Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

System Security

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
The liaison between information technicians and business users who translate business requirements and problems into information technology requirements; often considered change agents within the organization.   Systems analyst  
🗑
Attacks where crackers flood a network or Web server with information requests in an attempt to crash the network.   Denial of service  
🗑
Information technology employee who monitors and maintains Web servers.   Webmaster  
🗑
The final systems test where users evaluate the entire system and indicate how well it meets the standards established at the beginning of the design or purchase of the system.   Acceptance test  
🗑
A dynamic process that requires interaction with personnel at all levels within the organization for analysis, design, development, implementation, and operation and maintenance of the organization’s computer-based information system.   Systems life-cycle  
🗑
Coded messages requiring the receiver to have an authorized decryption key to read the message; one-key, two-key, and a hybrid system.   Encryption  
🗑
Guidelines often posted on organization’s intranet for easy access and updates regarding the use/distribution/security of information for the entire organization; formation is typically responsibility of the CIO w/input from all organizational levels   Information policy  
🗑
Individuals proficient with productivity software and technology who are identified to provide assistance to other end users within the organization.   Technology support group  
🗑
Comprehensive audits on the computer-based information system to determine the effectiveness of all the security controls; includes external audits, internal audits, and data audits.   Systems audit  
🗑
A software program on the organization’s network, as well as desktop PCs, notebooks, and workstations, to detect and delete computer viruses.   Antivirus program  
🗑
An attachment to an electronic document that verifies the sender to be whom he/she claims.   Digital certificate  
🗑
An information system designed with duplicate hardware, software, and power supply so processing will continue during a system failure; important for mission critical operations.   Fault-tolerate system  
🗑
A destructive program that masquerades as a benign application; does not replicate.   Trojan horse  
🗑
A security control that identifies an individual based on physiological or behavioral characteristics; (i.e., iris, fingerprints, signature, and keystrokes).   Biometric control  
🗑
An information technology position typically staffed by an electrical engineer with a specialization in networks who can address the information technology infrastructure-hardware, software, data storage, and networks.   Network engineer  
🗑
The process of changing from the old system to a new one; methods include direct, parallel, phased and pilot.   Conversion  
🗑
A rogue software program that spreads throughout the network disrupting processing and memory operations and possibly destroying data; thousands exist, and approximately 50 new ones are created each month.   Virus  
🗑
A malicious hacker with the intent of disabling the computer system for a profit.   Cracker  
🗑
Technical specialists who write and maintain software instructions (code) for the computer; specialize in system software.   Programmer  
🗑
System that consists of software and hardware placed between the organization’s internal network(s) and an external, unsecured network to ensure that only authorized personal have access to the organization’s private network.   Firewall  
🗑
A digital code attached to a document to identify the sender and message contents; to be legally binding, someone must verify tat it belongs to the person who sent the data and that the data were not altered.   Digital signature  
🗑
One who possesses the technical and aesthetic skills for developing Web sites.   Web designer  
🗑
Standards for providing a secure information technology environment.   Security protocol  
🗑
Intentionally or unintentionally entering incorrect or fabricated data or changing or deleting existing data stored in the organization’s files and databases; typically done by organization insiders.   Data tampering  
🗑
A person who gains unauthorized access to a computer network for mischief.   Hacker  
🗑
The information technology person responsible for the logical database design, development of the data dictionary, security of the data, and monitoring how other use data.   Database administrator  
🗑
Unsolicited junk e-mail that interferes with work and can slow down the network to the point where efficient business communication and operations are affected by consuming valuable network bandwidth.   Spam  
🗑
A support station staffed by an information technology specialist where end users can call, e-mail, or drop in to receive both hard   Help desk  
🗑
Software that stores credit card and owner identification to be used for e-commerce purchases.   Digital wallet  
🗑
A committee that focuses on policies for the use of the information system, priorities for system development, budgets for information technology, system security, system maintenance, and system issues.   Steering committee  
🗑
An external location that contains a fully configured backup data center; includes all required hardware and software for a computer-based information system.   Hot site  
🗑
Unit staffed with technology specialists responsible for supporting end users in using hardware and software, maintaining hardware and software, providing technology workshops and seminars, and recommending new purchases for the user’s area of specialty.   Information Center  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: imaitrt
Popular CPS/CAP sets