MIS 200 Exam 3 Herfurth

studied byStudied by 288 people
5.0(3)
Get a hint
Hint

the cloud

1 / 83

flashcard set

Earn XP

Description and Tags

84 Terms

1

the cloud

elastic leasing of pooled computer resources over the internet

New cards
2

Computer Network

a system that connects computers and other devices via communications media so that data and information can be transmitted among them

New cards
3

LAN

Local area network; computers connected at a single physical site

New cards
4

WAN

Wide Area Network; computers connected between two or more separated sites

New cards
5

Intranet

a network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization

New cards
6

Extranet

a network configuration that allows selected outside organizations to access internal information systems

New cards
7

IP address

A number that uniquely identifies each computer or device connected to the Internet.

New cards
8

URL

An easy-to-remember address for calling a web page (like www.code.org).

New cards
9

HTTPS protocol

uses http in conjunction with the SSL/TLS protocol to provide secure communication

New cards
10

VPN

using the public internet to build a secure, private network connecting distant locations

New cards
11

resource elasticity

automatically adjust resources for unpredictable demand

New cards
12

Pooled computer resources

organizations share same physical hardware through virtualization so the cost decreases

New cards
13

Why many organizations are moving to the cloud V.S. why they are not

ARE: lower costs, ubiquitous access, improved scalability, elasticity, virtualization technology, internet-based standards enable flexible & standardized processing capabilities ARE NOT: when law or standard industry practive require physical control or possession of the data, financial institutions are legally required to maintain physical control over their data

New cards
14

When is VPN used

when you need to remote into the local area network of wherever you need to be

New cards
15

Net Neutrality

the principle that all Internet traffic should be treated equally by Internet Service Providers.

New cards
16

Capital

the investment of resources for future profit

New cards
17

Social media

IT for sharing content amoung networks of users, enables communities of practice

New cards
18

Social capital

social relations with expectation of marketplace returns

New cards
19

Revenue models

Advertising, subscriptions, transaction fees, sales, and affiliate revenue.

New cards
20

Geofencing

location service allowing applications to know when a user has crossed a virtual fence

New cards
21

conversion rate

Frequency someone clicks on ad makes a purchase, "likes" a site, or takes some other action desired by advertiser

New cards
22

vanity metrics

things that dont matter, not tied to organizations strategy or values

New cards
23

Key performance indicators (KPIs)

The quantifiable metrics a company uses to evaluate progress toward critical success factors

New cards
24

success metrics

measurements to track performance toward goals

New cards
25

Social media provider vs. social media user

Providers: facebook, google, linkedin, twitter, etc. attracting demographic groups Users: individuals and organizations

New cards
26

benefits of social media for organizations

customers can have a direct relationship with the products, organizations can get the word out there

New cards
27

pros vs. cons of problem solving via social media

leaving it, respond to it, or delete it; can be pros and cons to all

New cards
28

value of social capital

number of relationships, strength of relationships, and resources controlled; information, influence, social credentials, personal reinforcement

New cards
29

determining the best revenue model for an organization

advertising, freemium, sales; whichever makes more sense for the organization

New cards
30

how social media fits into organizational strategy

social media changes the balance of power amoung users, communities, and organizations

New cards
31

role of social media in value chain activities

value chains determine business processes, processes determine SMIS requirements, dynamic process flows cannot be designed or diagrammed

New cards
32

threat

can come in different ways, hackers, natural disasters, etc.

New cards
33

vulnerability

threats attack vunerabilities, somewhere a threat could attack

New cards
34

target

aim for money or information, most of the time ends in loss

New cards
35

pretexting

someone pretends to be someone else

New cards
36

sniffing

technique for intercepting computer communications

New cards
37

spoofing

another term for someone pretending to be someone else

New cards
38

phishing

a similar technique for obtaining unauthorized data that uses pretexting via email

New cards
39

hacking

breaking into computers, servers, or networks to steal data

New cards
40

denial of service attack

a cyber attack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources

New cards
41

human safeguard

steps taken to protect against security threats by establishing appropriate procedures for users to follow for system use

New cards
42

technical safeguard

identification and authorization, encryption, firewalls, malware protection, application design

New cards
43

cookie

a small text file that a web server stores on your computer

New cards
44

packet-filtering firewall

examines each part of a message and determines whether to let that part pass

New cards
45

Malware

software that is intended to damage or disable computers and computer systems.

New cards
46

Firewall

a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.

New cards
47

Ransomware

Software that encrypts programs and data until a ransom is paid to remove it.

New cards
48

identification vs. authentication

identification - identifies the user authentication - authenticates the user (password, PIN, smart cards, biometric auth.)

New cards
49

threat/loss scenario illustration

knowt flashcard image
New cards
50

types of security loss and examples of each

  1. Unauthorized data disclosure - people gaining access to data they should and being able to sell it

  2. Incorrect data modification - changing data in a companies database

  3. Faulty service - making services not work

  4. Denial of Service - service doesnt work because of an attack or human error

  5. Loss of infastructure - physical hardware or software goes down

New cards
51

common motivations behind hacking

information, money

New cards
52

how DoS works

Human error - inadvertently shut down a web server or corporate gateway router (black friday too many ppl on website) Malicious hacker intentionally floods a web server with millions of bogus requests to prevent legitamite traffic from getting through

New cards
53

Types of security threats

unauthorized data disclosure, incorrect data modification, faulty service, denial of service, loss of infrastructure

New cards
54

Types of IS security safeguards

technical safeguards, data safeguards, and human safeguards

New cards
55

how organizations decide to manage IS risk

having a plan in place, centralized reporting, specific responses (speed, perparation, dont make the problem worse), practice

New cards
56

How does encryption work?

transforming clear text into coded, unintelligible text for secure storage or communication

New cards
57

How do firewalls work?

computing device that prevents unauthorized access

New cards
58

when and how human safeguards are used in IS security

dissemination and enforcement to train employees on computer safety, termination, being aware of security protocalls, account management, password management, help desk policies

New cards
59

when and how technical safeguards are used in IS security

logging into a system using authentication, knowing https is safe, ecryption when you dont want someone to see your message, firewalls so someone cant get passed and get into the network

New cards
60

BI systems

information systems that process operational and other data to identify patterns, relationships, and trends for use by business professionals and other knowledge workers

New cards
61

Data warehouse

obtain data, cleanse data, organize and relate data, catalog data

New cards
62

data mart

contains a subset of data warehouse information

New cards
63

Metadata

data that describes other data

New cards
64

Knowledge management

finding the right information, keeping the information in a readily accessible place, and making the information known to everyone in the firm

New cards
65

content management systems

support management and delivery of documents, other expressions of employee knowledge

New cards
66

artificial intelligence

The ability of a machine to simulate human abilities such as vision, communication, recognition, learning, and decision making in order to achieve a goal

New cards
67

Weak AI vs. Strong AI

weak: focused on completing a single specific taks strong: can complete all of the same tasks a human can

New cards
68

Turing Test

Alan Turing said a machine could be considered intelligent if a human could have a conversation with it and not be able to tell if it was a machine or a human

New cards
69

Tasks of BI Systems

informing, deciding, problem solving, and project management

New cards
70

Three primary activities in the BI process

acquire data, perform analysis, publish results

New cards
71

data acquisition options

New cards
72

Three types of BI analysis

reporting, data mining, BigData

New cards
73

how data mining works and why we do it

use sophisticated statistical techniques to find patterns and relationships

New cards
74

Push vs Pull Publishing

Push happens automatically, pull the knowledge workers have to ask for it

New cards
75

Static vs Dynamic reports

static: prepped once from the underlying data dynamic: at the time of creation, the reporting system reads the most current data and generates the report using the new data

New cards
76

elements of a BI system

knowt flashcard image
New cards
77

role of humans interacting with BI

New cards
78

potential impact of artificial intelligence on the job market

New cards
79

CONCAT

join two or more text strings into one string

New cards
80

COUNTIF/COUNTIFS

Counts the number of cells within a range that meet the given condition

New cards
81

SUMIF/SUMIFS

Adds the cells specified by a given condition or criteria.

New cards
82

AVERAGEIF/AVERAGEIFS

Finds average(arithmetic mean) for the cells specified by a given condition or criteria.

New cards
83

sparklines

small graphs used to represent a series of data; show trends in a series of values, economic cycles, or highlight max or min values

New cards
84

Importance of KPIs

KPIs are often depicted as dashboards with graphs/charts for an at-a-glance status report

New cards

Explore top notes

note Note
studied byStudied by 63 people
... ago
5.0(1)
note Note
studied byStudied by 21 people
... ago
4.0(1)
note Note
studied byStudied by 43 people
... ago
5.0(1)
note Note
studied byStudied by 1 person
... ago
5.0(1)
note Note
studied byStudied by 58 people
... ago
5.0(1)
note Note
studied byStudied by 126 people
... ago
4.5(2)
note Note
studied byStudied by 163 people
... ago
5.0(1)

Explore top flashcards

flashcards Flashcard (58)
studied byStudied by 29 people
... ago
5.0(1)
flashcards Flashcard (62)
studied byStudied by 34 people
... ago
5.0(4)
flashcards Flashcard (30)
studied byStudied by 10 people
... ago
5.0(2)
flashcards Flashcard (74)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (57)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (173)
studied byStudied by 119 people
... ago
5.0(2)
flashcards Flashcard (80)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (61)
studied byStudied by 3 people
... ago
5.0(1)
robot