• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/55

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

55 Cards in this Set

  • Front
  • Back
Database Management System

define
example
functions
info is ____-dimension
 DBMS: software that creates and manipulates data by which users and application programs interact with a database – example: project management through Microsoft Access
• Functions
1. Manage stored data
2. Transform data into information
3. Provide security
4. Allow multiuser access
5. Programming and query language ability
6. data dictionary

info is 2-dimensional
EX: sales by location
Data Dictionary

define & describe
Data dictionary – a file that stores definitions of information types

identifies the primary and foreign keys and maintains the relationship among tables

-Contains metadata (data about data)
-DBMS controls data about the characteristics of databases
-Storage area for the structure of a relational database
-Info found here:
1)Definitions of the columns – make up each table
2)Integrity constraints placed on relations
3)Security info (users have the right to perform which operation of which table)
Data Warehouse

define
describe info located here
fundamentals
two philosophies
info is ____-dimensional
A data warehouse is a logical collection of information, gathered from many different operational databases, that supports business analysis activities and decision making tasks – extended form of DBMS;

DW is not a location for all a business’s information, but rather a location for information that is interesting, or information that will assist decision makers in making strategic decisions relative to the organization’s overall mission

fundamentals
1. Data is historic/archival in nature – change is minimized
2. Gathered from many different operational databases
3. Data is integrated from varied sources
4. Supporting business analysis activities and decision-making tasks

philosophies
1. Top down – build overall data warehouse and extract data marts for local purposes
2. Bottom up – build smaller data marts then interconnect them

info is multi-dimensional
1. EX: sales by location by month
2. Cube representation - multidimensional information
3. Data-mining
Data Mining
the process of analyzing data to extract info not offered by the raw data alone
Cube & Multidimensional Info

Benefits of MD info
Symbolism
-layers
-rows
-columns
MD info
-contains many rows and columns
-users can analyze info in a number of different ways and with any number of different dimensions

layers = store information
rows = product info
columns = promotion info
The basis of organizations' decision to buld data warehouses
Organizations decide to build data warehouses normally when

-they have grown to the point where they are no longer able to answer the business questions that they are interested in.

-This usually happens because both the data volume and question complexity have grown beyond what the current systems can handle.

-At that point the business becomes limited by the information that users can reasonably extract from the data system.

-That being said, most decisions to build data warehouses are driven by non-human resources needs.
Organizations responsible for the increase in data warehouse creation
-Over the past decade,
back office (supply chain)

and

front office (sales and marketing)

organizations have led the creation of large corporate data warehouses.
Technical Comparison - DW to DBMS
Technically, the DW is like an extended DBMS
How does data get from individual transaction DBMS to the data warehouse?
Extraction, transformation and loading (ETL)

ETL populates the data warehouse
Major Differences between DBMS & Data Warehouse
-Features: plethora of data, accessibility, providing dynamic access, etc.
-The way data is placed in data warehouses – more summarized, referenced, de-normalized representation
-DBMS 2-D vs. DW multi-D
-DW is a step further, has the ability to provide multidimensional analysis that allows users to gain insights into their information
Information Scrubbing

define
results
a process that weeds out and fixes or discards inconsistent, incorrect, or incomplete info

increases the quality of organizational info and thus the effectiveness of decision-making

strategy to keep info clean
Information Security

define
a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization
Biggest issue surounding information security is ______
The biggest issue surrounding information security is not technical, but is a people issue.
Insiders

define
cause
example
insiders - legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident

cause
-results from people misusing an organization either advertently or inadvertently

example: someone might freely give up their password or write them on sticky notes for anyone to see
Social Engineering
when someone uses their social skills to trick people into revealing access credentials or other information valuable to the attacker
Information Security Plan
after an organization has armed its people with a detailed information security plan, it can focus their efforts on deploying the right types of information security technologies
Authentication and Authorization

-User ID & Password
-Most ineffective way
-PW are nto secure; all it takes is time to crack a password
-easily uncovered by a social engineer
-sometimes cause identity theft
Phishing
a technique to gain personal info for the purpose of identity theft, usually by means of fradulent email
Authentication and Authorization

-Smart Card
-Tokens
More effective than user ID & password

smart card:
device that is around the same size as a credit card that contains embedded technologies that can store info and small amounts of software to perform some limited processing

tokens:
small electronic devices that change user passwords automatically; the user enters his/her ID & token displays the password to gain access to the network
Authentication and Authorization

Something that is part of the User
Most effective

Can be costly & intrusive

Biometrics:
the identification of a user based on a physical characteristic such as a fingerprint, iris, face, voice, or handwriting
Prevention and Resistance

purpose
-Stops intruders from accessing intellectual capital
Security threats to E-business

7 key terms
1)Hackers
2)Viruses
3)Sniffer
4)Packet Tampering
5)Spyware
6)Spoofing
7)Logic Bomb
Hackers
People very knowledgeable about computers who use their knowledge to invade other people's computers
Viruses
Software written with malicious intent to cause annoyance or damage
Sniffers
A program or device that can monitor data traveling over a network.

Sniffers can show all the data being transmitted over a network, including passwords and sensitive info.

Sniffers are a hacker's favorite tool.
Packet Tampering
Consists of altering the contents of packets as they travel over the internet of altering data on computer disks after penetrating a network

example:
an attacker could tap onto a network line to intercept the packets and as they leave the computer he can eavesdrop or alter the info as it leaves the network
Spyware
software that comes from hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer’s CPU and storage for some task the user knows nothing about; causes extremely slow performance, excessive pop-ups, or hijacked homepages
Spoofing
the forging of the return address on an email so that the email message appears to come from someone other than the actual sender

not a virus but rather a way by which virus authors conceal their identities as they send out viruses
Logic Bomb
also called slag code

; programming code, inserted inadvertently or advertently that is designed to “explode” under circumstances such as being idle or the failure of a user to respond to a command

delayed-action computer virus

might be designed to display or print a false message, delete or corrupt data, etc.
Prevention and Resistance software

3 key terms
1)Content Filtering

2)Encryption

3)Firewalls
Content Filtering
occurs when organizations use software that filters content to prevent the transmission of authorized information

is used in filtering for spam (form of unsolicited email)
Encryption

define
PKE - usage
Encryption scrambles information into an alternative form that requires a key or password to decrypt the info
-if there is a security breach and the info is encrypted, the stealer will not be able to read the info

PKE:
Public Key Encryption - an encryption system that uses two keys
-a public key that everyone can have and a private key for the recipient
-the use of multiple keys provides the organization to distribute the public key to all of its customers, hence "public"
-the customers use the public key to encrypt their information and send it along the internet
-when it arrives at its destination, the organization woudl use the private key to unscramble the encrypted info
Firewall
guards a private network by analyzing the info leaving and entering the network

one of the most common defenses

detects computers communicating with the Internet who do not have approval
Detection and Response
if the prevention and resistance strategies fail, and there is a security breach, an organization must use detection and response technologies to mitigate the damage

most common - antivirus software

used to catch hackers and alleviate damage
Biometrics

uses
Banks at ATMS

Schools replacing ID cards with fingerpring biometric system - replaces library & meal cards

using biometrics with passports - biometric test to enter the country
Biometrics

difficulties
Limited amount
-a person's biometric samples are limited, and if they are compromised it is impossible to replace the old ones
-concern with secondary use of biometric data
-ex: burnt hand, finger & handprints cannot be re-imprinted on the skin

Danger
-if someone is trying to gain access to secure properties, they might stalk and assault the property owner to gain access
-damage could be irreversible & potentially cost more than the secured property

Intrusive
-many people feel uncomfortable participing in biometric authorizatio, such as iris scans

Accuracy
-fingerprinting is less expensive and costly, however is not 100 percent accurate

Personal Info
-concerns with personal information not being guarded enough, and misused, tampered with, or sold
-criminals could potentially steal, rearrange, or copy someon's biometric data & then used in unauthorized ways
Major Ethics Policies

3 organizations should have
1)Ethical computer use policy
2)Information privacy policy
3)Acceptable use policy
Ethical Computer Use Policy

define
example
principles
ECUP contains general principles to guide computer use behavior
it is the starting point for any other policies that the organization might establish

example:
ECUP might explicitly state that users shohuld refrain from playing computer games during work hours

principles:
-ensures that the users know how to behave at work & provides discipline
-if seeking appropriate computer use, informed consent is necessary
-users should be informed of the rules and, by agreeing to use the system on that basis, consent to abide by the rules
Information Privacy Policy

define & outline
example
IPP contains general principles regarding information privacy

a large majority of cases, the unethical use of information happens unintentionally

it is then used "unintentionally" for new purposes

example:
Social Security Number - started out as a way to identify retirement benefits and is now used as a sort of universal personal ID
Acceptable Use Policy

define
outline
AUP: a policy that a user must agree to follow in order to be provided access to a network or the internet

Nonrepudiation - a contractual stipulation to ensure that e-business participants do not deny (or repudiate) their online actions

employees or students might have to sign an AUP before being granted a network ID
Email Privacy Policy
details the extend to which email messages may be read by others

email - pervasive

One main problem - users expect privacy
*organizations that own email systems can operate the system as openly or privately as they wish*
-it is up to them to decide how much of your email they will read
-users must consent to this level of intrusion
Internet Use Policy

unique aspects
contains general principles to guide the proper use of the internet

unique aspects
-large amounts of computing resources that internet users can expend, making it essential such use be legitimate
-contains numerous materials that some might feel as offensive
Anti-spam policy
states that email users will not send unsolicited emails

difficult to know what is spam
-end users have to be involved in deciding what spam is; what is unwanted can very widely not just spread from one company to the next, but from one person to the next
Information technology monitoring
tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed
Reasons for employee monitoring
-Many employees use the internet to shop, browse & surf the web
-Most managers do not want their employees conducting personal business during working hours
-Many organizations have increasingly monitored internet usage & even allows the boss to read employees’ email
-If the organization doesn’t trust its employees, it should treat them accordingly
Reasons against employee monitoring
-organizations that monitor their employees unwittingly undermind their relationships with them
-if an organization does not trust its employees, it should treat them accordingly
-most management experts advocate that organizations whose corporate cultures are based on trust are more successful than those whose corporate cultures are based on distrust
Appropriate situations for employee monitoring
-many times decided by legal precedents that are already holding businesses financially responsible for their employees' actions
-sometimes not a choice, but its risk-management obligation
Inappropriate situations for employee monitoring
When it causes negative effects on their employees
-Employee absenteeism: employees are missing full days off work to take care of personal business instead of a few minutes or a few hours at work
-Lowers job satisfaction - people start to believe that quantity is more important than quality
-"Psycholoical reactance," or the ability to rebel against constraints
Internet Use Policy

unique aspects
contains general principles to guide the proper use of the internet

unique aspects
-large amounts of computing resources that internet users can expend, making it essential such use be legitimate
-contains numerous materials that some might feel as offensive
Anti-spam policy
states that email users will not send unsolicited emails

difficult to know what is spam
-end users have to be involved in deciding what spam is; what is unwanted can very widely not just spread from one company to the next, but from one person to the next
Information technology monitoring
tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed
Reasons for employee monitoring
-Many employees use the internet to shop, browse & surf the web
-Most managers do not want their employees conducting personal business during working hours
-Many organizations have increasingly monitored internet usage & even allows the boss to read employees’ email
-If the organization doesn’t trust its employees, it should treat them accordingly
Reasons against employee monitoring
-organizations that monitor their employees unwittingly undermind their relationships with them
-if an organization does not trust its employees, it should treat them accordingly
-most management experts advocate that organizations whose corporate cultures are based on trust are more successful than those whose corporate cultures are based on distrust
Appropriate situations for employee monitoring
-many times decided by legal precedents that are already holding businesses financially responsible for their employees' actions
-sometimes not a choice, but its risk-management obligation
Inappropriate situations for employee monitoring
When it causes negative effects on their employees
-Employee absenteeism: employees are missing full days off work to take care of personal business instead of a few minutes or a few hours at work
-Lowers job satisfaction - people start to believe that quantity is more important than quality
-"Psycholoical reactance," or the ability to rebel against constraints