cis tes 3 (chapter 3,8,10,11,12) Flashcards
(63 cards)
what do business intelligence systems do
help organizations make informed decisions using data
3 primary business intelligence activities
acquiring data, analyzing data, presenting results (aap)
data warehouse
collect and clean large amounts of data from many sources
data marts
smaller, focused collections of data for specific departments
possible problems with source data
dirty data, missing values, inconsistent
3 techniques for processing BI data
reporting (summarizes data into readable formats- RFM= recently, frequently and how much money), data mining (finds patterns- supervised= no prior assumptions and nonsupervised), big data (analyzes large complex data sets w high volume)
why is AI important
machine to simulate human activities, changes how decisions made and tasks automated
forces driving AI advancement
increased computing power, increased device connectivity, new techniques
weak AI vs strong AI
specific tasks vs can do anything a human can
by 2031 BI systems
understand routines, singularity= point where machines improve without human help
what is cybersecurity
protecting networks, devices and data from unauthorized access or attacks
3 pillars of information security
confidentiality, integrity, availability (CIA)
Whats confidentiality
how secure is data- use authentication (passwords, biometrics) and authorization (who can access what)- failure happens when unauthorized someone can obtain and view data
whats integrity
keep data accurate and unaltered (use tools like hashing- data into nondescript text; access control and secure storage) failure happens when someone modifies data
whats availability
ensure users can access data when needed - failure happens if data cant be accessed by end user
how organizations should respond to threats
hardware/software= encryption and firewalls; data= passwords; procedures and people = training, education, procedure design
how individuals respond to security threats
antivirus software, strong passwords, watch for phising
how to close pop up tab with malicious hyperlink
command q in mac or alt+fn+f4 in windows
signs of phising
sense of urgency, loss if not acted on, attachments, hyperlinks
how to see if link fradulent
find first forward slash and count first 2 periods
business process
set of activities that transform inputs into outputs to add value
structured process
standard, day to day operations such as placing orders (formal)
dynamic process
flexible, adaptive processes such as strategic planning (more informal)
3 levels of process
workgroup (within one department), enterprise (span multiple departments one company), inter-enterprise (span across 2+ seperate organizations)