LU4 pt. 2 Flashcards
What is business software?
It is any software or set of computer programs used by business users to perform various business functions. Used to increase productivity, measure productivity, to perform other business functions accurately.
XXX XXX involve complex pieces of software that are very expensive to purchase and implement. It might take a larger fortune 500 company several
years to complete a large scale implementation of an enterprise system.
XENTERPISE APPLICATIONSX involve complex pieces of software that are very expensive to purchase and implement. It might take a larger fortune 500 company several
years to complete a large scale implementation of an enterprise system.
Next Gen. Enterprise Applications are:
Enterprise solutions, enterprise suites or e-business suites to make their CRM, SCM and ERP (Enterprise Resource Planning) systems work closely with each other and link to systems of customers and suppliers (SAP Business Suite, Oracle E-Business Suite, Microsoft Dynamics Suite).
Advantage of using Social CRM tools:
Business can better engage with their customers. They enable a business to connect customer conversations and relationships from social networking sites to CRM processes.
Corporate systems:
People that have the most knowledge in IT; if your
corporate systems is hacked, then the entire system is going to be hacked. This one
needs to be secured the most
Corporate servers:
Where you put your applications.
XXX XXX may store information on weapons systems, intelligence
operations, and military targets. These information assets have tremendous value, and the repercussions can be devastating if they are lost, destroyed, or placed in the wrong hands.
XGOVERNMENT SYSTEMSX may store information on weapons systems, intelligence
operations, and military targets. These information assets have tremendous value, and the repercussions can be devastating if they are lost, destroyed, or placed in the wrong hands.
Inadequate security and control =>
Serious legal liability.
XXX XXX and control framework that protects business information assets can produce a high return on investment. Strong security
and control also increase employee productivity and lower operational
costs.
XA SOUND SECURITYX and control framework that protects business information assets can produce a high return on investment. Strong security
and control also increase employee productivity and lower operational
costs.
In a XXX XXX a firm is obligated to respond to a discovery request for access to information that may be used as evidence. Company is required by law to produce those data. If the data is not handed over correctly and completely, the court can impose sever XXX and XXX penalties.
In a XLEGAL ACTIONX a firm is obligated to respond to a discovery request for access to information that may be used as evidence. Company is required by law to produce those data. If the data is not handed over correctly and completely, the court can impose sever XFINANCIALX and XCRIMINALX penalties.
What does Computer Forensics entail?
It is the scientific collection, examination, authentication, preservation and analysis of data held on or retrieved from computer storage media in such a way that information can be used as evidence in a court of law.
What does Computer Forensics deal with?
- Recovering data
- Secure strong of recovery data
- Finding significant information
- Presenting information to a court of law
What is encryption?
The process of transforming plain text to data into chipper text it cannot be read by anyone other than the sender and the intended receiver.
Who is responsible for the security of data when working in the cloud?
For protection of sensitive data, the accountability and responsibility still resides
with the company owning that data.
What does identity management software do?
It automates the process of keeping track of all
these users and their system privileges, assigning each user a unique digital identity
for accessing each system.
It includes the following tools:
- Authenticating users
- protecting user identifies
- controlling access to system resources
What is authentication?
It refers to the ability to know that a person is who he or she
claims to be.
Authentication is established by using passwords, only known by the user.
- Password systems that are too rigorous hinder employee productivity.
- Passwords can also be sniffed if transmitted over a network or stolen through
social engineering.
What is a token?
A physical device, similar to an identification card, that is designed to prove the identity of a single user. Tokens are small gadgets that typically fit on key
rings and display passcodes that change frequently.