applied AOS 2

studied byStudied by 6 people
0.0(0)
get a hint
hint

Encryption

1 / 104

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

105 Terms

1

Encryption

a security control where data is encoded or scrambled so it is unreadable by unauthorised people

New cards
2

Types of Encryption

Symmetric Key Encryption, Asymmetric Key Encryption

New cards
3

Symmetric Key Encryption

where the same key is used to encrypt and decrypt the data such as RC4, Blowfish

New cards
4

Asymmetric Key Encryption

where the data is encrypted using a public key, but is decrypted using a private key, known only by the receiver. Such as RSA

New cards
5

Use of Encryption

to protect sensitive data (credit card numbers, personal details) and to prevent any unauthorised access to the system.

New cards
6

Authentication

the method of proving that a user has the right to access the system.

New cards
7

Types of Authentication

Single Factor authentication, Two Factor authentication, Multi factor authentication

New cards
8

Single Factor Authentication

involves ‘something you know’, typically a username and password, to enter into a system.

New cards
9

Two Factor Authentication

involves ‘something you know’ and ‘something you have’. At least two pieces of evidence is required to sign in. Such as a verification code sent to your phone.

New cards
10

Multi Factor Authentication

requires the user to provide 3 or more pieces of evidence to prove their identity. These involve ‘something you know, have and are’. The third element typically uses physical characteristics known as biometric data to further verify your identity.

New cards
11

Data Collection

The act of collecting data help determine project scope, functional and non-functional requirements and constraints.

New cards
12

Methods of Data Collection

Survey, Interview, Report, Observation

New cards
13

Survey

a set of questions asking the user to select from different answers

New cards
14

Advantages of Survey

Inexpensive, immediate results, large sample size.

New cards
15

Disadvantage of Survey

if open ended questions are asked data analysis may take time. Interest may be lost

New cards
16

Interview

A face-to-face meeting for consultative purposes.

New cards
17

Advanatge of Interview

Insightful, primary and in-depth information is collected.

New cards
18

Disadvatge of Interview

Time consuming

New cards
19

Report

A document that provides a summary of findings.

New cards
20

Advantages of Report

Quick, easy and cheap to find.

New cards
21

Disadvantge of Report

Might be unreliable and biased.

New cards
22

Observation

Physically observing how a system operates and how it is used.

New cards
23

Advantage of Observation

Provide an unbiased view. Does not need interaction with people.

New cards
24

Disadvantage of Observation

Time consuming, expensive, people might change behaviour

New cards
25

Functional Requirements

are directly related to what the project will do. E.g. Perform a calculation.

New cards
26

Non Functional Requirements

things that the program should have but does not affect what the program does. These include Usability, Reliability, Portablility, Robustness, Maintainability

New cards
27

Usability

how easy the system is to learn and use.

New cards
28

Reliability

how much it can be depended on to function as designed.

New cards
29

Portability

How easily it can be used in different operating environment

New cards
30

Robustness

How well it responds to errors

New cards
31

Maintainability

How easy it is to look after a software once made

New cards
32

Constraints

Factors that may limit or restrict solution requirements such as economic, technical and Non technical

New cards
33

Economic Constraint

Time and money

New cards
34

Techincal Constraint

technological reason for interuptions in the project

New cards
35

Non technical Constraint

Social, Legal, Usability

New cards
36

Scope

Outlines what the project will and will not do. (Requirements/constraints)

New cards
37

Software Requirements Specification (SRS)

comprises all the elements in the analysis stage, requirements, scope and constraints.

New cards
38

Use of SRS

provides all of the required info about the proposed system in one place. It ensures that the client’s needs are understood, and potential issues have been identified.

New cards
39

Use Case Diagram

Method of describing how a user interacts with a system

New cards
40

Context Diagram

New cards
41

Data Flow Diagram

Indicates the data that is passed in and out of a system.

New cards
42

Convergent thinking

involves coming up with a single, well-established answer to a problem. The design ideas are based on other proven ideas.

New cards
43

Divergent Thinking

involves exploring many possible solutions, using spontaneous free flowing techniques.

New cards
44

Brainstorming

is the process where ideas are presented in a non- judgemental, spontaneous and unstructured way.

New cards
45

Consult End users

Consult those who will be using the product

New cards
46

Generating design ideas

Brainstroming, Consult End users, Mindmapping, Graphic Organisers

New cards
47

Mind Mapping

involves quickly generating and linking ideas

New cards
48

Graphic Organisers

are visual methods of organising ideas. E.g. PMI

New cards
49

Evaluating Deisgn Ideas

Criteria for choosing best design could include ease of use, time it will take, cost, scope for modification, requirement satisfaction etc.

New cards
50

Efficency

concerns how much time, cost and effort has been applied to the achieve the intended results

New cards
51

Effectivenss

how well a solution achieves its intended goals

New cards
52

Criteriia for Effectiveness

Completeness, Readability, Attractiveness, Clariity, Functionality, Accuracy, Accessability, Timeliness, Report Formats, Relavence, Usability, Communication of message

New cards
53

Completeness

were all functional and non functional requirements met

New cards
54

Readability

Can every part of the software be easily read by users, including font size and colour choices

New cards
55

Attractiveness

Are the colours chosen nice looking and work together

New cards
56

Clarity

are the language chosen age appropriate and are headings and labels used throughout

New cards
57

Functionality

does the system react well to user input errors

New cards
58

Accuracy

is data stored accurately, are calculations made 100%

New cards
59

Accessability

how well the system can be used by those with disabilities

New cards
60

Timeliness

does the softwarre respond to requests within an accepetable timeframe

New cards
61

Report formats

Are all the search/sort reports produced by the system appropriate their context

New cards
62

Relevance

is all the information provided and shown by the software relavant

New cards
63

Usability

is the software easy to use

New cards
64

Communciation of message

have approprate conversions/time been used for sppecific places

New cards
65

User Experience (UX)

focuses on providing a relevant and meaningful experience for all users.

New cards
66

User Interface (UI)

focuses on appearance

New cards
67

Factors that influence design and UI/UX

Usability, Affordance, Security, Interoperabilty, Marketabilty

New cards
68

Affordance

ptoviding possible actions for the users

New cards
69

Security

refers to factors such as consent and privacy

New cards
70

Interoperabilty

the abilty of the software tow work across different operating systems

New cards
71

Marketability

refers to the appeal marketing abilty

New cards
72

Elements of UI

Clarity, Concise, Familiar. Responsive, Consistent, Attrative, Efficient, Tolerant

New cards
73

Consice

Provide enough guidance

New cards
74

Familiar

Recognise how features work

New cards
75

Responsive

Quick loading and software giving feedback

New cards
76

Consistent

Develop patterns of use and use in different context

New cards
77

Waterfall Model

has identified stages of production and there is no going back once a stage is completed. This is best for small, well-defined projects as the process cannot be altered

New cards
78

Agile Model

allows for flexibility and simplicity as there are ‘sprints’ of each stage and they are repeated multiple times and improved after each cycle. This is best for changing projects, and it also reduces risks.

New cards
79

Spiral Model

has repeated iterations of processes and aims to eliminate risks. This is best for uncertain clients as risks can be prevented with quick responsive actions.

New cards
80

Project Management

The process of planning, organising and monitoring a project to ensure that it is completed on time, within budget, and in scope

New cards
81

Gant Chart

graphical representation of a project plan. That lists all tasks in order to show dependiecies allowing people to be allocated and able to track progress

New cards
82

Use of Gantt Chart

used to outline each stage and task within a project so that that progress could be monitored, and changes could be made accordingly

New cards
83

Milestones in Gantt Chart

represent the completion of a significant stage. Indicated with a diamond.

New cards
84

Dependicies

also known as predecessors, are tasks that must be completed before another task can be started. Indicated with arrows.

New cards
85

Processes

include task identification, sequencing, critical path and documentation

New cards
86

Crtitical Path

indicates tasks that will delay the whole project if they are delayed.

New cards
87

Goals

help define an organisation’s purpose, assist its growth and achieve its financial objectives.

New cards
88

Organisational Goal

how an organisation intends to go about achieving its mission.

New cards
89

System Goal

how the specific role of an information system will help in achieving an organisational goal.

New cards
90

Objectives

small, achievable tasks undertaken to complete a larger task

New cards
91

Privacy Act 1988

protects personal data of individuals around australia from governments and organisatiosn woth a turnover more than 3 million.

New cards
92

How many Austalian priavcy principles are there

10

New cards
93

APP 1

Open and transparent management of personal infromation

New cards
94

APP 2

gives individuals the option of being anonymous or using a fake name

New cards
95

APP 3

Collection of solicitied personal info

New cards
96

APP 4

How entities must deal with unsolicited info

New cards
97

APP 5

Must notify individuals when perosnal information has been collected

New cards
98

APP 6

Use or diclosure of information

New cards
99

APP 7

Organisation may only use or dislcose information fro marketing purpose if certain conditions are met

New cards
100

APP 8

Outliens steps to protect info before it is dislosed overseas

New cards

Explore top notes

note Note
studied byStudied by 17 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 430 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 3906 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 62 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 14 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 111798 people
Updated ... ago
4.9 Stars(534)

Explore top flashcards

flashcards Flashcard443 terms
studied byStudied by 13 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard39 terms
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard49 terms
studied byStudied by 30 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard94 terms
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard32 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard41 terms
studied byStudied by 107 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard62 terms
studied byStudied by 189 people
Updated ... ago
5.0 Stars(8)