Chapter 5 Information And Technology Flashcards
What are the characteristics of good information?
Accurate
Complete
Cost Effective
Understandable
Relevant
Adaptable
Timely
Easy to use
What is information?
Data that has been processed and collected in a way that it has meaning to the person that receives it
What are the features of big data?
Variety
Veracity
Velocity
Volume
What is Phishing?
A technique in which cyber attackers craft emails to fool a target into taking harmful action such as entering sensitive information.
What is Malware?
Malware is short for malicious software.
It is designed to damage a computer, server or network of computers.
Could make computer inoperable or make it be controlled by hacker.
Worms, viruses or trojans are all types of malware.
What is a denial of service attack?
When a hacker overloads something with traffic making it unusable.
What is a man in the middle attack?
When attackers secretly put themselves between a user and a web service. For example acting as a hotel wifi to steal passwords from people before giving them access to the wifi.
What is a transaction processing system (TPS)?
A TPS records daily transactions of an organization for operational managers.
What is a management information system (MIS)?
A MIS coverts data from TPS into information for tactical managers. This information is used to help monitor performance.
What is an executive information system?
The EIS systems provides info from the entire business as well as external information for strategic managers.