W9 Business Intelligence and Business analytics Flashcards

1
Q

Explain what is
 Ethic and
 the components of ethics

A
The principles of right and wrong
Based on 
	Their behaviour 
	Morals
Components: 
	Responsibilities: accepting consequence
	Accountability, 
	Liability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain what is
 Responsible Computing/ Ethical Dilemmas and
 what is the manager’s role

A

Using unethical IS strategy to attain a competitive advantage.
STEPS
1) assess ethical view
2) overrides business view with ethical view
3) implement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Discuss the difference between Ethics and law

A
Ethics: Principle of right versus wrong
Based on 
	Their behaviour 
	Morals
Law: Rules set by court/ legislature 
Based on laws
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain the different ethical views

A

Utilitarian approach: > Good or < Harm
Right Approach: >Protect rights/morals
Fairness Approach: treat all humans equal
Common good approach: respect and compassion for all others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Identify all the different steps in the Ethical decision framework

A

1) Recognise an ethical issue
2) Get the facts
3) Evaluate alternative actions
4) Make a Decisions and Test It
5) Act and Reflect on the Outcome of Decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define what is
 privacy and
 information privacy

A
Privacy: 
	right to be alone, 
	individual control their privacy
Definition of information privacy: 
	Right to collect and 
	To what extent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Identify and define the 4 different ethical issues

A

Privacy Issue: collecting, storing and analysing of individuals
 Choice (desired level),
 Consent,
 Control (over settings)
Accuracy Issue:
 Accuracy,
 Deal with inaccuracy
Property Issue: Ownership of information
 how data is collected, stored, used, shared
Accessibility Issue: Who has access to the information and how much
 Access, protection,
 avoid harm who attain data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identify different privacy issues and related issue with
 Electronic Surveillance and
 Web2.0 and privacy

A

Electronic surveillance.
 Data->Advantage
Web 2.0 and privacy:
 misuse of information to harm others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Privacy policies and codes

A
Guidelines to protect privacy of others
Data collection: 
	Legitimate purpose, 
	not in excess, 
	consent 
Data Accuracy: 
	verified, current, 
	disagreement = disclose
Data confidentiality: 
	no authorised, 
	no 3rd party, 
	data is maintained
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain what is the manager role when dealing with privacy issues

A
Implement controls highlighted be PAPA
Implement best practices
	Culture of moral responsibility
	Process Governance (identify security risk)
	Avoid decoupling 
Deter thieves
Respect customer privacy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define what is
 IS security and
 IS security management

A

IS Security: risk of crime activity, hazards, damage/loss
IS Security Management: Process and policies
 Identifying the threats: The different dangers
 Identifying the exposure: the damage done
 Identifying the vulnerability: % of harm from a threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identify the 5 Trending factor result in increasing vulnerability

A

Interconnected business environment
Accessible computing (computer now are easy to steal)
Ease of hacking: hack can be downloaded
International crime: Cybercrime
Lack of management support: Employees are not following security procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Identify different
 external and
 internal threats

A

External:
 Internet attacks,
 natural/
 man made disasters
Internal:
 Employees (misuse of power/info, duplication, human error)
 System/software (failure, info leak, unauthorised software)
 Hardware: Unauthorised access, software/physical attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identify different Intentional attacks

A
PHYSICAL THEFT or ATTACK
	Espionage or trespass, Identify Theft
	Theft of equipment or information
	Information extortion
SOFTWARE
	Software attack malicious software, 
	Alien software (adware, spyware, spamware, cookies and track cookies)
	Cyberterrorism and cyber warfare
OTHER
	Sabotage or vandalism, 
	Supervisory Control and Data Acquisition Attacks (SCADA)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Identify
 different unintentional attacks and
 different threats

A
Human errors: Laziness
THREATS: 
	Senior, 
	HR, 
	IS
Social engineering: Tricking
	THREATS: 
	Impersonations, 
	tailgating, 
	shoulder surfing
lack of security controls: Lack of updates
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain what is
 risk management and
Discuss why we make trade off

A

ensuring the IS security is cost – effective
1) Assess the value of the assets
2) Estimate the % of compromise
3) Does Cost of Protecting < Value of the asset
It is difficult to create a prefect security
 Too many locations
 security is inconvenient
 prevention is expensive
 Security is difficult to justify using cost-benefit

17
Q

Explain the different risk migration strategies

A

Risk acceptance: No control, absorb loss
Risk Limitation: Control, minimise loss
Risk transference: No control, insurance

18
Q

Explain what is a
 physical control and
 provide examples

A

Purpose: Preventing unauthorised access from physical access
 Walls, gates, guards
 Limiting the number of computers available
 Limiting the number of allowed attempts

19
Q

Explain what is a
 Access control and
 provide examples

A

Purpose: Prevent unauthorised individual from using information resources
 Authentication: identity the person with access
Biometrics, ID, tokens, voice recognitions, passwords
 Authorisation: Privilege/ access level of an employee
Determine what action are allowed

20
Q

Explain what is a
 Communication control and
 provide examples

A

Securing the movement of data across networks
SOFTWARE PROTECTION
 Firewall: Protect against untrusted networks
 Anti-malware/anti- virus:
MONITORING
 Whitelisting and blacklisting
 Employee monitor systems: scrutinise employee use of a computers
ENCRYPTION
 Encryption: Prevent ear dropping
 Virtual Private Network: Flexibility and Encryption
 Transport layer security: Encryption (HTTPS)

21
Q

Identify what is involved in
 Business continuity plan
 Information system auditing

A

Business continuity plan: Having a disaster recovery plan
Information system auditing: Ensuring the IS function properly
 Working as expected
 Effectiveness of IS
 Security: Consider potential risk and controls
Performed by internal and reviewed by external

22
Q

Identify Question asked in regards to privacy issues with Personal Information in databases

A
DATA INTEGRITY - COLLECTED
	Are the record accurate?
	Can the record be changed?
	How long to make a change?
DATABASE WAREHOUSE - STORED
	Where are the records located?
	How secure is the data?
BUSINESS - USED
	How is the data used?
	Is the data sold or give?
OTHER - SHARED?
	How to release the personal records?