1/45
These flashcards cover key terms and concepts related to Business Intelligence, Information Security, Systems Development Life Cycle, and Information Systems Management.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Business Intelligence (BI)
The core purpose of BI is to provide insights to support better decisions.
Data Warehouse
A central repository of historical, subject-oriented data.
Data Mart
A miniature warehouse for one department.
3Vs of Big Data
Volume, Velocity, Variety are collectively known as the main challenges of massive datasets.
Dashboard in BI
A visual display of key metrics at a glance.
Data Cleansing
The process that ensures data are accurate, consistent, and free of errors.
Predictive Analytics
Estimates future outcomes using historical data.
Anomaly in BI
A value that deviates significantly from the norm typically indicating fraud or errors.
Metadata
Data about data; includes definitions, formats, and lineage of data assets.
Clustering Analysis
Segmenting customers by purchasing habits.
Data Governance
The policies and roles that ensure data quality and security.
BI Scorecard
Tracks progress against predefined objectives; differs from a dashboard.
Self-Service BI
Empowers end users to create their own ad-hoc reports and visualizations.
Single Version of the Truth
Consistent, agreed-upon definitions for key metrics to avoid conflicting numbers.
Natural Language Querying
Allows users to ask questions in everyday language within BI tools.
Ethical BI Practice
Requires attention to data privacy and bias mitigation.
Data Lake
A storage repository that holds vast amounts of raw data in its native format.
CIA Triad
Refers to Confidentiality, Integrity, and Availability in information security.
Phishing
A form of social engineering where attackers manipulate trust to steal information.
Multi-Factor Authentication (MFA)
Increases security by requiring two different kinds of proof.
Vulnerability
A weakness that can be exploited by a threat.
Ransomware
Malware designed to demand payment to restore access.
Firewall
A network security device that controls network traffic between trust zones.
Incident Response Plan
A plan that outlines roles and communication steps during a security incident.
Patch in Security
An update that fixes software flaws.
Defense-in-Depth
Multiple, overlapping layers of protection to enhance security.
Personally Identifiable Information (PII)
Data that can identify an individual and requires special protection.
Botnet
A network of compromised computers under central control.
Denial-of-Service (DoS) Attack
Targets the availability of a system by overwhelming it with traffic.
Risk
Conceptually expressed as Threat × Vulnerability × Impact.
VPN (Virtual Private Network)
Creates an encrypted tunnel over public networks for secure remote connections.
Systems Development Life Cycle (SDLC)
The process of creating and maintaining information systems.
Gantt Chart
A visual tool that shows task durations and dependencies over time.
User Acceptance Testing (UAT)
Occurs just prior to go-live to validate that the system meets business needs.
Change Control Processes
Help evaluate and approve modifications systematically.
Stakeholder Analysis
Identifies all parties affected, their interests and influence.
Agile Methods
Focus on iterative, incremental delivery with continual feedback.
Earned Value Management (EVM)
Compares planned work vs. work completed and costs spent.
Information Systems (IS)
Combines people, technology, and processes to collect, process, and distribute information.
Management Information Systems (MIS)
Supply tactical and strategic reports to managers.
Enterprise Resource Planning (ERP)
Aims to integrate key business processes into one unified platform.
Customer Relationship Management (CRM)
Focuses on optimizing customer interactions and loyalty.
Decision Support Systems (DSS)
Helps managers evaluate complex options with analytical models.
Cloud Computing
Offers on-demand, scalable resources billed as utilities.
Identity & Access Management (IAM)
Centralizes user authentication and permissions.
MIS Initiatives
Success is measured by how well they support organizational goals and strategy.