ism exam 3
Dell's online business model relies heavily on
Disintermediation
What is the second SDLC phase, and what is it meant to do?
analysis- determine what the system is going to do
What step # is the planning phase in SDLC? What is it meant to accomplish
-1st step of SDLC -Meant for project invitation and management
What are the steps of project management:
-Project management steps: 1. Imitation 2. Planning 3. execution 4. monitoring and controlling 5. completion
What are the 2 project management tools?
-tools: 1. pert chart (web/ hierarchy chart) 2. Gantt (bar graph)
3 types of forward auctions
1. 1st- pay the price u bid 2. 2nd- pay price of second highest bid 3. dutch- starts high then goes low
What is the 3 part simple software framework?
1. input 2. process 3. output
Why is it necessary to have a formal way to write software (SLDC)? 3 reasons
1. non intuitive 2. most projects fail (late, over budge, not all features) 3. miscommunication
What are the 4 types of installation processes found in the implementation phase of SDLC?
1. parallel- old and new system @ same time 2. plunge- change on a date 3. phased- old system gradually phase into new sys 4. pilot- project by project
3 types of rapid SDLC methodologies
1. phase 2. prototype 3. agile
4 characteristics for system software development:
1. purpose 2. boundaries 3. constraints (time, $, quality) 4. complexity
4 ways to protect security controls with people
1. security policies sand plans, like passwords w authentication and authorization 2. physical controls 3. access controls 4. communication and network controls
2 types of structured SDLC methodologies
1. waterfall 2. parallel
Reintermediation offers larger organizations to pass on cost savings to their customers.
F
Which of the following does not provide outsourcing services?
Open source communities
information security, which of the following is true of managing risk?
Organizations should implement safeguards that balance the trade-off between risk and cost.
A large number of online eCommerce marketplaces try to create offer lowers costs to their customers by
Providing self-service options Interactive Marketing and Personalization Collaborative filtering
Phased and Agile development are examples of the ____ SDLC methodology
Rapid SDLC
---- is a process to develop complex software
SDLC, system development life cycle
T/F Forward auctions are auctions that sellers use as a channel to many potential buyers.
T
Which of the following statements is a characteristic of outsourcing?
To achieve quality, it is easier to hire another vendor than it is to rehire internal staff.
What is the goal of information security?
To find an appropriate trade-off between the risk of loss and the cost of safeguards. & avoid downtime
what is biometrics?
Unique body features to identify people. (Ex. Gait, Iris pattern, Fingerprint, DNA, Vein geometry, ect.)
What is the hierarchy of code testing preformed during the implementation phase of SDLC?
Unit testing, system testing, functional testing, integration testing, acceptance testing (alpha, beta)
Which of the following usually happens in a malicious denial-of-service attack?
a hacker floods a Web server with millions of bogus service requests
what r the 3 parts off the CIA triad?
confidentiality, integrity, availability
what is cypermediation? intermediation? disintermediation?
cybermediation: Refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness intermediation: involves the "matching" of lenders with savings to borrowers who need money by an agent or third party, such as a bank disintermediation: occurs when potential lenders and borrowers interact more directly in the capital markets
T/F In-house development is a viable option for software acquastion for small non-technology companies
f
eBay uses a _____ auction.
forward
what is the "long tail" concept?
if you make it someone will buy it
What is the 4th SDLC phase, and what is it meant to do? (3 activities)
implementation- write code, test code, and install
what is social engineering?
just asking for information w confidence
Place the stages of the systems development life cycle in order:
planning, design, analysis, implementation, maintenance
In asymmetric encryption, each site has a ________ for encoding messages.
public key
The project plan which results from defining the system is the input to ________, which is the second phase of the SDLC.
requirement analysis
In _____ auctions, there is one buyer who wants to buy a product. Suppliers submit bids, and the lowest bid wins.
reverse
3 types of B2B and what kind of auctions they use
sell side- forward auctions (many buyers, one seller) buy side- reverse auctions (one buyer, many sellers) vertical market- both interact
What is industrial espionage?
stealing client lists, trade secrets, plans, processes, financial data, etc
What is a bot net?
type of software attack that connects large amounts of viruses or worms. commonly performs "denial of service"
What is a logic bomb?
type of software attack that is designed to go off at a certain dat and destroy information
What is alien software?
type of software attack that is installed on your computer through duplicitous methods
What is a worm?
type of software attack that spreads by itself
What is a blue bug?
type of software attack that uses bluetooth to bug people
What is a trojan horse?
type of software attack/malware that is disguised as a useful utility, but is embedded with a malicious code to infect computer systems
Bob creates a new accounting information system by following a linear sequence from requirements to design to implementation. Therefore, Bob's SDLC of choice is also known as the ____.
waterfall method