Information Technology Flashcards
Accounting Information System (AIS)
Definition
Type of management information system; it may also be partly a transaction processing system and partly a knowledge system
Electronic Commerce
E-Commerce
- Electronic consummation of exchange transactions
- Uses a private network or the internet
Electronic Commerce Risks - 5
- Security
- Availability
- Processing integrity
- Online privacy
- Confidentiality
Advantages (4) & Disadvantages (4) of Public Networks (e.g. Internet)
Advantages:
- Avoid cost of prop. lines
- Avoids cost of VAN
- Directly communicates to trade partner
- Software allows communication between differing systems
Disadvantages:
- Loss of data confidentiality
- Transmission disruption
- Hackers and viruses
- Attempted electronic fraud
Supply Chain Management Functions - 4
- Planning
- Sourcing
- Making
- Delivery
Virus
Definition
- Piece of computer program that inserts itself into some other program, including operating systems
- Requires a host program (cannot run independently)
Worm
- Program that can run independently
- Cannot attach to other programs
Trojan Horse
- Program that appears to have a useful function but contains a hidden and unintended function that presents a security risk
- Does NOT replicate itself
Traditional File Processing Systems (TPS)
Advantages - 2
Disadvantages - 5
Advantages:
- Operational for many existing systems
- Cost effective for simple apps
Disadvantages
- Dependent
- Duplicates
- Develop individually
- Expensive to maintain
- Difficult to share
Information Technology
Components - 5
- People
- Data
- Hardware
- Software
- Networks
Local Area Network (LAN)
- Permit shared resources
- Normally PRIVATELY owned
LAN Control Implications - 6
- General controls are weak
- Controls rely on end users who may not be control conscious
- Users may not be provided adequate resources for problem resolution
- Enforces segregation of duties
- Good management controls are essential
- LAN software doesn’t provide security features available in larger scale environments
Value Added Networks
Advantages - 4
- Private
- More secure
- Slow (batch)
- Expensive
Internet Advantages - 4
- Public
- Fast (OLRT)
- Less expensive
- Less secure
Disaster Recovery
5 Steps
- Assess the risks
- Identify mission critical apps and data
- Develop a plan
- Determine personnel responsibilities
- Test the disaster recovery plan