Exam 2 Flashcards
The right to be left alone when you want to be, to have control over your personal possessions, and not to be observed without your consent
Privacy
The legal protection afforded an expression of an idea, such as a song, book, or video game
Copyright
The assurance that messages and information are available only to those who are authorized to view them
Confidentiality
The process of extracting large amounts of data from a website and saving it to a spreadsheet or computer
Data scraping
The part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence
Rule 41
Policy that contains general principles regarding information privacy
Information privacy policy
When creating an employee monitoring policy, organizations should follow these common stipulations:
1) Be as specific as possible stating when and what will be monitored
2) Always enforce the policy the same for everyone
3) Expressly communicate that the company reserves the right to monitor all employees
What is the electronic defacing of an existing website?
Cybervandalism
What is the process of monitoring and responding to what is being said about a company, individual, product, or brand?
Social media monitoring
Which of the following is not an example of unplanned downtime?
System upgrade
What is software written with malicious intent to cause annoyance or damage?
Virus
What is click fraud?
The abuse of pay-per- click, pay-per- call, and pay-per- conversation revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser
What includes a variety of threats such as viruses, worms, and Trojan horses?
Malicious code
What builds the national capacity to defend against cyberattacks and works with the federal government to provide cyber security tools, incident response services, and assessment capabilities to safeguard .gov networks?
Cybersecurity and Infrastructure Security Agency
Who are those who seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction?
Cyber terrorists
What are the three areas where technology can aid in the defense against information security attacks?
Authentication and authorization, prevention and resistance, detection and response
Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines
Destructive agents
3 ways to maintain information security that a company should include in their information security policy
1) Require computer users to log off before leaving for lunch
2) Never share user or password info with anyone
3) Change passwords every 30 to 60 days
What is pharming?
Reroutes requests for legitimate websites to false websites. Example, you type in the URL to your bank and pharming could redirect you to a fake site that collects your information. 
Spear phishing
a phishing Expedition in which the emails are carefully designed to target a particular person or organization
A phone scam that attempts to defraud people by asking them to call a bogus telephone number to confirm their account information
Vishing (voice phishing)
The use of a false identity to artificially stimulate demand for a product brand or service
Sock puppet marketing
The identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting
Biometrics
What decodes information?
Decryption 
What are the three business functions and MIS infrastructure supports?
Operations, change, and the environment/sustainability
The plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets
An information MIS infrastructure
A person who is grounded in technology, fluent in business, and able to provide the important bridge between MIS and the business
Enterprise architect
A computer dedicated to providing information in response to requests
A server
An infrastructure built for notifying people in the event of an emergency
Emergency notification service
Creates a way for a company to recover and restore partially or completely interrupted critical functions within a predetermined time after disaster or extended disruption
Business continuity planning
Three questions a company needs to answer when establishing a back up and recovery plan
1) What types of storage mechanism will meet the needs of the company?
2) How often does the company need to backup it’s information?
3) What types of recovery systems does the company infrastructure need?
The information MIS infrastructure supports the day-to-day business operations and plans for
Security breaches and theft, floods and earthquakes, and malicious Internet attacks
What is the primary reason a company has a failover system?
To take down the primary system for maintenance while the secondary system activates to ensure continuous operations
The ability of an application to operate on different devices or software platforms, such as different operating systems 
Portability
How quickly a system can transform to support environmental changes
Maintainability
Focuses on prioritizing the order for restoring software, hardware, and data across the organization that Best meets business recovery requirements
Technology recovery strategy
Cheap electricity is great for keeping Business energy costs down, but this means that we have to rely more on ______ for power
Coal
The production, management, use, and disposal of technology in a way that minimizes damage to the environment
Sustainability or green MIS
What is the amount of energy consumed by business processes and systems?
Energy consumption
What is a company’s acknowledged responsibility to society?
Corporate social responsibility
What is the software that makes the benefits of cloud computing possible, such as multi tenacity?
Cloud fabric
What refers to the safe disposal of MIS assets at the end of their life cycle?
Sustainable MIS
What enables computers to run multiple operating systems and multiple software applications at the same time and creates multiple ‘virtual’ machines all on a single computing device?
Virtualization
What creates a virtual version of computing resources, such as an operating system, server, storage device, or network resource?
Virtualized system
What offers a cloud-based big data service to help organizations analyze massive amounts of data to solve business dilemmas?
Big Data as a Service (BDaaS) 
What is Data as a Service (DaaS)?
Facilitates the accessibility of business-critical data in a timely, secure, and affordable manner
What occurs when a company uses its own computing infrastructure for normal usage and accesses the cloud when it needs to scale for high or peak load requirements, ensuring a sudden spike in usage does not result in poor performance or system crashes?
Cloud bursting
What is Big Data as a Service (BDaaS)?
Offers a cloud-based big data service to help organizations analyze massive amounts of data to solve business dilemmas
What is a real time system?
Provides real time data in response to query requests
What is one of the biggest pitfalls associated with real time data?
It continually changes
What is an example of analytical data?
Future growth analysis, sales projections, and product statistics
What are the two different categories of data type?
Transactional and analytical
What is data validation?
The tests and evaluations used to determine compliance with data governance policies to ensure correctness of data
What is the term for the management and oversight of an organizations data assets to help provide business users with high-quality data that is easily accessible in a consistent manner?
Data stewardship
What maintains data about various types of objects, events, people, and places?
Database
What occurs when a system produces incorrect, inconsistent, or duplicate data?
Data integrity issue
What creates, reads, updates, and deletes data in a database while controlling access and security?
Database management system
What type of integrity constraint does not allow someone to create an order for a nonexistent customer?
Relational integrity constraint
What is the logical view of data?
Focuses on how users logically access data to meet their particular business needs
What is an example of a business critical integrity constraint?
A system will not allow returns of fresh produce after 15 days past delivery
What is it called when a manager has so much data that they cannot make a decision?
Data Rich, information poor
A data warehouse is a _______ collection of data, gathered from many different ________ databases, that supports business analysis activities and decision-making tasks 
Logical; operational
What tool can you customize to display data quickly and run custom reports?
dashboard
What is an individual item on a graph or a chart?
Datapoint
Characteristics of data warehousing and business intelligence
1) They do not include data from other operational systems
2) operational data is mainly current
3) operational data frequently has quality issues
A process that extracts data from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse
ETL (Extraction, transformation, and loading)
What are problems associated with dirty data?
Duplicate data, incorrect data, violates business rules
Examples of external databases in the data warehouse model?
Competitor and industry data, mailing list, and stock market analyses 
A requirement to define an expensive computer calculation, also called mining, that needs to be performed in order to create a new group of trustless transactions ( blocks ) on the distributed ledger or Blockchain
Proof-of –work
A type of digital currency in which a record of transactions is maintained, new units of currency are generated by the computational solution of mathematical problems, and operates independently of a central bank
Bitcoin
What is a Blockchain?
A type of distributed ledger consisting of blocks of data
What is a function that converts an input of letters and numbers into an encrypted output of a fixed length?
Hash