Deck 11 Flashcards Preview

BEC > Deck 11 > Flashcards

Flashcards in Deck 11 Deck (20):
1

Public Key Infrastructure (PKI)

The system and processes used to issue and manage asymmetric keys and digital certificates

2

Program-Level Policy

This is the mission statement for the IT security program

3

Definition of Electronic Data Interchange (EDI)

Computer-to-computer exchange of business transactions documents (Ex: purchase order, invoices)

4

EDI can be implemented using both

VANS or the Internet

5

Comparison of EDI and E-Commerce

EDI - more expensive, more secure, slower, driven by VANS; E-commerce is driven by the Internet

6

Enterprise Resource Planning System (ERP)

System that integrates and automates the many business processes and systems that must work together

7

Supply Chain Management (SCM)

Concerned with the four important characteristics of every sale: what, when, where, and how much

8

Customer Relationship Management (CRM) system

Provides sales force automation and customer services in an attempt to manage customer relationships; the objective is to increase customer satisfaction

9

Hypertext Markup Language (HTML)

Tag-based formatting language used for web pages

10

Four main risks for Information Systems

Strategic risk (choosing inappropriate technology), operating risk (doing the right thing in the wrong way), financial risk (financial resources lost or stolen), information risk (loss of data integrity or hackers)

11

Packet filtering

Simplest type of firewall configuration

12

Steps in Disaster Recovery

1. Assess the risks, 2. identify mission critical applications/data, 3. develop a plan, 4. determine the responsibilities of personnel involved, and 5. test the plan

13

Incremental backup

Copying only the data items that have changed since the last backup

14

Differential backup

Copies all changes made since the last full backup

15

Which controls are typically included in a disaster recovery plan?

Backup and downtime controls

16

Virtual Memory

Memory where portions of a program that are no being executed are stored (Not real memory)

17

Three-tier architecture includes:

Desktop client, application, and database

18

Data Normalization

Separating data into logical tables

19

What is a critical success factor for data mining?

Pattern recognition

20

A Value-added Network (VAN) performs what function?

Route data transactions between trading partners