MIS Infrastructure and Disaster Recovery Strategies in Information Systems

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/145

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

146 Terms

1
New cards

MIS Infrastructure

Plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets.

2
New cards

Hardware

Consists of the physical devices associated with a computer system.

3
New cards

Software

A set of instructions the hardware executes to carry out specific tasks.

4
New cards

Information MIS infrastructure

Identifies where and how important information is maintained and secured, supports operations and emergency plans.

5
New cards

Examples of information MIS infrastructure

Backup, recovery, disaster recovery, business continuity planning.

6
New cards

Agile MIS infrastructure

Includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support organizational goals and supports change.

7
New cards

Examples of Agile MIS infrastructure

Accessibility, availability, maintainability, portability, reliability, scalability, usability.

8
New cards

Sustainable MIS infrastructure

Identifies ways that companies can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption, supports sustainability.

9
New cards

Examples of sustainable MIS infrastructure

Grid computing, cloud computing, virtualization.

10
New cards

Backup

Provides an exact copy of a system's information.

11
New cards

Recovery

Able to get a system up and running after a crash.

12
New cards

Disaster Recovery

Able to recover information or systems in the event of a catastrophic disaster.

13
New cards

Business Continuity Planning

Creates a way for a company to recover and restore partially or completely interrupted critical functions within a predetermined time after a disaster or extended disruption.

14
New cards

Fault Tolerance

The ability for a system to respond to unexpected failures or system crashes as the backup system immediately and automatically takes over with no loss of service.

15
New cards

Failover

A specific type of fault tolerance that occurs when a redundant storage server offers an exact replica of real-time data. If the primary server crashes, the users are automatically directed to a secondary server (high speed and high cost).

16
New cards

Failback

Occurs when the primary machine recovers and resumes operations.

17
New cards

Low cost/speed backup strategies

External hard drives, thumb drives, or the cloud.

18
New cards

Disaster effects

Disrupting communications, damaging physical infrastructure, halting transportation, blocking utilities.

19
New cards

Hot site

A separate and fully equipped facility where the company can move immediately after a disaster and resume business.

20
New cards

Cold site

A separate facility that does not have any computer equipment but is where employees can move after a disaster.

21
New cards

Warm site

A separate facility with computer equipment that requires installation and configuration.

22
New cards

Disaster recovery cost curve

If you recover too slowly, your business will lose profits. If you recover too quickly, you spend too much money solving the issue.

23
New cards

Disaster Recovery Strategies

Activate backup/recovery facilities in secondary company data centers to transfer data, activate recovery resources in a cloud based service, activity backup systems and data at a hot site, replace damaged equipment with spare components, recover virtual machines at an alternate site, and activate alternate network routes and reroute data and voice traffic away.

24
New cards

Emergency

A sudden, unexpected event requiring immediate action.

25
New cards

Emergency preparedness

Ensures that a company is ready to respond to an emergency in organized, timely, and effective manner.

26
New cards

Business impact analysis

Identifies all critical business functions and the effect that a specific event may have on them.

27
New cards

Emergency notification service

An infrastructure built for notifying people in the event of an emergency.

28
New cards

Technology failure

Occurs when the ability of a company to operate is impaired because of a hardware, software, or data outage.

29
New cards

Incident

Unplanned interruptions of a service.

30
New cards

Incident record

Contains all of the details in an incident.

31
New cards

Incident management

The process responsible for managing how incidents are identified and corrected.

32
New cards

Technology recovery strategies

Focus specifically on prioritizing the order for restoring hardware, software, and data across the organization that best meets business recovery requirements.

33
New cards

Key Areas of Tech Recovery Strategies

Software (applications), hardware (servers/devices), networking (wireless, LAN, cable), and data center (climate control, power supply, security).

34
New cards

Accessibility

Varying levels allow system users to access, view, or perform operational functions.

35
New cards

Availability

The system is operational during different time frames.

36
New cards

Maintainability

The system quickly transforms to support environmental changes.

37
New cards

Portability

The system is available to operate on different devices or software platforms.

38
New cards

Reliability

The system functions correctly and provides accurate information.

39
New cards

Scalability

The system can scale up or adapt to the increased demands of growth.

40
New cards

Usability

The system is easy to learn and efficient and satisfying to use.

41
New cards

Administrator access

Unrestricted access to the entire system depending on identity

42
New cards

Web accessibility

Means that people with disabilities can use the Web.

43
New cards

Web accessibility initiative (WAI)

Brings together people from industry, disability organization, government, and research labs from around the world to develop guidelines and resources to help make the web accessible to people with disabilities.

44
New cards

Vulnerability

A system weakness, such as a password that is never changed or a system left on.

45
New cards

Capacity

Represents the maximum throughput system can deliver; for example, the capacity of a hard drive represents its size or volume.

46
New cards

Capacity planning

Determines future environmental infrastructure requirements to ensure high quality system performance.

47
New cards

Serviceability

How quickly third party can change a system to ensure it meets user needs and terms of any contracts, including agreed to levels of reliability, maintainability, or availability.

48
New cards

Moore's Law

Refers to computer chip performance per dollar doubling every 18 months.

49
New cards

Sustainable (green) MIS

Describes the production, management, use, and disposal of technology in a way that minimizes damage to the environment.

50
New cards

Corporate Social Responsibility

Companies' acknowledged responsibility to society.

51
New cards

Clean computing

Refers to the environment responsible use, manufacture, and disposal of technology products and computer equipment (focuses on production of environmental waste).

52
New cards

Green personal computer (Green PC)

Built using environment-friendly materials and designed to save energy.

53
New cards

Enterprise architect

A person grounded in technology, fluent in business, and able to provide the important bridge between MIS and the business.

54
New cards

Three pressures driving sustainable MIS infrastructures

Carbon emissions, energy consumption, and e-waste.

55
New cards

Grid computing

A collection of computers, often geographically dispersed, that are coordinated to solve a problem.

56
New cards

Cloud computing

Stores, manages, and processes data and application over the Internet rather than on a personal computer or server.

57
New cards

Smart grid

Delivers electricity using two-way digital technology. Solves the problem of the world's outdated electrical grid, making it more efficient and reliable.

58
New cards

Virtualization

Creates multiple virtual machines on a single computing device.

59
New cards

Data centers

A facility used to house management information systems and associated components, such as telecommunications and storage systems.

60
New cards

System Virtualization

Virtualization software makes them think they have their own dedicated computer; all VMs share the physical hardware.

61
New cards

Private Cloud

Serves only one customer or organization and can be located on the customer's premises or off the customer's premises (ie: Bank).

62
New cards

Public Cloud

Promotes massive, global, industrywide applications offered to the general public (ie: Windows Azure).

63
New cards

Hybrid Cloud

Includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology that enables data and application portability (ie: private cloud of the company and public cloud for consumers).

64
New cards

Community Cloud

Serves a specific community with common business models, security requirements, and compliance considerations (ie: all state government organizations).

65
New cards

IaaS (Infrastructure as a Service)

Offers computer hardware and networking equipment on a pay per use basis (ie: Google cloud storage).

66
New cards

Dynamic Scaling

MIS infrastructure can be automatically scaled up or down based on requirements.

67
New cards

DRaaS

Offers backup services that use cloud resources to protect applications and data from disruption caused by disaster.

68
New cards

SaaS (Software as a Service)

Offers applications on a pay per use basis (ie: Google Apps).

69
New cards

Data as a Service

Facilitates the accessibility of business critical data in a timely, secure, and affordable manner.

70
New cards

Security as a Service

Involves applications such as anti-virus software delivered over the Internet with constant virus definition updates that are not reliant on user compliance.

71
New cards

Platform as a Service (PaaS)

Offers hardware, networking, and applications on a pay per use basis. Supports the development of entire systems (ie: Windows Azure).

72
New cards

Data granularity

Refers to the extent of detail within the data.

73
New cards

Blockchain

A distributed, decentralized public ledger. Means for digital information to be shared in chronological matters in a public database. Able to store around one thousand transactions.

74
New cards

Fine data

specific and precise data (ie: report for each salesperson or product)

75
New cards

Summary data

condensed overview (ie: report for all sales staff and products)

76
New cards

Coarse data

very broad/ high level (ie: company wide/cross department report)

77
New cards

Data inconsistency

occurs when the same data element has different values

78
New cards

Data integrity issues

occurs when a system produces incorrect, inconsistent, or duplicate data

79
New cards

Five Common Characteristics of High Quality Data

accurate, complete, consistent, timely, and unique

80
New cards

Data Steward

responsible for ensuring policies and procedures are implemented across the organization and acts as a liaison between MIS department and business

81
New cards

Data stewardship

the management and oversight of an organization's data assets

82
New cards

Data governance

refers to the overall management of the availability, usability, integrity, and security of company data

83
New cards

Master Data Management

the practice of gathering data and ensuring it is uniform, accurate, consistent, and complete

84
New cards

Database business advantages

increased flexibility, increased scalability and performance, reduced data redundancy, increased data integrity, increased data security

85
New cards

Physical view of data

deals with the physical storage of data on device

86
New cards

Logical view of data

focus on how individual users logically access data to meet their own particular business needs

87
New cards

Data latency

time it takes for data to be stored or retrieved

88
New cards

Data redundancy

the duplication of data, or the storage of the same data in multiple places

89
New cards

Data integrity

a measure of the quality of data

90
New cards

Business rule

defines how a company performs certain aspects of its business, and typically results in either a yes/no or true/false answer

91
New cards

Relational integrity constraints

rules that enforce basic and fundamental information based on constraints (ie: would not allow someone to create an order for a nonexistent customer)

92
New cards

Business critical integrity constraints

enforce business rules vital to an organization's success and often require more insight and knowledge (ie: no product returns after 15 days at Kroger)

93
New cards

Identity management

a broad administrative area that deals with identifying individuals in a system and controlling their access to resources within that system by associating user rights and restrictions based on identity

94
New cards

Competitive monitoring

occurs when a company keeps tabs on its competition's activities using software. BI can help with this

95
New cards

Business intelligence dashboards

track corporate metrics (CSFs and KPIs) and include advanced capabilities to manipulate data for analysis.

96
New cards

Reasons business analysis is difficult

Inconsistent data definitions, lack of data standards, poor quality data, inadequate data usefulness, ineffective direct data access.

97
New cards

Data warehouse

A logical collection of data gathered from many different operational databases that supports business analysis activities and decision making tasks (organizational focus).

98
New cards

ETL/Integration layer

A process that extracts data from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.

99
New cards

Data warehouse layer

Stores data from every source system over time (query and analysis).

100
New cards

Data mart layer

Contains a subset of data warehouse data (functional focus).