Access control list (acl)
a list that encodes the rules stating which packets are to be allowed through a firewall and which are to be prohibited
devices typically special purpose computers that connect network sites. the particular device depends on the line used and other factors.
a point in a wireless network that facilitates communication among wireless devices and serves as a point of interconnection between wireless and wired networks.
a wavy signal. a modem converts the computer's digital into analog signals that can be transmitted over dial-up Internet connections.
asymmetrical digital subscriber line (adsl)
dsl lines that have different upload and download speeds
an encryption method whereby different keys are used to encode and to decode the message.
asynchronous transfer mode (atm)
a protocol that divides data into uniformly sized cells, eliminates the need for protocol conversion and can process speeds 1 to 156 mbps. can support both voice and data communication
Internet communication lines that have speeds in excess 256 kbps. dsl and cable modems have access
type modem that provides high-speed data transmission using cable television lines. always on
a modem that performs the conversion between analog and digital in such a way that the signal can be carried on a regular telephone line
dsl (digital subscriber line) modem
uses voice telephone lines with a dsl modem; it operates so that the signals do not interfere with voice telephone service. faster that dial up
proces of transforming clear text into coded unintelligible text for secure storage or communication
algorithms used to transform clear text into coded, unintelligible text for secure storage or communication. common used are DES, 3DES, AES
another name or the IEEE-802.3 protocol, ethernet is a network protocol that operates at Layers 1 and 2 of the TCP/IP-OSI architecture.
a computing device located between a firm's internal and external networks that prevents unauthorized access to or from the internal network.
a protocol that can process traffic in the range of 56kbps to 40 mbps by packaging data into frames
Internet service provider (ISP)
an isp provides users with Internet access. gives them an address, gateway, passes communication, collect money on your behalf
column or group of columns that identifies a unique row in a table. a number used to encrypt data
last mile problem
difficulty in getting the capacity of fast optical-fiber transmission lines from the street in front of buildings into the homes and small biz around
also called physical address. a permanent address given to each network interface card (NIC) at the factory
converts the computer's digital data into signals that can be transmitted over telephone or cable lines
internet communication lines that have transmission speeds of 56kbps or less. a dial up modem provides narrowband access
network interface card (NIC)
hardware component on each device in a network that connects the device's circuitry to the communications line
network of leased lines
a WAN connection alternative. communication lines are leased from telecommunication companies and connected into a network.
optical fiber cable
type cable usend to connect computer, printers, switches, and other devices on a LAN. core surrounded by cladding. light signal reflected in glass core
a firewall that examines each packet and determine whether to let the packet pass.
firewall that sits outside the organizational network. first device the Internet traffic encounters
public switched data network (PSDN)
a WAN connection alternative. network of comps and leased lines developed and maintained by vendor that leases time on the network to other orgs.
programs installed on user's computer without user knowledge or permission. watches activity and produces pop-up ads
the process whereby an information system approves a user by checking the user's password
remote processing center that provides office space, but no computer equipment, for use by a company that needs to continue operations after a natural disaster
staff function that pertains to all of an organization's dat assets. set data standards, develop policy, provide for data security
management, development, operation, and maintenance, of the database so as to achieve the org's objectives.
steps taken to protect databases and other organizational data by means of data administration and database administration
denial of service (DOS)
security problem in which users are not able to access an IS; can be caused by human errors, natural disasters, or malicious activity
people who take computers with wireless connections through an are and search for unprotected wireless networks in an attempt to gain free INternet access or to gather unauthorized data.
synonym for phishing, a technique for obtaining unauthorized data that uses pretexting via email.
a remote processing center, run by a commercial disaster-recovery service, that provides equipment a company would need to continue operations after a natural disaster.
steps taken to protect against security threats by establishing appropriate procedure for users to folow for system use
process whereby an information system identifies a user by requiring the user to sign on with a username and password
type of spoofing whereby an intruder uses another site's IP address as if it were that other site
control procedure whereby a trusted party is given a copy of a key used to encrypt database data
personal identification numbers (PIN)
form of authentication whereby a user supplies a number that only he knows
a technique for gathering unauthorized information in which someone pretends to be someone else.
a problem with the security of an information system or the data therein caused by human error, malicious activity or natural activities
technique for exchanging messages encoded in XML. SOAP sits on top of any available transport protocol as HTTP, HTTPS, or FTP
benign program installed on computer without user knowledge and keeps track of actions, keystrokes etc.,
safeguards that involve the hardware and software components of an information system
occurs when unauthorized programs invade a computer system and replace legitimate programs.
a web 2.0 advertising product from google. vendors agree to pay a certain amount to google for use of particular search words which link to the vendor's site
web 2.0 product from google that searches an org's we site and inserts ads that match content on that site; when users click those ads google pays the org a fee
apps that match buyers and sellers by using e-commerce version of a standard, competitive-bidding auction process
a program that processes HTTP protocol; receives, displays, and processes HTML documents and transmits responses
in e-commerce a conflict that may result between a manufacturer that wants to sell products directly to consumers and the retailers in the existing sales channels
entity that provides goods and services at a stated price, prices and arranges for the delivery of the goods, but never takes title of the goods
computer that operates web-based programs that display products. support online ordering, record and process payments and interface with inventory-management applications
process by which orgs use web 2.0 technologies such as user-generated content to involve their users in the design and marketing of their products
in the three tier architecture the tier that runs the DBMS and receives and processes SQL requests to retrieve and store data
in e-commerce companies that take title to the goods they sell. they buy goods and resell them
e-commerce companies that arrange for the purchase and sale of goods without ever owning or taking title to those goods
in e-commerce a conflict that may result when manufacturers offer products at prices lower than those available through existing sales channels
in the three tier architecture the tier that consists of computers tha run web servers to generate web pages and other data in response to requests from browsers.
software as a service (SAAS)
business model whereby companies provide services based on their software, rather than providing software as a product. software as a service is example of web 2.0
in markup language such as HTML and XML, notation used to define data element for display or other purposes
tier in three tier architecture that consists of computers that have browsers that request and process web pages
documents encoded in HTML that are created, transmitted, and consumed during the world wide web
loose cloud of capabilities, technologies, business models, and philosophies that characterize the new and emerging business uses of the Internet.
component design phase
third phase in sdlc in which developers determine hardware and software specifications, design the database, design procedures, and create job descriptions for users and operations personnel
fourth phase in the sdlc in which developers build and integrate system component, test the system, and convert to the new system
fifth/final phase of sdlc which developers record requests for changes, and fix failures by means patches, service packs, and new releases.
type of system conversion in which the new system runs in parallel with the old one for a while. expensive
group of fixes for high-priorit failures that can be applied to existing copies of a particular product.
type of system conversion in which the new system is installed in pieces across the organization
type of system conversion in which the organization implements the entire system on a limited portion of the business
(direct installation) system conversion in which the organization shuts off the old system and starts the new system
requirements analysis phase
second phase in the sdlc in which developers conduct user interviews, evaluate existing systems, determine new forms/reports/queries, identify new features and functions, including security, and create and data model
system definition phase
first phase of the sdlc in which developers with the help of eventual users, define new system's goals and scope, assess its feasibility, form a project team and plan the project
systems analysis and design
process of creating and maintaining information systems (systems development)
process of creating and maintaining informtaion systems (systems analysis and design)
fiction that one phase of sdlc can be completed in its entirety and the project can progress without any backtracking to the next phase of sdlc
type of ethernet that conforms to the IEEE 802.3 protocol and allows for transmission at rate of 10, 100, 1000 mbps
transport layer security (tls)
protocol using both asymmetric and symmetric encryption that works between levels 4 and 5 of TCP-OSI protocol architecture
a virtual, private pathway over a public or shared network from the VPN client to the VPN server
unshielded twisted pair (utp) cable
type cable used to connect computer, printer, switches, and other devices on a LAN. has four pairs of twisted wire
virtual private network (VPN)
a WAN connection alternative that uses the internet or a private internet to create the appearance of a private point to point connections.
emerging technology based on the IEEE 802.16 standard. design to deliver the "last mile" and could replace cable and dsl
Wireless NIC (WNIC)
devices that enable wireless networks by communicating with wireless access points.
ieee 802.16 protocol
emerging new technology also known as wimax enable broadband access for fixed nomadic and portable applications.
five fundamental components of any information system--computer hardware, software, data, procedures, and people--that are present in ever IS from simplest to most complex
products, methods, inventions, and standards that used for the purpose of producing information
Management information systems (MIS)
an information system that helps businesses achieve their goals and objectives
part of five component framework, includes those who operate and service the computers, maintain data, support networks, and those who use the system.
instructions for computers. one of the five fundamental components of an information system
a password with the following characteristics:seven more characters, no names, no complete words, different than old passwords, contains upper and lower case letters, numbers, special characters
information that is based on correct and complete data and that has been processed correctly as expected
part of a business process that transforms resources and info of one type into resources and info of another type
a network of activities, resources, facilities, and information that interact to achieve soem business function; sometimes called a business system
knowledge derived fro data where data is defined as recorded figures. data presented in meaningful context. data processed by operations. a difference that makes a difference.
just barely sufficient information
information that meets the purpose for which it is generated but just barely so
an information system in which the activity of processing information is done by people, without the use of automated processing
information in which an appropriate relationship exists between the value of the information and the cost of creating it
five forces model
model, proposed by michael porter that assesses the industry characteristics and profitability by means of five competitive forces-bargaining power of suppliers, threat of substitution, bargaining power of customers, rivalry among firms, and threat of new entrants
process interactions across value chains. important sources of efficiencies and are readily supported by IS
in porter's value chain model the fundamental activities that create value-inbound logistics, operations, outbound logistics, marketing/sales and service
in porter's value chain model the activities that contribute indirectly to value creation--procurement, technology, human resources, and the firms' infrastructure
business strategy of locking in customers by making it difficult or expensive to change to another product or supplier
self-describing collection of integrated records, consists of tables, relationships among rows, and metadata
collection of forms, reports, queries, and application programs that process a database
database application system
consists of users, database application (forms, reports, queries, application programs), Database management system, database
issue in multi-user processing in which two or more users try to make changes to the data but the database cannot make the changes because it was not designed to process changes from multiple users
databases that carry their data in the form of tables and represent relationships using foreign keys
documents current situation and then change model to make adjustments necessary to solve process problems
Business process management
systematic process of creating, assessing, and altering business processes
Business process modeling notation
standard set of terms and graphical notations for documenting business processes
customer relationship management
classic example of cross-functional process, involves activities from sales, marketing, operations, and customer support
places the logic in one desirable place and all other services go to that one place for that service
island of automation
issue with functional processes, because they work independently of one another it cannot produce sufficient productivity and efficiency for businesses
can be used to simplify process diagrams and draw attention to interactions among components of the of the diagram
web services description language
languages for describing the programmatic interface to a service, makes service to service programming easier
business intelligence system
an information system that provides information for improving decision making
curse of dimensionality
the more attributes there are, the easier it is to build a model that fits the sample data but that is worthless as a predictor
data collection created to address the needs of a particular business function, problem or opportunity
application of statistical techniques to find patterns and relationships among data and to classify and predict
extracts and cleans data from operational systems to store and catalog for processing for BI tools
create value from intellectual capital by collecting and sharing human knowledge of products, product uses, best practices, and other critical knowledge with employees, managers, customers, suppliers, and others who need it
computes correlations of items on past orders to determine items that are frequently purchased together
used to predict values and make classifications such as "good prospect" or "poor prospect" customers
integrate data from multiple sources, process data by sorting, grouping, summing, averaging, and comparing
supervised data mining
data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model