessary accounts, services, and features hot site Provides the best insurance against major business interruptions incremental backup Method that only includes recent files that have never been backed up information center Centralized resource staffed by IT professionals who provide users with support integrity Prevents unauthorized users from creating, modifying, or deleting information keystroke logger Device that can record everything that is typed into a keyboard log Documents all events, including dates, times, and other specific information malware Includes worms, Trojan horses, keystroke loggers, and spyware metrics Performance measurements mitigation Reduces the impact of a risk by careful planning and preparation network interface Hardware and software that allows a computer to interact with a network offsiting Practice of storing backup media away from the main business location patch Specially written software module that provides temporary repairs perfective maintenance Changes an operational system to make it more efficient or maintainable permissions Describe the rights a user has to a particular file or directory on a server port Used to route incoming traffic to the correct application on a computer pretexting Social engineering used to obtain personal information under false pretenses procedural security Concerned with managerial policies and controls that ensure secure operations product baseline Describes a system at the beginning of system operation queue length Metric that measures the number of requests pending for a service recovery Involves restoring data and restarting the system after an interruption remote control software Allows IT staff to take over a workstation and provide support response time Overall time between a request for system activity and delivery of the response risk Impact of an attack multiplied by likelihood of a vulnerability being exploited security Protects the system, and keeps it safe, free from danger, and reliable security token Physical device that authenticates a legitimate user service Application that monitors, or listens on, a particular port
Written for
Document information
- Uploaded on
- October 5, 2023
- Number of pages
- 5
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
systems analysis and design chapter 12
Also available in package deal