DOC PREVIEW
IUB BUS-K 201 - K201 lecture

This preview shows page 1-2-3-4 out of 12 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 12 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

K201 lecture Which component is the most difficult to change in an information system?PEOPLEWhat does Wal-Mart's ability to offer items at a lower price than other stores do to the buyer power of customers?DECREASES BUYER POWERSome online stores make personal recommendations of products based on previous purchases. What kind of IS does thaT?CUSTOMER RELATIONSHIP MANAGEMENTThe process of designing or changing a business to take advantage of new information systems is called:BUSINESS PROCESS REENGINEERINGWhat is the big deal with "information silos"?Data warehouses - obtain information, clean data, and store it in a data warehouse database people in charge of data info don't want people to process informational data because it could have consequences on data.Problems with Operational DataDirty DataMissing ValuesInconsistent DataData not integrated - when trying to combine data from two or more dif. systemsWrong Granularity - level of detail presented by the data. not enough or too muchToo Much DataDatamart - subset of data warehouse, addresses a function of a data warehouseCHAPTER 10managing business processesfour stages in BPM (Business Processing Modeling) cyclemodel processescreate components - hardware, software, data systems and peopleimplement processesassess resultsIn theory:Better to start with business processesMore likely to result in processes and systems that are aligned with the organization's strategy and directionOrganizations take both approaches thoughOntheshelf software starts with business processes and select application that works bestKeys for Successful PRocess and Systems Development ProjectsCreate a work-breakdown structurebreak into smaller tasks until each task is small enough to estimate Adjust plans via trade off - balancing scope cost and timeA data mart is smaller than a data warehouse so it addresses the needs of a particular department or functional area of a businessWEEK FIVEComputer Hardware Inputs, (Keyboard, everything that gets data into the computer) Outputs (printer, etc, everything that displays things), Storage (disks and drives) and Process (CPU, main memory - RAM [random Acess Memory - memory you lose when you turn off computer or when power goes out])Computer Data:CPU is main actor in how computer words.computer transfers info from disk to main memory. a copy of instruction is moved from there to CPU. the CPU has a small memory called cache and the instructions are storedthere. having a large cache makes the computer faster, but more expensive. CPU loads things into memory by chunks because it can't all fit in the memory of the computer.Difference between a Clients Computers and Servers ComputersClient - programs that control client computer's resources and they have software that lets them connect ot a network - private network or use public networkServer - email, websites, large and shared databases, it must be fast with many CPUS lots of main memories Many servers are organized into a server farm and have mirror servers that work if one breaks. they start working as if nothing has happenedComputer SoftwareOperating SystemsSoftware ownership and licensing - you don't buy the system, you buy the right to use it and the company licenses it to youVirtualization - where one computer hosts the appearance of many computer - virtual machine opperates as if it has control over other sources. Types of Software AppsSources of System Costs[chart]Goal: Pick things that satisfy requirements at minimun costsBusiness Manager's Role in Hardware and Software Specifications[chart]cComputer Networks - collection of computers that communicate with one another over wireless or not wireless waysType:Local Area networkWide area networkThe InternetModem [this is all chapter 6]Transmission speeds are measured in megabytes or gigabytes for second [ when talkingabout networking] Application Layer ProtocolsHyper Text Transport Protocol (http)HTTPS - secure HTTP data transmissionSimple Mail Transfer Protocol (SMTP)File Transfer ProtocolTCP and IP ProtocolsTCP - trasmission Control protocolmost importantbreaks traffic up into packets and sends each one along its wayIP (internet protocol)addressing:Public IP addressesIdentify a particular device on public internetmust be unique worldwidePrive IP addressesIDentify a particular device on a private networkbenefits:all device on LAN share a public IP addressyou also don't need to register a public IP address on your computer with ICCAN- approved agencies.URL - uniform resource locator - address on the internet. consists of a protocol (http:// etc.) followed by a domain name (indiana.edu etc.) or a public address.Cloud ComputingCloud and ElasticCloud - elastic leasing of pooled computer resources over the internetElastic - check slide3 Fundamental cloud typesSaaS (software as a service)Paas (Platform as a service)Iaas (Infrastructure as a Service) - most basicWEEK SIX SUMMARYInformation Systems SecurityThreat - person or business that tries to get info illegally without owners permission or knowledgeVulnerability - opportunity for threat to gain access to the information Safe guard - mesher that organizations take to block the threat from achieving their goalTarget - asset that is desired by the threat.Security Threats and LossHuman Error, Computer Crime, Natural Disasters are threatsLoss Typescommon threats pretexting - trspoofing - pretending to be someone elsephishing - link to a site in an email that can infect your computerIncorrect data modificationprocedures not followed or incorrectly designedIncreasing a customer's dicountFault Serviceincorrect data modificationsystems wrong wrongprocedurl mistakesprogamming errorsIT installation errorsDENIAL OF SERVICEsystem overload, intentional - where people can shut down a server by starting an applicationhappens when a hacker floods a website with bogus service requestsLOSS of ingrastructurehuman accidentstheft and terrorist evensnatural disasters etcthreats can be stopped or reducedsafeguards are expensive and reduce work efficiency GOAL of info systems security: find trade-off between risk of loss and cost of safeguardscreat strong passwordsuse many pesswords etcElements of a policycheck screen shotRIsk assessmenttangible consequencesintangible "likelihood - probably that threat will hit assettprobable lossrisk management decisionsgive probably loss, what to protext?which safeguards are inexpensive and easy?which bulnerabilities are expensive to eliminate?how to


View Full Document

IUB BUS-K 201 - K201 lecture

Download K201 lecture
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view K201 lecture and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view K201 lecture 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?