COSC 205 - MIS Chapter 9 - 12
natural disasters
#1 threat to hardware infrastructure
vanity metric
A measure that appears to show some result but does not provide useful information for making decisions.
defining system goals and scope
Dentoin Pharmaceuticals requires an information system to support its new assembly line. The management has assigned a team of ten members to plan this project. Which of the following will be the first major task for this team?
systems analysts
Information systems professionals who understand both business and technology
false
T/F - business process, information systems, and applications have the same characteristics and components
true
T/F - maintaining alignment between information systems direction with organizational strategy is a continuing process
False
T/F - mobile users click ads less often than PC users
False
T/F - most emails and IMs are protected by encryption
False
T/F - once the contract for outsourcing ends, it is very easy to exit from the vendor
True
T/F - removing and disabling cookies present an excellent example of the trade-off between improved security and cost
true
T/F - symmetric encryption is simpler and much faster than asymmetric encryption
true
T/F - the activities in a business process often involve information systems
True
T/F - the general belief of social media providers is that the users wouldn't mind the small loss privacy if they got the service for free
application
a combination of hardware, software, and data components that accomplishes a set of requirements
create diseconomies of scale
according to Brook's Law, adding more people to a late project will
Trojan Horse
bad code disguised by good code
packet-filtering firewalls
can filter both inbound and outbound traffic
Threat
circumstance or people that have the potential to cause harm
business function
claire cosmetics chose a human resources consulting agency to handle its human resources needs for the next 7 years. This is an example of _____ outsourcing
Folksonomy
classification created by users (hashtags)
Breach
confirmed disclosure
encryption
data made secure
Exposure
form of possible loss or harm to information system
Logic bomb
happens when an update comes out and there is a vulnerability that isn't caught by the company (time between when a company releases an update and when they can fix it)
Hacking
illegal access
breach
incident that results in a confirmed disclosure of data
Sniffing
intercepting computer information and usually through entering password on unsecured network
geofencing
location service that allows applications to know when a user has crossed a specific location and then triggers an automated action
Geofencing
location triggers a push notification
Botnet
mass hack
Virus
needs a host
Social capital
number of relationships x strength of relationships x entity resources
Incident
possible data comprised
peer to peer support causes loss of control
primary risk of social media
Control
protective measure; action, device, procedure, technique that reduces vulnerability
social media provider
provide platforms that enable the creation of social networks
probability X loss
risk assessment equation
Fast response from business Customer assisting customer Customer expectations are heard Might be an influencer
social media Advantages to consumer
Can test new products and ideas inexpensively and get feedback Learn a lot about your customer Identify problem quickly Create better marketing campaigns/brand awareness
social media benefits to business
Worm
stand alone bad program that gets into computer system, doesn't need a host
Salami
taking a little bit of data from a lot of people
critical path
the sequence of activities that determine the earliest date by which the project can be completed
Defenders of belief Seekers of the truth (share a common problem)
types of SMIS users
trojan horses
viruses that masquerade as useful programs or files
Vulnerability
weakness in a security system
the number of relationships in a social network, by the strength of those relationships, and by the number of resources controlled by those related
what factors are included to determine the value of social capital?
cost, schedule, technical, and organizational feasibility
which of the following are dimensions of feasibility?
setting IS priorities
which of the following is a function of the steering committee for the information systems department?
investigating new information systems
which of the following is a function of the technology office in an organization's information systems department?
an employee inadvertently installing an old database on top of the current one
which of the following is considered a threat caused by human error?
the operations group monitors user experience and responds to user problems
which of the following statements is true of the information systems department?
because they lost 98 million customer accounts
why did Target create a new C-level security position?