Java Games: Flashcards, matching, concentration, and word search.

Safeguarding Info Systems--Chapter 12 Review

AB
User ErrorsThe greatest threat to info systems
theft or destruction of informationcomputer crime
securitythe purpose is to prevent computer crime
hackera person who gains illegal access to an information system
computer virusesrogue software programs
corporate espionagetaking information to gain a competitive edge
data control programsused to deal with inaccurate or outdated information
controlsprocedures, policies and technology
general controlsorganization wide
system documentationflow charts & layouts of the information system
user documentationwritten description of the system with input instructions
operational documentationinstructions on back ups & recovery procedures
application controlscontrols that govern a specific information system
input controlsensures accuracy of data during input
processing controlsensures accuracy of data during processing and updating
output controlsensures that results are complete & accurate
programmed edit checkstechnique for checking input data
control totalsused at all points of processing to ensure accuracy--a type of processing control
Problem AnalysisThe first step in problem solving
ImplementationThe final step in problem solving
data securityprevents unauthorized use/destruction of data
encryptionscrambling data before transmission
redundant servera security measure for protecting a network
disaster recovery planplan for resuming operations after a disruptionq
development methodologyto establish an organization-wide approach for specifications, design, programming & testing of a new system


Business Education Teacher
Lehighton High School

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities