BEC 6 - Process Management and IT Flashcards

1
Q

BPM activities

A

1) Design
2) Modeling: what if analysis
3) Execution: changes are implemented
4) Monitoring: comparing actual vs expected performance
5) Optimization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The general technique/approach to process management

A
  • Define (the process)
  • Measure: determine the indicators that will show a change in the process
  • Analyze
  • Improve
  • Control
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Gap Analysis

A

Determines the gap, or difference, between industry best practices and the current practices of the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Lean Manufacturing

A

Using only those resources required to meet the requirements of customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Demand Flow

A

Manages resources by using customer demand as the basis for resource allocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Theory of Constraints (TOC)

A

Organizations are impeded from achieving objectives by the existence of one or more constraints. Can either work around or leverage the constraint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

5 Steps of TOC

A

1) Identification of the constraint
2) Exploitation of the constraint
3) Subordinate every other decision to the ones above
4) Elevate the constraint: add capacity to overcome the constraint
5) Return to first step

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Steering Committees

A

Responsible for the oversight of the infromation systems function. Responsible for developing and communicating strategic goals, reviewing the IT budget and allocation of IT costs, and providing ongoing guidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AIS relationship to DSS and EIS

A

Data in an AIS is often processed and aggregated to become inputs to a DSS and EIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

5 dimensions of big data

A

1) Volume
2) Velocity: speed of data accumulation
3) Variety: structured, unstructured, semi structured
4) Veracity: reliability, quality or integrity of the data
5) Value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Types of Data Analytics

A

1) Descriptive Analytics - tells what happened. Uses summary statistics and sorting
2) Diagnostic Analytics - tells why an event happened. Uncovers correlations, patterns, and relationships by performing a drill down, correlation analysis, sequence checks
3) Predictive Analytics - transforms insight into foresight. Uses regression analysis, classification analysis, and decision trees
4) Prescriptive Analytics - tells how to achieve a desired event. Uses AI and what if analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security life cycle

A

1) Identify - what assets exist, identify and document the risks
2) Assess - Determine the likelihood of the risk and the potential impact
3) Protect - Mitigation strategies
4) Monitor - Continually monitor new and existing risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Types of IT Threats

A

1) Natural and Political disasters
2) Errors in software and equipment malfunctions
3) Accidental actions
4) Intentional actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3 Objectives to successfully manage risk

A

1) Integrate the management of IT risk into the overall risk management of the enterprise
2) Make well informed decisions about risk appetite, tolerance, etc.
3) Develop a response to risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Categories of IT controls

A

1) General IT controls - ensure that an organizations control environment is stable and well managed
2) Application controls - controls built into typical business processes that use computer applications. Ensure that data processed through computer applications are accurate, complete, valid, and authorized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IT-Dependent Manual controls

A

A control that relies on an individual performing a control function with some use of an IT component. (ex a system generated report is used to reconcile transactions each month)

17
Q

3 types of firewalls

A

1) Packet-Filtering firewall - utilizes a router to inspect head information
2) Application-Based firewall - allows for exchange of information but not the direct exchange of packets
3) Stateful Inspections - Monitors both the packet header and destination

18
Q

3 types of vulnerability controls

A

1) Hardening - turning off unnecessary features to reduce points of entry
2) Patch management - continuous fixes to vulnerabilities that are discovered
3) Anti-malware program

19
Q

Types of alternative processing facilities to maintain IT operations

A

1) Cold Site - has all the electronical connections but no actual equipment. Cheapest but slowest option
2) Hot Site - is a mirror image of the current facility. Expensive but quick option
3) Warm backup site - Mix of the two. Has hardware installed but will fall short of the processing capabilities found at a hot site