MIS 200 Exam 3 Herfurth

studied byStudied by 284 people
5.0(3)
get a hint
hint

the cloud

1 / 83

Studying Progress

0%
New cards
84
Still learning
0
Almost done
0
Mastered
0
84 Terms
1
New cards

the cloud

elastic leasing of pooled computer resources over the internet

New cards
2
New cards

Computer Network

a system that connects computers and other devices via communications media so that data and information can be transmitted among them

New cards
3
New cards

LAN

Local area network; computers connected at a single physical site

New cards
4
New cards

WAN

Wide Area Network; computers connected between two or more separated sites

New cards
5
New cards

Intranet

a network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization

New cards
6
New cards

Extranet

a network configuration that allows selected outside organizations to access internal information systems

New cards
7
New cards

IP address

A number that uniquely identifies each computer or device connected to the Internet.

New cards
8
New cards

URL

An easy-to-remember address for calling a web page (like www.code.org).

New cards
9
New cards

HTTPS protocol

uses http in conjunction with the SSL/TLS protocol to provide secure communication

New cards
10
New cards

VPN

using the public internet to build a secure, private network connecting distant locations

New cards
11
New cards

resource elasticity

automatically adjust resources for unpredictable demand

New cards
12
New cards

Pooled computer resources

organizations share same physical hardware through virtualization so the cost decreases

New cards
13
New cards

Why many organizations are moving to the cloud V.S. why they are not

ARE: lower costs, ubiquitous access, improved scalability, elasticity, virtualization technology, internet-based standards enable flexible & standardized processing capabilities ARE NOT: when law or standard industry practive require physical control or possession of the data, financial institutions are legally required to maintain physical control over their data

New cards
14
New cards

When is VPN used

when you need to remote into the local area network of wherever you need to be

New cards
15
New cards

Net Neutrality

the principle that all Internet traffic should be treated equally by Internet Service Providers.

New cards
16
New cards

Capital

the investment of resources for future profit

New cards
17
New cards

Social media

IT for sharing content amoung networks of users, enables communities of practice

New cards
18
New cards

Social capital

social relations with expectation of marketplace returns

New cards
19
New cards

Revenue models

Advertising, subscriptions, transaction fees, sales, and affiliate revenue.

New cards
20
New cards

Geofencing

location service allowing applications to know when a user has crossed a virtual fence

New cards
21
New cards

conversion rate

Frequency someone clicks on ad makes a purchase, "likes" a site, or takes some other action desired by advertiser

New cards
22
New cards

vanity metrics

things that dont matter, not tied to organizations strategy or values

New cards
23
New cards

Key performance indicators (KPIs)

The quantifiable metrics a company uses to evaluate progress toward critical success factors

New cards
24
New cards

success metrics

measurements to track performance toward goals

New cards
25
New cards

Social media provider vs. social media user

Providers: facebook, google, linkedin, twitter, etc. attracting demographic groups Users: individuals and organizations

New cards
26
New cards

benefits of social media for organizations

customers can have a direct relationship with the products, organizations can get the word out there

New cards
27
New cards

pros vs. cons of problem solving via social media

leaving it, respond to it, or delete it; can be pros and cons to all

New cards
28
New cards

value of social capital

number of relationships, strength of relationships, and resources controlled; information, influence, social credentials, personal reinforcement

New cards
29
New cards

determining the best revenue model for an organization

advertising, freemium, sales; whichever makes more sense for the organization

New cards
30
New cards

how social media fits into organizational strategy

social media changes the balance of power amoung users, communities, and organizations

New cards
31
New cards

role of social media in value chain activities

value chains determine business processes, processes determine SMIS requirements, dynamic process flows cannot be designed or diagrammed

New cards
32
New cards

threat

can come in different ways, hackers, natural disasters, etc.

New cards
33
New cards

vulnerability

threats attack vunerabilities, somewhere a threat could attack

New cards
34
New cards

target

aim for money or information, most of the time ends in loss

New cards
35
New cards

pretexting

someone pretends to be someone else

New cards
36
New cards

sniffing

technique for intercepting computer communications

New cards
37
New cards

spoofing

another term for someone pretending to be someone else

New cards
38
New cards

phishing

a similar technique for obtaining unauthorized data that uses pretexting via email

New cards
39
New cards

hacking

breaking into computers, servers, or networks to steal data

New cards
40
New cards

denial of service attack

a cyber attack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources

New cards
41
New cards

human safeguard

steps taken to protect against security threats by establishing appropriate procedures for users to follow for system use

New cards
42
New cards

technical safeguard

identification and authorization, encryption, firewalls, malware protection, application design

New cards
43
New cards

cookie

a small text file that a web server stores on your computer

New cards
44
New cards

packet-filtering firewall

examines each part of a message and determines whether to let that part pass

New cards
45
New cards

Malware

software that is intended to damage or disable computers and computer systems.

New cards
46
New cards

Firewall

a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.

New cards
47
New cards

Ransomware

Software that encrypts programs and data until a ransom is paid to remove it.

New cards
48
New cards

identification vs. authentication

identification - identifies the user authentication - authenticates the user (password, PIN, smart cards, biometric auth.)

New cards
49
New cards

threat/loss scenario illustration

knowt flashcard image
knowt flashcard image
New cards
50
New cards

types of security loss and examples of each

  1. Unauthorized data disclosure - people gaining access to data they should and being able to sell it

  2. Incorrect data modification - changing data in a companies database

  3. Faulty service - making services not work

  4. Denial of Service - service doesnt work because of an attack or human error

  5. Loss of infastructure - physical hardware or software goes down

New cards
51
New cards

common motivations behind hacking

information, money

New cards
52
New cards

how DoS works

Human error - inadvertently shut down a web server or corporate gateway router (black friday too many ppl on website) Malicious hacker intentionally floods a web server with millions of bogus requests to prevent legitamite traffic from getting through

New cards
53
New cards

Types of security threats

unauthorized data disclosure, incorrect data modification, faulty service, denial of service, loss of infrastructure

New cards
54
New cards

Types of IS security safeguards

technical safeguards, data safeguards, and human safeguards

New cards
55
New cards

how organizations decide to manage IS risk

having a plan in place, centralized reporting, specific responses (speed, perparation, dont make the problem worse), practice

New cards
56
New cards

How does encryption work?

transforming clear text into coded, unintelligible text for secure storage or communication

New cards
57
New cards

How do firewalls work?

computing device that prevents unauthorized access

New cards
58
New cards

when and how human safeguards are used in IS security

dissemination and enforcement to train employees on computer safety, termination, being aware of security protocalls, account management, password management, help desk policies

New cards
59
New cards

when and how technical safeguards are used in IS security

logging into a system using authentication, knowing https is safe, ecryption when you dont want someone to see your message, firewalls so someone cant get passed and get into the network

New cards
60
New cards

BI systems

information systems that process operational and other data to identify patterns, relationships, and trends for use by business professionals and other knowledge workers

New cards
61
New cards

Data warehouse

obtain data, cleanse data, organize and relate data, catalog data

New cards
62
New cards

data mart

contains a subset of data warehouse information

New cards
63
New cards

Metadata

data that describes other data

New cards
64
New cards

Knowledge management

finding the right information, keeping the information in a readily accessible place, and making the information known to everyone in the firm

New cards
65
New cards

content management systems

support management and delivery of documents, other expressions of employee knowledge

New cards
66
New cards

artificial intelligence

The ability of a machine to simulate human abilities such as vision, communication, recognition, learning, and decision making in order to achieve a goal

New cards
67
New cards

Weak AI vs. Strong AI

weak: focused on completing a single specific taks strong: can complete all of the same tasks a human can

New cards
68
New cards

Turing Test

Alan Turing said a machine could be considered intelligent if a human could have a conversation with it and not be able to tell if it was a machine or a human

New cards
69
New cards

Tasks of BI Systems

informing, deciding, problem solving, and project management

New cards
70
New cards

Three primary activities in the BI process

acquire data, perform analysis, publish results

New cards
71
New cards

data acquisition options

New cards
72
New cards

Three types of BI analysis

reporting, data mining, BigData

New cards
73
New cards

how data mining works and why we do it

use sophisticated statistical techniques to find patterns and relationships

New cards
74
New cards

Push vs Pull Publishing

Push happens automatically, pull the knowledge workers have to ask for it

New cards
75
New cards

Static vs Dynamic reports

static: prepped once from the underlying data dynamic: at the time of creation, the reporting system reads the most current data and generates the report using the new data

New cards
76
New cards

elements of a BI system

knowt flashcard image
knowt flashcard image
New cards
77
New cards

role of humans interacting with BI

New cards
78
New cards

potential impact of artificial intelligence on the job market

New cards
79
New cards

CONCAT

join two or more text strings into one string

New cards
80
New cards

COUNTIF/COUNTIFS

Counts the number of cells within a range that meet the given condition

New cards
81
New cards

SUMIF/SUMIFS

Adds the cells specified by a given condition or criteria.

New cards
82
New cards

AVERAGEIF/AVERAGEIFS

Finds average(arithmetic mean) for the cells specified by a given condition or criteria.

New cards
83
New cards

sparklines

small graphs used to represent a series of data; show trends in a series of values, economic cycles, or highlight max or min values

New cards
84
New cards

Importance of KPIs

KPIs are often depicted as dashboards with graphs/charts for an at-a-glance status report

New cards

Explore top notes

note Note
studied byStudied by 19 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 49 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 13 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 72 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 160 people
Updated ... ago
5.0 Stars(3)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)

Explore top flashcards

flashcards Flashcard257 terms
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard146 terms
studied byStudied by 18 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard62 terms
studied byStudied by 30 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard49 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard93 terms
studied byStudied by 117 people
Updated ... ago
4.3 Stars(4)
flashcards Flashcard100 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard148 terms
studied byStudied by 22 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard69 terms
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)