Foundations of Business Intelligence and Information Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/32

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

33 Terms

1
New cards

Problems with traditional file systems

Data redundancy and inconsistency, Program-data dependence, Lack of flexibility, Poor data security, Difficulty in accessing and sharing data

2
New cards

Database

A collection of logically related data stored to serve multiple applications.

3
New cards

DBMS (Database Management System)

Software that allows creation, storage, and manipulation of data in a database.

4
New cards

Main capabilities of a DBMS

Data definition (schema creation), Data manipulation (queries, updates), Data security and access control, Backup and recovery, Data integrity enforcement

5
New cards

Relational DBMS

A type of DBMS that stores data in tables (relations) with rows and columns.

6
New cards

Key features of Relational DBMS

Tables with rows (tuples) and columns (attributes), Primary keys: uniquely identify records, Foreign keys: link related tables, Uses SQL (Structured Query Language)

7
New cards

Business Intelligence (BI) infrastructure

A framework of technologies and tools to collect, store, analyze, and visualize data.

8
New cards

Data Governance

Policies and procedures for managing availability, integrity, security, and usability of data.

9
New cards

Information system security

Policies and technologies that protect systems from unauthorized access, disruption, or destruction.

10
New cards

Need for information system security

To protect confidentiality, integrity, and availability (CIA Triad) of data. To prevent financial losses, legal consequences, and reputational damage.

11
New cards

Malware

Malicious software designed to damage, disrupt, or gain unauthorized access.

12
New cards

Trojan Horse

A program that appears legitimate but performs malicious functions once activated.

13
New cards

Denial of Service (DoS)

An attack that floods a server or network to disrupt service and deny access to users.

14
New cards

SQL Injection

A code injection technique that allows attackers to manipulate SQL queries and access or destroy data.

15
New cards

Identity Management

Techniques and tools to identify, authenticate, and authorize users.

16
New cards

Disaster Recovery

Plans and strategies to restore IT systems and data after unexpected failures or disasters.

17
New cards

Auditing in IS security

The process of reviewing logs and system activity to detect issues, breaches, or non-compliance.

18
New cards

Walkthrough

A structured review of system design or code with peers to find defects early.

19
New cards

Debugging

The process of finding and fixing errors or bugs in software code.

20
New cards

Types of decisions

Structured: Routine and repetitive (e.g., reorder stock); Semi-structured: Some rules, some human judgment (e.g., approving loans); Unstructured: Complex, non-routine, requires intuition (e.g., strategic planning).

21
New cards

Steps in the decision-making process

Intelligence - Identify the problem; Design - Develop possible solutions; Choice - Select the best option; Implementation - Put the solution into action.

22
New cards

Classic Model of Management

Focuses on the roles of planning, organizing, coordinating, deciding, and controlling.

23
New cards

Invest in information systems

To improve decision-making, efficiency, customer service, and gain competitive advantage.

24
New cards

Main functions of Business Intelligence systems

Data collection; Storage and integration; Analysis and modeling (e.g., dashboards, reports); Decision support for strategic, tactical, and operational goals.

25
New cards

Systems Development Lifecycle (SDLC)

A structured process for developing information systems.

26
New cards

Phases of SDLC

Systems Analysis - Determine requirements; Systems Design - Create technical blueprint; Programming - Write code; Testing - Check for errors (unit, system, acceptance); Conversion - Implement the system (parallel, direct, phased); Production & Maintenance - Ongoing support and updates.

27
New cards

Prototyping

Building a preliminary version of a system quickly to test concepts and gather user feedback. Useful for refining unclear requirements and supports iterative development.

28
New cards

Common types of system failures

Cost overruns, schedule delays, unmet requirements, poor user acceptance.

29
New cards

Consequences of poor project management

Budget issues, reduced quality, project cancellation, stakeholder dissatisfaction.

30
New cards

Project Management

Application of skills, tools, and techniques to meet project objectives and constraints.

31
New cards

5 key variables of project management

Scope - What is being delivered; Time - Project timeline; Cost - Budget; Quality - Meeting performance standards; Risk - Managing potential problems.

32
New cards

Risk Management in projects

Identifying, analyzing, and planning for potential project risks to minimize impact.

33
New cards

User Involvement

Ensures requirements are met, increases system acceptance, reduces resistance, and improves satisfaction.