BCIS ch 5
Agile MIS Infrastructure
(supporting change) includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals Example: Accessibility, availability, maintainability, portability, reliability, scalibility, usability.
Information MIS Infrastructure
(supporting operations) identifies where and how important information, such as customer records, is maintained and secured Example: Backup, recover, business continuity planning
Sustainable MIS Infrastructure
(supporting the Environment) identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent of hardware and energy consumption. Example: Grid Computing, cloud computing, virtualization
Types of business disaster
-Disrupting Communications; direct damage to voice, data, and daily operations needs -Damaging physical infrastructures -haulting transportation; blocked roads and have to go home to work. -blocking utilities; such as electric power, water, natural gas interrupted.
Management information system Infrastructure or MIS (dynamic)
-plans for how a firm will build, deploy, use, and share data, processes and MIS assets. -Primary Elements: Back up and recovery plan, disaster recovery plan, and business continuity plan. -Purpose: it can reduce cost, improve productivity, optimize business operations, generate growth, and increase profitability. -Everyone relies on MIS
hot site
A separate and fully equipped facility where the company can move immediately after a disaster and resume business
cold site
A separate facility that does not have any computer equipment, but is a place where employees can move after a disaster
warm site
A separate facility with computer equipment that requires installation and configuration
Corporate social responsibility
Companies' acknowledged responsibility to society
technology recovery strategies
Creates massive amounts of data vital to their survival and continued operations.
What facilitates the accessibility of business-critical data in a timely, secure, and affordable manner?
Data as a service (daas)
SaaS
Delivers applications over the cloud using a pay-per-use revenue model.
What occurs when a redundant storage server offers an exact replica of the real-time data, and if the primary server crashes, the users are automatically directed to a secondary server?
Failover
John works for Internal Computer Specialists, which focuses on helping small business owners resolve MIS infrastructure issues. John's tasks include cleaning and replacing motherboards, cables, and internal components such as DVDs and hard drives. What does John's role at Internal Computer Specialists focus on fixing?
Hardware
Jessica started her own online company, which specializes in selling items for bachelorette parties, wedding parties, and baby showers. Due to the fact that she only operates online, her MIS infrastructure needs to be fast, efficient, and accurate ensuring the best possible experience for her customers. Which of the below is a critical component in Jessica's MIS infrastructure?
Hardware, software, client, and server
Business impact analysis
Identifies all critical business functions and the effect that a specific disaster may have upon them. For example, should the accounting department have its systems up and running before the sales and marketing departments?
Infrastructure as a service
Offers computer hardware and networking equipment on a payper- use basis • Example: Amazon E C 2, Rackspace, V M ware, Google Cloud Storage
What is portability?
Refers to the ability of an application to operate on different devices or software platforms, such as different operating systems.
What is accessibility?
Refers to the varying levels that define what a user can access, view, or perform when operating a system
What occurs when the ability of a company to operate is impaired because of a hardware, software, or data outage?
Technology Failure
Failover
a specific type of fault tolerance, occurs when a unnecessary exact replica of the real-time data, and if the primary server crashes, the users are automatically directed to the secondary server or backup server
disaster recovery cost curve
charts (1) the cost to the company of the unavailability of information and technology and (2) the cost to the company of recovering from a disaster over time
discovery recovery plan
detailed process for recovering information in the event of a disaster.
Business Continuity Plan (BCP)
details how a company recovers and restores critical business operations and systems after a disaster or extended disruption. BCP includes such factors as identifying critical systems, business processes, departments, and the maximum amount of time the business can continue to operate without functioning systems
Reliability
ensures a system is functioning correctly and providing accurate information
A server
is a computer dedicated to providing information to response to requests. Ex: website, server would respond with the web page being requested by the client.
client
is a computer designed to request information from a server. Ex: a web browser
An enterprise architect
is a person grounded in technology, fluent in business, and able to provide the important bridge between MIS and the business. Example: help manage change and dynamically update MIS infrastructure.
network
is communications system created by linking two or more devices.
Technology failures
occurs when the ability of a company to operate is impaired because of a hardware, software, or data outage. It can destroy large amounts of vital data often causing incidents.
Failback
occurs when the primary machine recovers and resumes operations, taking over from the secondary server
fault tolerance
responds to unexpected failures/system crashes as the backup system immediately takes over with no loss of service. Example: used when there is a power failure or flood in a business.
What is the set of instructions the hardware executes to carry out specific tasks?
software
administrator access
unrestricted access to the entire system; can perform functions such as resetting passwords, deleting accounts, and shutting down entire systems