EIS Component 1: Processes and Protocols
16 Questions
0 Views

EIS Component 1: Processes and Protocols

Created by
@DiversifiedFern

Questions and Answers

What is a key component of a data backup and recovery protocol?

  • Quarterly recovery testing (correct)
  • Weekly software updates
  • Daily user access reviews
  • Monthly system performance evaluation
  • Which aspect of software development is emphasized in its protocol?

  • Mandatory CODE reviews (correct)
  • Direct deployment without testing
  • Real-time user feedback during deployment
  • Automated code generation
  • What might an incident response protocol include?

  • System repair guidelines
  • Automated monitoring tools (correct)
  • Regular user training sessions
  • Annual security audits
  • Which method is recommended for transferring sensitive data outside an organization?

    <p>SFTP or HTTPS</p> Signup and view all the answers

    What is the main purpose of rules in an Enterprise Information System?

    <p>To regulate decision-making in organizational processes.</p> Signup and view all the answers

    In the context of rules and protocols, what function do rules serve?

    <p>Specify actions that are permitted or prohibited</p> Signup and view all the answers

    Which of the following is NOT a typical rule found in an Enterprise Information System?

    <p>Project Management Standards</p> Signup and view all the answers

    What does the data handling rule require for sensitive data?

    <p>Encryption both in transit and at rest.</p> Signup and view all the answers

    What is a characteristic of protocols within an organization?

    <p>Protocols dictate the steps to perform permitted actions</p> Signup and view all the answers

    Which of the following best describes protocols in an Enterprise Information System?

    <p>Sets of steps detailing user and system interactions.</p> Signup and view all the answers

    What must organizations decide regarding their rules and protocols?

    <p>Which rules and protocols are critical to digital operations</p> Signup and view all the answers

    What is a common requirement of the incident reporting rule?

    <p>To report suspected data breaches within one hour.</p> Signup and view all the answers

    What is one aspect of a communication protocol that might be included?

    <p>Mandating specific tools for sensitive communications</p> Signup and view all the answers

    Which rule involves restrictions on personal internet use during work hours?

    <p>Acceptable Use</p> Signup and view all the answers

    What is typically included in a password policy?

    <p>Passwords must include uppercase, lowercase, numbers, and special characters.</p> Signup and view all the answers

    Which of the following is a function of access control rules?

    <p>To limit system access based on job functions.</p> Signup and view all the answers

    Study Notes

    Component 1: Processes, Rules and Protocols in EIS

    • EIS comprises standard processes that organizations repeat to maintain efficiency and effectiveness.
    • Processes include various organizational functions, such as manufacturing, sales, and employee onboarding.

    Rules in EIS

    • Definition: Rules are broad principles guiding employee decision-making within processes.
    • Typical Rules:
      • Password Policies: Enforce complex passwords changed every 90 days; may require a combination of uppercase, lowercase, numbers, and special characters; restrict reuse of the last five passwords.
      • Access Control: Limits access based on job roles; employees access only data relevant to their functions.
      • Data Handling: Mandates encryption for sensitive data during transit and at rest.
      • Acceptable Use: Restricts personal internet use during work hours; specifies business-only use of company emails and bans unauthorized software installations.
      • Incident Reporting: Requires prompt reporting within an hour of any suspected data breach to IT.

    Protocols in EIS

    • Definition: Protocols are specific steps detailing how to communicate or interact within the system.
    • Typical Protocols:
      • Data Backup and Recovery: Involves nightly full backups and quarterly restoration tests to ensure data recovery can occur within set timeframes.
      • Software Development and Deployment: Outlines steps for code review, testing phases (unit, integration, and user acceptance), and deployment processes.
      • Incident Response: Details steps for detecting and responding to security issues, often using automated tools for monitoring.
      • Data Handling and Protection: Specifies secure methods for transferring sensitive data and procedures for data deletion.
      • Communication: Designates tools for both internal and external communication, emphasizing security measures for sensitive information.

    Relationship Between Rules and Protocols

    • Rules and protocols are complementary; rules define what actions are permissible while protocols explain how to perform those actions safely and efficiently.

    Scope of Rules and Protocols in EIS

    • Organizations must subjectively determine which rules and protocols are essential for their EIS.
    • All rules and protocols directly affecting digital operations are considered part of the organization's EIS.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Explore the first component of an Enterprise Information System, focusing on processes, rules, and protocols that govern organizational operations. This quiz delves into the importance of these elements in ensuring efficiency in workflows like manufacturing, sales, and employee onboarding.

    More Quizzes Like This

    Use Quizgecko on...
    Browser
    Browser