- System development The process of designing, creating, and implementing a new computer system or software application. This can involve requirements gathering, design, coding, testing, and deployment. Examples of system development projects include a new CRM system or a mobile app.
- System Development Life Cycle (SDLC) An organized framework that guides the process of creating and maintaining systems. The SDLC encompasses stages from initial planning and analysis through design, development, testing, deployment, and maintenance to ensure the system's efficiency and alignment with user requirements. Examples of SDLC models include Waterfall, Agile, and DevOps.
- System hardening The process of strengthening a computer system's security by reducing its attack surface and vulnerabilities. This can involve disabling unnecessary services, applying security patches, and implementing security controls. Examples of system hardening measures include firewalls, intrusion detection systems, and access controls.
- System high mode A state in which a computer system operates at its highest level of security. It is used in military and government organizations to protect sensitive information from unauthorized access. Examples -a classified government database, a military communication network, and a secure online voting system.
- System indicator A visual or auditory signal that indicates the status of a computer system. This can include LED lights, beep codes, or system messages. Examples of system indicators include a red light on a server indicating a failure, a beep code indicating a memory error, or a system message saying, "System Overheated."
- System integrity The state of a computer system being free from unauthorized access, tampering, or data corruption. This is a key aspect of computer security and is often ensured through the use of encryption, access controls, and backup systems. Examples of system integrity breaches include a hacker accessing sensitive data or a virus corrupting a database.
- System scanning The process of using specialized software to search a computer system for vulnerabilities, security threats, or other issues. This can involve scanning a network for open ports, running a virus scan, or checking for outdated software. Examples of system scanning tools include Nmap, McAfee VirusScan, and Qualys Vulnerability Management.
- System security plan A document that outlines the policies, procedures, and controls in place to protect a computer system from security threats. This can include information on access controls, data backups, and incident response plans. Examples of system security plans can be found in most organizations' IT policies and procedures manuals.
- System testing The process of verifying that a system meets its specified requirements. It is used in the development and implementation of software and hardware systems. Examples include testing the functionality of a new computer program, the compatibility of a hardware component with existing systems, and the security of a network system.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.