Front | Back |
What is the systems security and support phase?
|
The systems security and support phase is:
The final phase of the of the systems development life cycle.
An ongoing phase that continues for the life of the system.
The final deliverable is an operational system that is well maintained, supported and secure.
|
What types of system support are there?
|
|
What is the purpose of user training?
|
To provide support and guidance to users to show them how the system can support them to do their jobs
|
What is the purpose of corrective maintained?
|
Corrective maintainance diagnoses and corrects errors in an operational system. If a system failure occurs a patch will be required and the IT department will then provide a permanent solution
|
What is the purpose of adaptive maintenance?
|
Provides enhancements to an existing operational system and makes the system easier to use. Users can submit enhancement requests to be evaluated by the systems request committee. It is often harder than new systems development as new enhancements must work within constraints posed by the new system.
|
What is the purpose of perfective maintained?
|
Perfective maintained changes an existing system to make it more efficient reliable and maintainable. It is most cost effective during the middle of the systems life. The system is reengineered without making so many changes as to make it inefficient and too hard to maintain
|
What is the purpose of preventative maintenance?
|
To analyse areas of weakness and fix those weaknesses so that the system does not break
|
What are the benefits of preventative maintenance?
|
|
What are the maintenance request steps?
|
|
Why is it important for the systems review committee to establish priorities?
|
To have a procedure the balances new development with necessary maintained work
|
What is fault management?
|
Fault management includes monitoring the system for signs of trouble, logging faults, diagnosing the problem and applying corrective action
|
How is system performance and workload measured?
|
Using benchmark testing and metrics like response time, bandwidth, throughput, queue length, busy time and number and arrival items
|
What is capacity planning?
|
Capacity planning monitors current activity and performance levels, anticipates future levels and calculates resources required to provide the required level of service using what-if analysis. This allows a contingency plan to be developed
|
What are the main elements of system security?
|
Integrity, Availability, and Confidentiality
|
What does risk management involve?
|
Identification of possible threats to assets and how they might be exploited, assessing the risks to allow them to be prioritised. Risks are then controlled using avoidance, mitigation, transference and acceptance
|