Looks like no one added any tags here yet for you.
Raw facts and figures
data
highly specific and is stored in a predefined format
structured data
many varied types of data that are stored in their native formats
unstructured data
a real-world example of structured versus unstructured data
the date and time of an email (structured) versus the content of the email itself (unstructured)
data presented in a context so that it can answer a question or support decision-making
information
insight derived from experience and expertise, based on data and information
knowledge
the collections, storage, and analysis of extremely large, complex, and often unstructured data sets that can be used by organizations to generate insights that would otherwise be impossible to make
big data
what is decision making enabled by?
standardized corporate data and access to third-party data sets through cheap, fast computing and easier-to-use software
a term combining aspects of reporting, data exploration and ad hoc queries, and sophisticated data modeling and analysis
business intelligence (BI)
a term describing the extensive use of data, statistical and quantitative analysis, explanatory and predictive models, and fact-based management to drive decisions and actions
analytics
a type of artificial intelligence that leverages massive amounts of data so that computers can act and improve on their own without additional programming
machine learning
single table or a collection of related tables
database
software for creating, maintaining, and manipulating data
database management systems (DBMS) / also known as database software
a programming language used to create and manipulate databases
structured query language (SQL)
common SQL commands
SELECT, UPDATE, INSERT, DELETE
a row in a database table; records represent a single instance of whatever the table keeps track of
row or record
a column in a database table; columns represent each category of data contained in a record
column or field
list of data, arranged in columns or fields and rows or records
table or file
most common standard for expressing databases, whereby tables (files) are related based on common keys
relational database
What is data from external sources able to do/not do?
can provide operational insight for increased efficiency and cost savings; may give firms a high-impact edge; might not yield competitive advantage on its own
firms that collect and resell data
data aggregators
What is concerning about the internet and data aggregators?
easy access to data that had been public but is otherwise difficult to access; accuracy concerns; privacy concerns
a set of databases to support decision-making in an organization
data warehouse; also referred to as an enterprise data warehouse (EDW)
database or databases found on addressing the concerns of a specific problem or business unit; structured for fast online queries and exploration; collects data from many different operational systems; may contain huge volumes of data
data mart
example of a data mart
database: 2020 US census data
data warehouse: all census data ever collected worldwide
identifying and retrieving relevant electronic information to support litigation efforts
e-discovery
provide regular summaries of information in a predetermined format
canned reports
puts users in control so that they can create and custom reports on an as-needed basis by selecting fields, ranges, summary conditions, and other parameters
ad hoc reporting tools
heads-up display of critical indicators that allows managers to get a graphical glance at key performance metrics
dashboards
takes data from standard relational databases, calculates and summarizes the data, and then stores the data in a special database called a data cube
online analytical processing (OLAP)
special database used to store data in OLAP reporting
data cube
two types of popular business intelligence tools
tableau and power BI
the process of using computers to identify hidden patterns in, and to build models from, large datasets
data mining
key areas of leverage in data mining
customer segmentation and market basket analysis; marketing and promotion targeting; collaborating filtering and customer churn; fraud detection, financial modeling, hiring and promotion
prerequisites for data mining to work
organization must have clean, consistent data; events in that data should reflect trends
computer software that can mimic or improve upon functions that would otherwise require human intelligence
artificial intelligence (AI)
a type of machine learning that uses multiple layers of interconnections among data to identify pattern and improve predicted results
deep learning
examines data and hunts down and exposes patterns, in order to build models to exploit findings
neural networks
leverages rules or examples to perform a task in a way that mimics applied human expertise
expert systems
model building techniques where computers examine many potential solutions to a problem
genetic algorithms
organization or firm that provides access to the internet
internet service provider (ISP)
how do internet service providers work?
by connecting to one another, exchanging traffic and ensuring that messages can get to any other computer that’s online and willing to communicate
The internet was designed to be redundant and fault-tolerant- if one network, connecting wire, or server stops working, everything else should keep on running.
True or false?
true
the name of the network you’re trying to connect to (usually represents an organization)
domain name
the computer you’re looking for on that network
the host
a firm that provides hardware and servers to run the websites of others
web hosting services
a nonprofit governance and standards-setting body that accredits registrars throughout the world
ICANN (internet corporation for assigning names and numbers)
value used to identify a device that is connected to the internet; can be used to identify a user’s physical location in some cases
IP address
internet directory service that allows devices and services to be named and discoverable; distributed database that looks up host and domain names and returns the actual IP addresses for them
domain name service (DNS)
temporary storage space used to speed computing tasks
cache
technologies that connect end users to the Internet; refers to the fact that these connections are usually the slowest part of the network
last mile
high-speed internet connections (cable, fiber, wireless)
broadband
insulated copper cable used by television providers; has shielding that reduces electrical interference; allows cable signals to travel longer distances without degrading and with less chance of interference
coaxial cable
broadband service provided via light-transmitting fiber-optic cables; fastest last-mile technology and works easily over long distances
fiber to the home (FTTH)
limitations of fiber to the home
need to build fiber infrastructure from scratch; cost of buildout is enormous
provided by earth-bound base stations like cell phone towers
terrestrial wireless
What were the first residential satellite services used for?
downloads
the principal that all internet traffic should be treated equally
net neutrality
factors that can amplify a firm’s vulnerability of a security breach
personnel issues, technology problems, procedural factors, operational issues
who is breaching security?
corporate insiders, malicious insider attacks, and accidental
a term that may be applied to either 1) someone who breaks into a computer, or 2) to a particularly clever programmer
external hacker
uncover computer weaknesses without exploiting them; contribute to improving system security
white hat hacker
computer criminals who exploit a system’s weakness for personal gain
black hat hackers
protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage
hacktivists
cybercriminals who infiltrate systems and collect data for illegal resale
data harvesters
criminals that purchase assets from data harvesters to be used for illegal financial gain; they might buy goods using stolen credit cards or create false accounts
cash-out fraudsters
hordes of surreptitiously infiltrated computers, controlled remotely
botnets
shutting down websites with a crushing load of seemingly legitimate requests
distributed denial of service (DDoS) attacks
a broad range of malicious activities accomplished through human interactions; uses psychological manipulation to trick users into making security mistakes or giving away sensitive information
social engineering
email transmissions and packets that have been altered to forge or disguise their origin or identity
spoofed email
cons executed using technology, in order to acquire sensitive information or trick someone into installing malicious software
phishing
attacks are messages typically personalized based on public information the attacker has found on the recipient
spear phishing
involves a person creating a fictional persona or fake identity on a social networking service
catfishing
new attacks that haven’t been clearly identified and haven’t been incorporated into security screening systems
zero-day exploits
measure and analyze human body characteristics for identification or authentication
biometrics
when identity is proven by presenting more than one item for proof of credentials
multi-factor authentication
seeks to compromise a computing system without permission
malware
seeks to encrypt a computing system in order to collect payment to decrypt the system
ransomware
methods of malware infection
user clicks on a link in an email or text; user downloads software
goals of malware
take control of computer/phone; spyware; keylogger; screen capture
monitors user actions, network traffic, or scans for files
spyware
records user keystrokes
keylogger
records pixels that appear on a user’s screen to identify propritary information
screen capture