Using Alternate Sites - ANSWERS-In this agreement The vendor is responsible for
providing backup services if the company experiences a critical failure in its
systems.
Hot-Site - ANSWERS-Facility assumes the entire burden of providing backup
computing services for the customer. Uninterrupted service in a relatively quick
time. Most expensive solution.
Security Risk - data is now stored, backed up and theoretically accessible to a third
party.
Cold-Site - ANSWERS-Provides facilities necessary to run a data processing center.
Does not have any of the hardware or software. Customer must deliver the
hardware and software.
Warm-Site - ANSWERS-Provides the building and environmental services, with
addition to hardware and communication links already established.
The customer applications are not installed, nor are workstations provided.
Service Bureaus - ANSWERS-Provide backup processing services at a remote
location. Quick response but high cost. Perform primary application processing
such as payroll systems and have extra capacity for DRP services.
,Mobile Units - ANSWERS-third-party vendor provides a data processing center on
wheels, air conditioning and power system
The Cloud - ANSWERS-Virtualized storage of applications and their data, the
customer finds its data backed up and available for immediate recovery
Multiple centers - ANSWERS-Processing is distributed across multiple centers that
are in-house or part of a shared site agreement.
Walk-throughs - ANSWERS-Method of testing the DRP members of the key
business units meet to trace their steps through the plan, looking for omissions
and inaccuracies
Simulations - ANSWERS-Method of testing the DRP Critical personnel meet to
perform a dry run of the emergency, mimicking the response to a true emergency
as closely as possible.
Checklists - ANSWERS-Method of testing the DRP a more passive type of testing,
members of departments check off the tasks for which they are responsible for
Parallel testing - ANSWERS-Method of testing the DRP the backup processing
occurs in parallel with production services that never stop.
,Full interruption - ANSWERS-Method of testing the DRP True/False test,
production systems are stopped as if a disaster occurred to see how the backup
services perform.
Military and Intelligence attacks - ANSWERS-What type of attack is criminals and
intelligence agents illegally obtain classified and sensitive military information and
police files.
Business attacks - ANSWERS-Increasing competition between companies
frequently leads to illegal access of proprietary information
Financial Attacks - ANSWERS-Banks and other financial institutions provide
attractive targets for computer criminals
Grudge Attacks - ANSWERS-Companies are increasingly wary of disgruntled
employees who feel mistreated and exact their revenge using computer systems
Thrill Attacks - ANSWERS-Hack computer systems for the fun of it, for bragging
rights, or simply for a challenge
Rouge Code - ANSWERS-What type of computer crime the user inadvertently
launches software that can log a user's keystrokes and either send them to a
remote server or perform other undesirable activities such as deleting files or
destroying OS
, Dumpster Diving - ANSWERS-What type of computer crime no-tech criminal
technique is the primary cause of ID theft. Criminal digs through trash
Spoofing of Internet Protocol Addresses - ANSWERS-What type of computer crime
the attacker sends a message with a false originating IP address to convince the
recipient that the sender is someone else. Masquerades as a legitimate Internet
site by using that site's IP address
Confidentiality - ANSWERS-Referred to as Least privileged -users should be given
only enough privilege to perform their duties, and no more. ensure that no
unauthorized access to information is permitted and that accidental disclosure of
sensitive information is not possible.
Integrity - ANSWERS-Keep data pure and trustworthy by protecting system data
from intentional or accidental changes.
Prevent unauthorized users from making modifications to data or programs
Prevent authorized users from making improper or unauthorized modifications
Maintain internal and external consistency of data and programs
Availability - ANSWERS-Keep data and resources available for authorized use,
especially during emergencies or disasters.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Teacher101. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $17.99. You're not tied to anything after your purchase.