The Role Of IT In Business Flashcards
What three types of hardware are there that go into a IT infrastructure?
Computer hardware
External hardware deceives
Infrastructure housing
Physical components of computers and computer-related accessories are referred to as:
Computer hardware
Items such as mice, keyboards, speakers, microphones, disk drives, monitors, etc. that do not need to be physically inside a machine but can still connect to it are examples of what?
External hardware devices
Facilities and the safeguards on the facilities that contain hardware such as data centers or offices are part of what IT infrastructure? This could be a security system that monitors control access or ventilation and climate control to keep equipment regulated.
Infrastructure housing
What are 6 networking devices that go into the IT infrastructure that enable connectivity and communication between computer devices on a computer network by transmitting information between devices?
Modem Routers Switches Gateway Servers Firewalls
Connects an organizations network to the internet
Modem
Manages network traffic by connecting devices to form a network
Router
Similar to routers in that they connect and divide devices within a computer network; however, they do not perform as many advanced functions as a router
Switches
A computer or device that acts as an intermediary between different networks. It transforms data from one protocol into another os that information can flow between networks
Gateway
Physical or virtual machines that coordinate the computers, programs, and data that are part of the network.
Servers
Various types: web servers, file servers, print servers, and database servers
Software applications or hardware devices that protect a company’s network traffic by filtering it through security protocols with predefined rules
Firewall
Types of firewalls include:
Circuit level gateways Application level gateways Stateful multilayer inspection firewalls Next generation firewalls Network address translation firewalls
A firewall that controls traffic solely based on the source of origin, the intended destination, the port, and potentially some other very basic information. It does not filter based on the actual content:
Circuit level gateways
A firewall that do the same thing as circuit level gateways, but they also filter by content of the packet. These are more expensive and burdensome due to the amount for processing required.
Application-level gateway (proxy firewalls)
A firewall that combines the circuit level and application level gateways, and also ensures that packets are validated at multiple levels of the communication process
Stateful multilayer inspection firewalls
A firewall that observe packets at multiple levels of the communication process and also apply more scrutiny to packets using more sophisticated techniques such as intrusion detection, user identification, etc.
Next-generation firewall
A firewall that converts a group of private IP addresses into a single public IP address prior to communicating with other devices outside of a company’s network (protects the private IP address)
Network address translation firewall (NAT firewall)
Software that is embedded in hardware that instructs the hardware how to operate
Firmware
Group of computers and other machines that are interconnected technology using a series of network devices
Network
Common types of Networks used in Software are:
Local area networks (LAN) Wide are networks (WAN) Software defined wide area networks (SD-WAN) Edge enabled devices Virtual private networks (VPN)
Provides network access to a limited geographical area and data is transported over private lines:
Local area networks (LAN)
Provides network access to a larger geographical area and connects LANs together
Wide area network (WAN)
Support an organization at “the edge” or perimeter of a systems network
Edge enabled devices
Encrypted private networks that run on a public network
Virtual private networks (VPN)
Provide users predefined reports that support effective business decisions
Management information systems
A management information system that collects, records, and stores accounting information and compiles it using rules to report financial and nonfinancial data. Also creates an audit trail for accounting transactions:
Accounting information systems
Three main subsystems of accounting information system:
Transaction processing systems (TPS)
Financial reporting system (FRS) or general ledger system (GLS)
Management reporting system (MRS)
Converts economic events into financial transactions
Transaction processing systems (TPS)
Aggregates daily financial information from the TPS and other sources to enable timely financial reporting
Financial reporting system (FRS) or general ledger system (GLS)
Provides internal information to solve day-to-day business problems
Management reporting system (MRS)
Provides interactive tools to support day-to-day decision making as well as information or facilitate in the preparation of forecasts
Decision support system (DSS)
Provides senior executives to immediate and easy access to internal and external information to assist in strategic long-term decision making. It presents data in high-level reports and visualizations.
Executive information system (EIS)
Software that enables organizations to monitor and manage interactions between the organization and its past, current, and potential customers.
Customer relationship management system (CRM)
Software package that assists with tracking, procurement, and distribution of inventory items. Usually connected to a point of sale system (POS)
Inventory management system
Any other sort of system that helps to make the business smarter is considered a :
Knowledgement management system (KMS)
Unifies the business processes throughout the supply chain (purchasing materials through product delivery) concerned with the quantity of item, the customer its going to, and how it will get there. Goal is to achieve flexibility and responsiveness in achieving customer demands.
Supply chain management (SCM)
Cross-functional systems that integrate information across departments such as accounting, customer service, human resources, etc. It facilitates real-time communication between systems and operates under a centralized database and user interface.
Enterprise resource planning (ERP)
Designed to help executives to make useful decisions by analyzing high-level business strategies and translating them into actionable plans
Enterprise performance management (EPM)
Facilitates the sale of goods and services using the internet
E-commerce
5 types of E-Commerce:
Business to business Business to consumer Consumer to business Consumer to consumer Government e-commerce
A type of IT Outsourcing that rents storage space, and/or processing power, and/or proprietary software, or a combination of those three, on remote servers from another company rather than buying or building those components. Benefits exist when a company’s data is in one virtual location even if a company operates in many locations
Cloud computing
Outsources and of its servers, storage, hardware, networking services, and networking components to a third party provider an is bailed on a per-use basis.
Infrastructure as a service (IaaS)
Rent to tools or solutions remotely that are used to fulfill a specific business purpose such as paying an online platform to sell merchandise
Platform as a Service (PaaS)
A company delivers and hosts subscription-based software services to customers through licensing or service delivery
Software as a service (SaaS)
Provides assurance that the service organization’s controls are designed and operating effectively so that the financial statements are not negatively impacted.
SOC 1 Report
Difference between SOC 1 Type 1 report and the SOC 1 Type 2 report:
Type 1: concerned with a specified date
Type 2: concerned with a specified period and confirms it operating effectiveness
Used for users who need attestation concerning controls as they relate to security, processing integrity, availability, and privacy
SOC 2 Report
For users who need attestation concerning controls as they relate to security, processing integrity, availability, and privacy but for a company that does not have a high level of expertise to read the SOC 2 report.
SOC 3 Report