OMIS 350- Exam 3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that may be accessible to anyone who has access to the name network.

.

Large amounts of data stored in electronic form are vulnerable to many more kinds of threats than the same data in manual form.

.

4 Layers of TCP/IP Reference Model:

1. Application 2. Transport 3. Internet 4. Network Interface

Security challenges at the Corporate Servers stage:

1. Hacking 2. Malware 3. Theft and fraud 4. Vandalism 5. Denial-of-service attacks

Types of Networks:

1. Local Area Network (LAN) 2. Campus Area Network (CAN) 3. Metropolitan Area Network (MAN) 4. Wide Area Network (WAN)

Computer forensics deals with:

1. Recovering data from computers while preserving evidential integrity. 2. Securely storing and handling recovered electronic data. 3. Finding significant information in a large volume of electronic data. 4. Presenting the information to a court of law.

Security challenges at the Communications Lines stage:

1. Tapping 2. Sniffing 3. Message alteration 4. Theft and fraud 5. Radiation

The connection medium for linking network components can be:

1. Telephone wire 2. Coaxial Cable 3. Radio Signal (cellular/Wi-Fi)

Security challenges at the Corporate Systems state:

1. Theft of data 2. Copying of data 3. Alteration of data 4. Hardware failure 5. Software failure

Security challenges at the Client (user) stage:

1. Unauthorized access 2. Errors

Includes applications that analyze customer data generated by operational CRM applications to provide information for improving business performance.

Analytical CRM

The range of frequencies that can be accommodated on a particular telecommunications channel is called its _________.

Bandwidth

Uses systems that read and interpret individual human traits, such as fingerprints, irises, and voices, in order to grant or deny access.

Biometric authentication

Information about the demand for a product gets distorted as it passes from one entity to the next across the supply chain.

Bullwhip Effect

A type of application software designed to retrieve, analyze, transform and report data for business intelligence. Included are tools for flexible reporting, ad hoc analysis, interactive dashboards, what-if scenario analysis, and data visualization.

Business Intelligence Tools

Typically provide software and online tools for sales, customer service, and marketing.

CRM Systems

Type of Network: Covers up to 1,000 meters (a mile); a college campus or corporate facility.

Campus Area Network (CAN)

Measures the number of customers who stop using or purchasing products or services from a company.

Churn Rate

A network of organizations and business processes for procuring raw materials, transforming these materials into intermediate and finished products, and distributing the finished products to customers. It links suppliers, manufacturing plants, distribution centers, retail outlets, and customers to supply goods and services from source through consumption.

Supply Chain

Manage the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner.

Supply Chain Execution Systems

Enable the firm to model its existing supply chain, generate demand forecasts for products, and develop optimal sourcing and manufacturing plans.

Supply Chain Planning Systems

Has more intelligence than a hub and can filter and forward data to a specified destination on the network.

Switch

Look at page 362.

What is customer relationship management (CRM)

Type of Network: Covers a transcontinental or global area.

Wide Area Network (WAN)

Independent computer programs that copy themselves from one computer to other computers over a network. Unlike viruses, they can operate on their own without attaching to other computer program files and rely less on human behavior in order to spread from computer to computer. Most attacks are from these.

Worms

Operate over existing telephone lines to carry voice, data, and video at transmission rates ranging from 385 Kbps all the way up to 40 Mbps, depending on usage patterns and distance.

Digital Subscriber Line (DSL)

The English-like name that corresponds to the unique 32-bit numeric IP address for each computer connected to the Internet.

Domain name

Consist of malware that comes with a downloaded file that a user intentionally or unintentionally requests.

Drive-by downloads

The internet poses specific security problems be cause it was designed to be ______________.

Easily accessible

The process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the intended receiver.

Encryption

Based on a suite of integrated software modules and a common central database. The database collects data from many different divisions and departments in a firm, and from a large number of key business processes in manufacturing and production, finance and accounting, sales and marketing, and human resources, making the data available for applications that support nearly all of an organization's internal business activities. When new information is entered by one process, the information is made immediately available to other business processes.

Enterprise Resource Planning (ERP) Systems

Require not only deep-seated technological changes but also fundamental changes in the way the business operates.

Enterprise applications

Built around thousands of predefined business processes that reflect best practices.

Enterprise software

Wireless networks that pretend to offer trustworthy Wi-Fi connections to the Internet, such as those in airport lounges, hotels, or coffee shops. The bogus network looks identical to a legitimate public network. Fraudsters try to capture passwords or credit card numbers of unwitting users who log on to the network.

Evil Twins

Prevent unauthorized users from accessing private networks.

Firewalls

Very simple devices that connect network components, sending a packet of data to all other connected devices.

Hubs

The communications standard used to transfer pages on the Web.

Hypertext Transfer Protocol (HTTP)

A crime in which an impostor obtains key pieces of personal information, such as social security identification numbers, driver's license numbers, or credit card numbers, to impersonate someone else.

Identity theft

-Has become the worlds most extensive, public communication system. -The world's largest implementation of client/server computing and internetworking, linking millions of individual networks all over the world. -This global network of networks began in the early 1970s as a U.S. Department of Defense network to link scientists and university professors around the world.

Internet

Every computer on the Internet is assigned a unique _______________, which currently is a 32-bit number represented by four strings of numbers ranging from 0-255 separated by periods.

Internet Protocol (IP) Address

A comercial organization with a permanent connection to the internet that sells temporary connections to retail subscribers. Examples: Earthlink, NetZero, AT&T, and Time Warner

Internet Service Provider (ISP)

Record every keystroke made on a computer to steal serial numbers for software, to launch internet attacks, to gain access to e-mail accounts, to obtain passwords to protected computer systems, or to pick up personal information such as credit card and or band account numbers.

Keyloggers

Type of Network: Covers up to 500 meters (half a mile); an office floor of a building.

Local Area Network (LAN)

Malicious software programs that include a variety of threats, such as computer viruses, worms, and Trojan horses.

Malware

Type of Network: Covers a city or metropolitan area.

Metropolitan Area Network (MAN)

Stands for modulator-demodulator. Cable -- connect your computer to the internet using a cable network. DSL -- connect your computer to the internet using a telephone company's landline network. Wireless -- perform the same function as traditional --, connecting your computer to a wireless network that could be a cell phone network, or a Wi-Fi network.

Modem

Routes and manages communications on the network, or it can reside primarily on a dedicated server computer for all the applications on the network.

Network Operating System (NOS)

Includes customer-facing applications, such as tools for sales force automation.

Operational CRM

A method of slicing digital messages into parcels called packets, sending the packets along different communications paths as they become available, and then reassembling the packets once they arrive at their destinations.

Packet Switching

Small pieces of software that are used to correct software flaws once they are identified without disturbing the proper operation of the software.

Patches

Redirects users to a bogus Web page, even when the individual types the correct Web page address into his or her browser.

Pharming

A form of spoofing that involves setting up fake Web sites or sending e-mail messages that look like those of legitimate businesses to ask users for confidential personal data. The e-mail instructs recipients to update or confirm records by providing social security numbers, bank and credit card information, and other confidential data.

Phishing

A set of rules and procedures governing transmission of information between two points in a network.

Protocol

Demand-driven or build-to-order Model, actual customer orders or purchases trigger events in the supply chain. Only produce what the customer orders.

Pull-based model

Production master schedules are based on forecasts or best guesses of demand for products, and products are "pushed" to customers.

Push-based Model

Provide a powerful technology for tracking the movement of goods throughout the supply chain.

RFID

A communications processor used to route packets of data through different networks, ensuring that the data sent gets to the correct address.

Router

START CHAPTER 8

START CHAPTER 8

START CHAPTER 9

START CHAPTER 9

Attempt to solve the problem of finding useful information on the Web nearly instantly, and, arguably, they are the "killer app" of the Internet era.

Search Engines

Refers to the policies, procedures, and technical measures used to prevent unauthorized access, alterations, theft, or physical damage to information systems.

Security

A type of eavesdropping program that monitors information traveling over a network. When used legitimately, they help identify potential network trouble spots or criminal activity on networks, but when used for criminal purposes, they can be damaging and very difficult to detect.

Sniffer

Enable a business to connect customer conversations and relationships from social networking sites to CRM processes.

Social CRM

Involves redirecting a Web link to an address different from the intended one, with the site masquerading as the intended destination.

Spoofing

Small programs that install themselves surreptitiously on computers to monitor user Web surfing activity and serve up advertising. Also act as malicious software.

Spyware

Client/server computing is a distributed computing model in which some of the processing power is located within small, inexpensive client computers, and resides literally on desktops, laptops, or in handheld devices. These powerful clients are linked to one another through a network that is controlled by a network and provides every client with an address so others can find it on the network.

Client/server computing has largely replaced centralized mainframe computing in which nearly all of the processing takes place on a central large mainframe computer. Client/server computing has extended computing to departments, workgroups, factory floors, and other parts of the business that could not be served by a centralized architecture. It also makes it possible for personal computing devices such as PCs, laptops, and mobile phones, to be connected to networks such as internet. The internet is the largest implementation of client/server computing.

Consists of 2 or more connected computers.

Computer Network

A rogue software program that attaches itself to other software programs or data files in order to be executed, usually without user knowledge or permission.

Computer Virus

The scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.

Computer forensics

Methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its records, and operational adherence to management standards.

Controls

The marketing of complementary products to customers.

Cross-selling

A state-sponsored activity designed to cripple and defeat another state or nation by penetrating its computers or networks for the purposes of causing damage and disruption.

Cyberwarfare

Developed during the early 1970s to support U.S. Department of Defense Advanced Research Projects Agency (DARPA) efforts to help scientists transmit data among different types of computers over long distances.

Transmission Control Protocol/Internet Protocol (TCP/IP)

In the past, many diverse proprietary and incompatible protocols often forced business firms to purchase computing and communications equipment from a single vendor. But today, corporate networks are increasingly using a single, common, worldwide standard called _______________.

Transmission Control Protocol/Internet Protocol (TCP/IP)

A software program that appears to be benign but then does something other than expected. It is not a virus itself, because it does not replicate, but it is often a way for viruses or other malicious code to be introduced into a computer system.

Trojan Horse

Delivers voice information in digital form using packet switching, avoiding the tolls charged by local and long-distance telephone networks.

Voice over IP (VoIP)


संबंधित स्टडी सेट्स

Educations Professions Chapter 8

View Set

CompTIA IT Fundamentals: Networking & Wireless Technologies

View Set

Chapter 9 Gases Section 2 Relating Pressure, Volume, Amount, and Temperature: The Ideal Gas Law

View Set