midterms sem 1a Flashcards

1
Q

moores law

A

size of transitor keeps getting smaller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

bells law

A

volume of computers keep getting smaller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

metcalfes law

A

platform becomes more valuable when more people are connected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

nielsens law

A

internet connection keeps getting faster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

kryders law

A

cost of data storage will reach zero

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

marketable skills

A

abstract reasoning, systems thinking, collaboration, ability to experiment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

abstract reasoning

A

construct a model or representation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

systems thinking

A

model system components and show how each component’s input and outputs relate to one another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

collaboration

A

develop plan and ideas together, provide and receive critical feedback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is MIS

A

achieving strategies, manage, use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ability to experiment

A

create and test promising new alternatives, consistent with available resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Business process

A

network of activities for accomplishing business functions e.g. marketing, accounting, sales. Make sure that IS is align with other hardwares to help the business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

start

A

circle with thin line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

end

A

circle with thick line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

rectangle

A

activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

rectangle with plus sign

A

subprocess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

jajargenjang

A

data repository

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

diamond

A

decision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

dotted arrow

A

data flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

arrow

A

control flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

subprocess

A

the activity is complicated enough that it can use another business process model to explain it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

process efficiency is shown by

A

less cost, same benefit or more benefit, same cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

process efficiency can be done by

A

reducing number of repository and adding more data flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

example of process efficiency

A

two repositories are more likely to create process inefficiency
while having a single repository is less costly, generates fewer errors, and is just as effective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

process effectiveness

A

able to accomplish the strategy or not, no methods can be used to tackle effectiveness in the model, we all assume that the process is going smooth but having problems in the speed of accomplishment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

5 IS components

A

computer side : hardware (actors), software (instructors), data (bridge)
human side : people (actors), procedure (instructors), data (bridge)
automation moves from the human side to the computer side

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

information is

A

data but presented in a meaningful content, a higher class than data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

quality information

A

based on who is using the information and their system thinking skill level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

5 characteristics of quality information

A
  1. accurate : humans are the no 1 source of incorrect data, have to know the circumstance of getting incorrect data
  2. timely : present data in time
  3. just barely sufficient : sufficient for the purpose, can’t use too much data, decide which data to ignore
  4. worth its cost : the data collected justifies the cost (cost to develop, maintain, and operate the data)
  5. relevant : relevant to the purpose of using the data and who is using the data (relevant to the context and subject of the data)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

ability to experiment

A

create and test new promising alternatives, efficient with available resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

porter’s 5 forces is to

A

determine the profitability of an industry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

porter’s 5 forces (industry structure)

A

competition forces : threat of new entries, degree of rivalry, threat of substitutes
forces related to supply chain bargaining power : bargaining power of suppliers, bargaining power of consumers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

how does organizational strategy determine information systems structure

A

industry structure determines competitive strategy, competitive strategy determines value chains, value chains determines business processes, business processes determines information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

other factors to consider while determining weak or strong 5 forces

A
  1. switching cost
  2. buyer-supplier ratio
  3. dependance
  4. substitute availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

porters 4 competitive strategy (competitive strategy)

A
  1. industry-wide
    a. cost : lowest price across the industry
    b. differentiation : best products/services
    across the industry
  2. focus
    a. cost : lowest price within an industry
    segment (a target customer)
    b. differentiation : best products/services
    within an industry
    segment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

value chain

A

network of value-creating primary and support activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

rumus total margin value chain

A

margin = value - cost
total margin = total margin primary + total margin support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

primary activities in value chain

A
  1. inbound logistics : receiving, storing, and disseminating inputs to the product
  2. operations / manufacturing : transforming inputs to the final product
  3. outbound logistics : collecting, storing, and distributing products to buyers
  4. sales and marketing : inducing buyers to purchase the products and providing a means for them to do so
  5. customer service : assisting customers’ use of the product, thus maintaining and enhancing the products’ value
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

support activities in value chain

A
  1. technology : research & development, new techniques, methods, and procedures
  2. procurement : raw materials
  3. human resources : training, recruitment, and compensation
  4. firm infrastructure : general management, finance, accounting, legal, and governement affairs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

how do value chains determine business processes and information systems?

A
  1. business processes implement value chains or a portion of a value chain
  2. each value chain is supported by 1 or more business processes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

how do information systems provide competitive advantages

A
  1. product implementations
    - create new product/services
    - enhance product/services
    - differentiate product/services
  2. process implementations
    - lock in customers/buyers
    - lock in suppliers –> supply chain management system
    - raise barriers to market entry
    - establish alliances
    - reduce cost
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

what do business professionals need to know about software?

A

categories :
- horizontal market application –> provide capabilities that are common across all organizations and industries (ex : microsoft excel, browser) –> off-the-shelf
- vertical market application –> serve the needs of a spesific industry (ex : canvas, atm system, airline booking system) –> off the shelf and then customized
- one-of-a-kind application –> developed for a spesific, unique need (ex : national military system) –> custom developed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

purpose of database

A

organize and keep track of different kind of datas, ex : customer data, sales data, HR data, accounting record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

what is a database

A

self-describing collection of integrated records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

other name for table

A

file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

other name for column

A

field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

other name for row

A

record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

components of a database

A

makes a database more meaningful ex : data of customer personal data linked with a data of sales transaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

database equation

A

tables or files + relationship between rows in tables + metadata (additional info about a data) = database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

primary key

A

a column or group of columns that uniquely identifies a row in a table (every table has to have a PK) –> every row has a different key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

foreign key

A

a primary key that appears in another table to create a relationship (not every table has a FK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

what is a database management system (DBMS)?

A

a program that is used to create, process, and administer a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

process of database

A

user –> database applications (forms, reports, queries, applications, programs) –> database management systems (create, process, administer database) –> database (tables, relationships, metadata) (usually these are sold in a package, customized, or tailor-made)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

4 dbms operations

A
  1. read –> read/extract student info
  2. insert –> add new student record
  3. modify –> change tutorial class
  4. delete data –> drop/withdraw a student
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

structured query language (SQL)

A

international standard to communicate with relational databases and used by most popular DBMS (ex : select SID, name, score from the test)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

why are database application programs needed?

A

they are double sided between the customer-side (browser and internet) and server-side (dbms and database) code (becomes the medium)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

the components of entity-relationship data model

A
  1. entity (table) –> something that users wants to track
  2. attribute (fields) –> describes the characteristic of an entity
  3. identifier (primary key) –> uniquely identifies one entity instance from another instance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

example of department, adviser, and student entities and relationships

A

1 : N –> 1 department can have many advisers, one adviser can only work for 1 department
N : M –> 1 adviser can advise many students, 1 student can have more than 1 adviser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

entity relationship diagram (arrows)

A

stripe –> mandatory
circle –> optional
stripe –> one
branch –> many

59
Q

how is data model transformed into database design

A
  1. normalization
    - transforming poorly-structured table into two or more well-structured tables
    - purpose : creating tables with data about a single theme/entity
    - goal : minimize data integrity problems
  2. data integrity problems
    - producing incorrect or inconsistent information, users lose confidence in the information, the system has a bad reputation
    - this can only occur if the data is duplicated
60
Q

key points of smart banking

A
  • connectivity
  • any time/where/device
  • self-service/customer-centered service
61
Q

benefits of self service instead of serving customers

A

time and cost benefit, the employees can do more important and harder tasks

62
Q

5 features of smart banking

A
  1. growth
  2. payments transformation
  3. compliance and risk management
  4. data management
  5. cybersecurity
63
Q

growth

A
  1. invest in customer analytics
  2. leveraging digital technologies to elevate the customer experience in both business and retail banking
  3. determining whether or not prudent underwriting standards are overlooked
  4. learning from non bank technological firms and establishing exclusive partnership to create innovative and competitive edge
64
Q

payments transformation

A

–> contactless payment, so banks may want to :
- seek innovative ways to leverage customer spending data for specialized promotions and services
- look for new ways to become top of the wallet and differentiate the customer experience

65
Q

compliance and risk management

A

–> meeting regulatory expectations will require management to extend its focus from improving spesific processes to fully integrating risk management, compliance and ethics. banks may want to :
- reinforce a strong “tone at the top”
- encourage the board to challenge senior management’s activities
- empower chief risk officers to pursue collaborations with business lines
- integrate risk management and compliance responsibilities into performance management programmes and employee training

66
Q

data management

A

–> institutions should shift to a proactive stance to ward off further regulatory pressure. banks should consider :
- creating a central regulatory management office to drive greater efficiencies
- relying on chief data officers to establish tigther connections with front office functions and derive greater value from data assets

67
Q

cybersecurity

A

–> banks will be forced to devote more reources into enhancing their security, vigilance, and resilience of their cybersecurity and should consider :
- adopting new methods, such as war gaming, attracting specialized talents, and increasing collaborations with other members
- beefing up their intelligence apparatus to detect new threats in a timely manner
- expanding the role of CISO to include clear and prompt communications with the board

68
Q

what is smart e-payment?

A

payment methods for online purchases –> credit card, direct debit from bank accounts (FPS), Stored Value Facilities (SVF) –> alipay, wechat pay, paypal, octopus
direct debit –> the purchase amount is debited directly from the bank account and no need to apply for credit (EPS), (PPS), (FPS)

69
Q

Business Inteligence (BI) refers to

A

the technologies, applications, and practices for the collection, integration, analysis, and presentation of business information

70
Q

how do organizations use BI systems

A

to support decision making by using BI and DDDSS (data-driven decision support system)
other than that :
- project management
- problem solving
- deciding
- informing

71
Q

business intelligence means

A
  • timely
  • accurate
  • high-value
  • actionable
72
Q

insights from internal or external data

A

acquire data from operational databases, purchased data, and social data to be analysed by business intelligence applications by reporting, data mining, and using big data, to be published by business intelligence to knowledge workers.

73
Q

BI capabilities should include

A
  • past
  • present
  • future
  • unknown (broad question)
74
Q

typical uses of BI

A
  1. identifying changes in purchase patterns –> major life events causes customers to change what they buy
  2. digging for gold (golden insights) –> ex : market basket analysis –> know what products customers are likely to buy together
  3. BI for entertainment –> amazon and netflix
  4. predictive policing
75
Q

how would BI help with smart banking?

A

data from different interactions, ex : transactions from branch, ATM, phone banking, e-banking, and fax

76
Q

big data consists of

A
  • volume scale of data
  • velocity analysis of streaming data
  • variety of different forms of data
  • veracity uncertainty of data
77
Q

how do organizations use data warehouses or data marts to acquire data

A

acquire data from operational databases, purchased data, and social data –> ETL (extract, transform, load) –> data warehouse DBMS –> either to data warehouse database or data warehouse metadata –> business intelligence tools –> business inteligence users

78
Q

ETL

A

extract –> information from internal and external data source
transform –> data using common sets of enterprise definition
load –> data/information into data warehouses

79
Q

data warehouse vs data mart

A
  1. holds multiple subject areas –> usually only holds one subject area
  2. holds very detailed information –> may only hold summarized data
  3. works on integrating all data sources –> concentrates on integrating information from a given subject area or set of source system
  4. does not nessecarily needs a dimensional model but feeds dimensional model –> is built focused on a dimensional model called star schema
  5. implement time is relatively long (months, years) –> implement time is moderate (months)
80
Q

common BI techniques

A
  • multidimensional analysis
  • cluster analysis
  • association detection
81
Q

multidimensional analysis

A

is a BI tool that can create a multidimensional view of a data :
- dimension –> attribute of data
- cube –> common term for a representation of multidimensional information (cube of information can slice & dice)

online analytical processing (OLAP) is a reporting technology that can perform multidimensional analysis

82
Q

cluster analysis

A

–> technique that divides an information set to mutually exclusive groups such as :
- intra-cluster are data that are close to one another
- inter-cluster are data that are far away from one another

we can analyze data’s proximity to find out potential groups/clusters

83
Q

association detection

A
  • reveals the relationships between variables and the nature and frequency of the relationships
  • determines the likelihood of events occuring together at a particular time
  • market basket analysis –> analyze items such as the cashier scanner to gather the customer’s buying behavior and predict future behaviors –> cross selling
84
Q

Project Management Professional (PMP)

A
  • industry-recognized certificate for project managers
  • 4-year degree + 3 or more years of project management experience + exam
  • recognized certificate issued by PMI
85
Q

project management qualifications

A
  • project management professional (PMP)
  • project management qualification
  • domain knowledge
86
Q

domain knowledge

A
  • initiating the project
  • planning the project
  • executing the project
  • monitoring and controlling the project
  • closing the project
87
Q

initiating the project

A
  • perform project assesment
  • meeting with sponsors (internal/external)
  • conduct risk and benefits analysis
  • obtain project charter
88
Q

planning the project

A
  • asses and review detailed project requirements, constraints, and assumptions
  • define scope
  • develop a budget plan, project schedule, and HR management plan
89
Q

executing the project

A
  • acquiring resources outlined in the planning phase
  • executing tasks defined by your company or others
  • implement approved changes (ex : training, knowledge sharing, and meeting)
90
Q

monitoring and controlling the project

A
  • measure project performance
  • ensure project deliverables conform to quality standards
91
Q

closing the project

A
  • obtain final acceptance
  • transfer ownership
  • obtain financial, legal, and admin closure
92
Q

5 phases of SDLC

A

system development life cycle
business planning process –> system need
1. system definition –> project plan
2. requirements analysis –> approved user requirement
3. component design –> system design
4. implementation –> system
users –> problem or need for change
5. system maintenance –> system definition

93
Q

change management

A

vital component of IS development and implementation projects to increase the chance of success of a project

94
Q

when managing change, special attention should be paid to

A
  • resistance to change
  • organizational culture
  • project participants (or stakeholders)
95
Q

vision and goals for change

A
  • set and agree on objectives : setting and manage objectives so that they are linked with the vision and purpose of change
  • devise plans : planning details and required resources
  • implement and monitor : impementing the plan with continuous monitoring
  • review : possible adjusment to the plan or modifications of actions to ensure the achievement of the objectives
96
Q

why is system development difficult and risky?

A
  • most projects are never finished and are 200-300 % over the budget
  • some projects finish within the budget and schedule but don’t accomplish goals
97
Q

major challenges of system development

A
  1. difficulty of requirement determination
    - requirements analysis in SDLC
    - what does the system do? how?
    - business analysts/project managers uses diagrams to illustrate key features of the new systems and supplements with detailed spesifications
  2. changing requirement
    - they determine what changes can still be made within the resources constraint
  3. scheduling and budgeting difficulties
    - they calculate all of this and report the ROI (return on investment) to management
  4. changing technology
    - they carry out the impact analysis and determine if the new tech should be incorporated
  5. diseconomies of scale
    - they plan carefully the team sizes and timelines
98
Q

what is social media information systems (SMIS)

A
  • the use of IS to support sharing content with a network of users
  • enables communities, tribes, or hives
  • people related by a common interest
99
Q

3 roles of SMIS

A
  • social media providers : instagram, facebook, twitter
  • users : individuals/organizations
  • communities : share a mutual interest, forums
100
Q

SMIS costs

A

to develop, implement, and manage social networking procedures and direct labor cost

101
Q

social media is by

A

nature and dynamic –> unstructured business process –> unstructured value chains

102
Q

social media &

A

sales and marketing activity, inbound and outbound logistics, operations and manufacturing, human resources, customer service

103
Q

social media & sales and marketing activity

A
  • social customer relationship management (CRM)
  • each customer actively crafts a relationship, no longer in a passive position

downside :
- loss of credibility
- poor PR

104
Q

social media & customer service

A
  • product users’ are amazingly willing to help each other solve problems, with or without pay

downside :
- the risk of loss of control –> customers may recommend competitor’s products in the focal business’ support forum

105
Q

social media & inbound and outbound logistics

A
  • numerous solution ideas and rapid evaluation of logistics –> different solutions for complex supply chain problems

downsides :
- loss of privacy –> open discussion about problem definitions, causes, and solution constraints, and problem solving in front of competitors

106
Q

social media & operations and manufacturing

A
  • externally with customers (product design and redesign, create brand awareness in business to customer (B2C))
  • internally within the organization (ex : enterpirse social networking service)
107
Q

crowdsourcing

A

obtaining information from a large group of people via the internet

108
Q

social media & human resources

A
  • finding employee prospoects, recruiting candidates, and candidates evaluation
  • internal communication
  • ex : Yamer, myprofile, mysite in sharepoint

downsides :
- making erroneous conclusions about potential employees
- becoming a defender of belief or pushing unpopular management messages

109
Q

social network is a combination of

A
  • social network size
  • relationship strength
  • resources possesed by those in the network
110
Q

value of social capital

A
  1. information –> opportunities, alternatives, problems, and other factors important personally and profesionally
  2. influence –> influence decision-makers that are important to our success
  3. social credibility –> linked to a network with highly-regarded contacts
  4. reinforcement –> connections reinforce identity, status, and image in organization/company
111
Q

social networks can be used to

A
  • increase the strength of relationships
  • connect with those that has more resources
112
Q

how to strengthen relationships

A

through increasing and frequent interactions

113
Q

revenue models for social media

A
  1. advertising
    - pay per click
    - use increases value (more people use the website –> the website becomes more valuable –> more people visits the website –> more ads
  2. freemium –> the platform has a reguler feature, but has a premium version that lets the customer pay for it
  3. sales –> affiliate commissions, donations, apps and virtual goods
114
Q

how does organizations develop an effective SMIS

A
  1. create relationships that the organization, employee, partners, and customers perceive and gain value
  2. transform interactions that are organization-centric to mutually satisfying humane, community relationship
  3. premeditated alignment of SMIS to the organization’s chosen strategy
115
Q

social media strategic goals

A
  1. increased brand awareness –> the brand is recognized in social media
  2. increased conversion rate –> increase the frequency of a user doing a desired act
  3. increased web traffic –> increase the quantity, frequency, duration and depth of visits in the website
  4. increased user engagement –> increase the extent to which a customer interacts in a website
116
Q

vanity metrics

A

–> the goal is to increase user engagement (only seeing the number of followers) –> cannot reflect the performance of user engagement

117
Q

ESN

A

Enterprise Social Network –> specialized enterprise social software that is designed to be employed inside an organization

118
Q

goal of ESN is to improve

A
  • collaboration
  • communication
  • problem solving
  • knowledge sharing
  • decision making
119
Q

what is digital marketing

A
  • search marketing
  • seo (search engine optimization)
  • youtube
  • forum
  • mobile ad
  • social media ad
120
Q

digital marketing vs traditional media

A
  • more measurable
  • more adjustable/dynamic
  • higher chance to convert (from potential customer to actual customer)
  • cheaper
121
Q

digital marketing consists of

A
  • social media ads : retargeting –> drive customers back to your website
  • search engine marketing :
    1. unpaid –> search engine optimization (SEO)
    2. paid –> pay per click
  • customer analytics : tracking, monitoring, and measuring customer’s behaviour (how much time they spent on the website and where they come from)
  • qualifications : ex : google workshop
122
Q

IT/IS auditing are not

A
  • accounting control/ financial auditing
  • out of scope
  • compliance testing
123
Q

corporate governance

A

a collection of mechanisms and processes to control and operate a firm

124
Q

challenges to corporate governance

A
  • BYOD (bring your own device) –> allows employees to bring their own device (risk : hard to manage the environment/platform used (virus/hack and illegal website)
  • data proliferation (data explosion)
  • privacy
125
Q

COBIT

A

Control objectives of information and related technologies : reference framework for professionals to manage the risks related to information systems (designed by ISACA (information systems audit and control association)

126
Q

how to be an IS auditor

A
  • passed the CISA (certified information systems auditor) exam
  • 5 years of work experience in the fields of IS auditing, control, assurance, or security
  • a working experience waiver is available
127
Q

how to maintain CISA certification

A
  • continuing professional education (CPE)
  • annual maintenance fee
  • random selection of annual CPE audit
128
Q

goal of information systems security

A

cost (safeguard) vs risk (loss)

129
Q

elements of threat/loss

A
  1. threat –> when an individual/organization wants to obtain/alter data/IS assets illegaly
  2. vulnerability –> opportunity for threats to gain access to individual/organization assets
  3. safeguard –> a measure taken by individual/ogranizations to block the threats from obtaining assets
  4. target –> asset desired by threats
130
Q

sources of threats

A
  • human error
  • computer crime
  • natural events/disaster
131
Q

types of security loss

A
  • unauthorized data disclosure (threats obtain data that is supposed to be protected)
  • incorrect data modification (hacking/typo)
  • faulty service (they replace the applications with their own to spy)
  • denial on service (blocking people from using the application)
  • distributed denial on service attack (blocking multiple sources from using the application so it cannot be saved from a single source)
132
Q

technical safeguard

A
  • identification and autenthication
  • encryption
  • firewall
  • malware protection
133
Q

identification & authentication

A

username & password

134
Q

encryption

A

process of transforming clear text into coded unintelligible text for secure storage and communication (use key to lock or unlock message)

assymetric and symmetric key
- symmetric –> same key for incrypting and decrypting message
- assymetric –> public key for locking, private key for unlocking

135
Q

firewall types

A
  • internal firewall –> sits inside an organizations network
  • peremeter firewall –> sits outside an organizations network
  • firewall –> a computing device that prevents unauthorized network access
136
Q

malware protection

A
  • viruses : computer programmes that can replicate themselves to corrupt computer systems and destroy data
  • spyware : resides in the background and monitor user activity, then reports to the corresponding organization
  • adware : mostly harmless but produce popup ads
137
Q

business continuity planning

A
  1. enables businesses to continue offering critical services
  2. to survive disastrous interruptions
  3. rigorous planning and commitment to resources
138
Q

when there is a sudden disastrous interuption, an IS auditor should (after)

A
  1. identify which critical services they should continue to offer after interruption
  2. help planning resources and procedures to recover client’s business in the shortest time possible
139
Q

disasters or other disruptive events

A
  1. natural disasters
  2. others –> electricity outage, hacker attack, etc
140
Q

data center cite selection

A

place far away from natural disasters, etc

141
Q

IS auditor’s tasks before sudden interruptions

A
  • reviewing BCP, BC teams
  • evaluating prior test results and offsite storage
  • interviewing key personnel
  • evaluating security at an offsite facility
  • reviewing alternative processing contracts and insurance coverage
142
Q

technology related issues because of not following information ethics

A
  • copyright
  • fair use doctrine
  • pirated software
  • conterfeit software
143
Q

what can be done to reduce technology related issues

A
  • government should implement and enforce laws related to information ethics
  • the office of the privacy commisioner for personal data (PCPD) aims to secure the privacy of an individual through promotion, monitoring and supervision of compliance with the personal data ordinance
144
Q
A