Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
53 Cards in this Set
- Front
- Back
- 3rd side (hint)
Business intelligence systems
|
Info systems that process operational and other data to analyze past performance and to make predictions.
Project management Problem solving Deciding Informing |
BIS
|
|
Data requisition
|
Process of obtaining, cleaning, organizing, relating and cataloging source data.
|
1st step in BI process
|
|
Push publishing
|
Delivers business intelligence to users without any request from the users. Results are delivered according to a schedule or as result of an event.
|
2nd step in BI process
|
|
Pull publishing
|
Requires the user to request BI results.
|
2nd step of BI process
|
|
Data warehouse
|
A facility for managing an organization's BI data.
Obtains data, cleanse data, organize and relate data, catalog data. |
|
|
Dirty data
|
Problematic data
|
B=gender
213=age |
|
Granularity
|
The level of detail represented by the data.
Too coarse: too many attributes and data points Too fine: not enough money |
Fine / coarse
|
|
Curse of dimensionality
|
The more attributes there are, the heavier it is to build a model that fits the sample data, but it's worthless as a predictor.
|
|
|
Data mart
|
A collection of data, addresses the needs of a particular department.
|
Smaller than data warehouse
|
|
Reporting analysis
|
The process of sorting, grouping, summing, filtering and formatting structured data.
|
Goal: create info about past performance
|
|
Structured data
|
Data in rows and columns.
|
Ex. Tables, spreadsheets
|
|
Exception reports
|
Reports produced when something out of predefined bounds occurs.
|
Dow jones falls
|
|
Data mining
|
Application of statistical techniques to find patterns and relationships among data for classification and prediction.
|
Goal: classify and predict
|
|
Cluster analysis
|
Unsupervised data technique, statistical techniques identify groups of entities that have similar characteristics.
|
Find groups of similar customers from orders and demographic
|
|
Supervised data mining
|
Data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model
|
Cell phone usage= age x months of cell account
|
|
Dynamic reports
|
BI documents that are updated at the time of request. Requires access to database.
|
Sales report
|
|
Systems development
|
Systems analysis and design.
Hardware Software Data Procedures People |
|
|
Changes in requirements
|
The bigger the system and longer the project, the more requirements change.
|
|
|
Brook's law
|
Adding more people to a late project makes a project later
|
|
|
System development life cycle
|
Used to develop information systems.
5 phase process: System definition Requirements analysis Component design Implementation Maintenance |
SDLC
|
|
System definition
|
Use managements statement of the system needs in order to begin to define the new system.
|
1st phase of SDLC
|
|
Organizational feasibility
|
Whether the new system fits within the organization's customs, culture, character or legal requirements
|
|
|
System analysts
|
IT professionals who understand business and technology.
Active in system development |
|
|
Requirements analysis
|
Conduct user interviews
Evaluate existing systems Determine web pages Identify new app features Consider security Create data model Consider 5 components |
|
|
Implementation
|
Build system components
Conduct unit tests Integrate components Conduct tests Convert to new systems |
|
|
Test plan
|
Sequences of actions that users will take when using new system. Normal & incorrect
|
|
|
Beta testing
|
Process of allowing future system users to try out new system on their own
|
|
|
System conversion
|
Changing old system to new
4 ways: pilot, phased, parallel, plunge |
4 Ps
|
|
Pilot installation
|
Implements entire system on a limited portion of the business
|
|
|
Parallel installation
|
Runs parallel with old system until new is fully operational
|
|
|
Patch
|
A group of files for high priority failures that can be applied to existing copies of a product
|
|
|
Service packs
|
Bundles of files of low priority problems
|
|
|
Pretexting
|
When someone deceives by pretending to be someone else to obtain personal data.
|
|
|
Phising
|
Obtaining unauthorized data that uses Pretexting via email
|
Spam
|
|
Email spoofing
|
Pretends to be legit company sending emails requesting data
|
Phishing
|
|
Drive by sniffers
|
Takes computers with wireless connections through an area and search for unprotected wireless networks.
|
Spyware adware
|
|
Hacking
|
Breaking into computers, servers or networks to steal data such as customer lists or inventory.
|
|
|
Denial of service
|
Human error in following procedures or a lack of procedures
|
|
|
Intrusion detection system
|
Computer program that senses when another computer is attempting to scan the disk to access computers.
|
Ids
|
|
Smart card
|
A plastic card similar to credit care, but has microchip to hold data.
Required to enter pin |
|
|
Biometric authentication
|
Uses personal characteristics such as finger prints, facial features, and retinal scans.
|
|
|
Packet filtering firewall
|
Examines each part of a message and determines whether to let part pass by examining source address.
|
|
|
Encryption
|
Transforming clear text into coded
|
|
|
Malware
|
Viruses, worms, Trojan horses, spyware and adware.
|
|
|
Viruses
|
Comp program replicates itself
|
|
|
Trojan horse
|
Masquerade as useful programs or files
|
|
|
Worm
|
Virus that propagates using internet
|
|
|
Spyware
|
Programs installed without permission or knowledge
|
|
|
Adware
|
Watches user activity and produce pop ups
|
|
|
Key escrow
|
A control where a trusted party is given a copy of key used to encrypt data
|
|
|
Password management
|
Changing pw given, constantly, or making two
|
|
|
Security management
|
Log analysis, security testing and investigating and learning from security incidents.
|
|
|
Incident response and plan
|
Have a plan
Centralized reporting Specific responses Speed Prep pays Don't make it worse Practice |
|