ISYS201FinalReview (1)

ISYS201FinalReview (1) - Business Driven Technology Study...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Business Driven Technology Study Guide for Final -Created by Peter Business Driven Technology Study Guides Data Security and Privacy Developing Systems Collaboration and Innovation E - Business Flowcharting and Algorithms Study Guide Data Security and Privacy ii. Packet—Data Security through Backups i. Cover the basics of data security –Authentication, prevention, and detection. ii. Understand the difference between the first and second lines of defense. The first line of defense is the people who work in an organization. People can be insiders who knowingly misuse their access and cause some sort of business-affecting incident, and can also be people who do so unknowingly. Having a detailed information security policy and information security plan can be part of the first line of defense. The second line of defense is technology. Protecting against various threats that come from outside the company’s network can be done by implementing the three primary information security areas. iii. Provide an example of each of the three primary security areas: (1) authentication and authorization, (2) prevention and resistance, and (3) detection and response –Authentication can be something they know, own, or is part of the user. Prevention tools are content filters, encryption, and firewalls. iv. Describe the differences between types of malicious code v. Understand the principles of data backup Scope (how much is backed up), frequency, storage, history, testing, and security. vi. Know how to install BYU’s free anti-virus software vii. Understand basics of data privacy, including email privacy II. Key Terms a. Authentication is a method for confirming the users identity. Authentication can be broken down into three categories and the most secure involve a combination of the three. The categories are something the user knows such as a password, something the user has such as a smart card or token, and something that is part of the user such as a fingerprint or voice signature. b. Authorization is the process of giving a user access permission to access or have something. 1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
c. Backup scope, frequency, and media – Scope refers to how much information is backed up (Just documents? Documents and programs? The whole operating system?). Frequency refers to how often sensitive material is added. If important docs are added everyday, backups should be more frequent. Media is the medium that the backup is on. There are many backup mediums such as DVDs, hard drives, and the Internet. d. Biometrics - The identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting. e. Content filtering is software that filters content to prevent the transmission unauthorized information. Organizations can use content filtering technologies to filter email and prevent emails containing sensitive information from transmitting, whether the transmission was malicious or accidental. f. Denial-of-service attack floods a website with so many requests for service that it slows down
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 01/02/2012 for the course I SYS 101 taught by Professor Mckell,l during the Winter '08 term at BYU.

Page1 / 12

ISYS201FinalReview (1) - Business Driven Technology Study...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online