OPIM 3103 Uconn – Flashcards

Unlock all answers in this set

Unlock answers
question
Know the four reasons why Systems are vulnerable
answer
1. Hardware- Breakdowns, configuration errors, damage from improper use/crime 2. Software - programming errors, installation errors, unauthorized changes 3. Disasters - power failures, flood, fires 4. Use of Networks outside of Firm Control- domestic offshore outsourcing vendors
question
Be able identify at least 3 reasons why the internet is inherently vulnerable
answer
1. Size means abuse may have wide impact 2. Networks being open to anyone 3. Email attachments open up computers to foreign files 4. IM messages lack security and can be intercepted
question
Explain why open wireless signals are unsecured
answer
1. Spoof SSID: identify access points, broadcast multiple times 2. Radio frequency bans easy to scan 3. War Driving: eavesdroppers drive by buildings and try to intercept network traffic, with access to SSIDs they can access networks resources 4. Rogue Access Points 5. WIFI- networks can easily be penetrated by intruders using sniffer programs to obtain an address to access resources of network without authorization
question
Describe the six types of malware and their basic functions
answer
1. Virus - rogue software program that attaches itself to other programs to run/ data files to be executed 2. Worm - independent computer programs that copy themselves from one computer to other computers over a network. Spreads over network 3. Trojan Horse - Program that appears normal then turns malicious/does something other than expected 4. SQL Injection - Insert small pieces of sql code into a db to steal or corrupt data 5. Spyware - Small programs that monitor web surfing activity and serve up advertising 6. Key Loggers - Record every keystroke to steal serial numbers, passwords, etc
question
Define what is a DOS Attack (Denial of Service)
answer
Flood a server with thousands of false requests to crash the network
question
Spoofing
answer
Misrepresenting oneself by using fake email addresses or masquerading as someone else
question
Sniffer
answer
eavesdropping program that monitors information traveling over network, allows hackers to steal proprietary information
question
Identify what is the business value of Security and Control
answer
1. Failed computer systems cost time and money 2. Can affect market value and cause issues of liability to other companies and customers 3. loss of business function, firms more vulnerable now more than ever
question
Legal issues
answer
firms face new legal obligations for retention/storage of electronic records as well as for privacy protection
question
HIPAA
answer
medical security and privacy rules and procedure
question
GRAMM-LEACH-BRILEY ACT
answer
requires financial institutions to ensure the security and confidentiality of customer data
question
SARBANES-OXLEY ACT
answer
imposes responsibility on companies and their management to safeguard accuracy and integrity of financial info
question
What are the six type of general Security Controls
answer
1. Software 2. Hardware 3. Computer Operations 4. Data Security 5. Implementation 6. Administrative
question
What is the difference between a Disaster Recovery Plan and Business Continuity Plan
answer
1. Restoration of disrupted services 2. Focuses on restoring business operations after disaster
question
Explain what an Enterprise System is
answer
Suite of integrated software modules and a common central database. Collects data from all divisions of company for immeadiate use by other parts of the company
question
Identify what is the business value of Enterprise Systems
answer
ERPs increases efficiency, provide information to support decision making and help evaluate organizational performance
question
What is the difference between a Upstream and Downstream Supply chain
answer
- Upstream - Firm's suppliers, suppliers' suppliers, process for managing relationship with them - Downstream - Organization and processes responsible for delivering products to customers
question
Describe what a supply chain planning system is
answer
Model existing supply chain, optimize sourcing and manufacturing plans, establish inventory levels and identify transportation modes
question
Identify two issues that come with a Global supply chain
answer
1. Greater geographical issues 2. Greater time differences
question
Identify the business value of implementing a Supply Chain Management System
answer
Match supply to demand, reduce excess inventory , improve delivery and time to market, increase sales
question
Explain the term Customer Relationship Management
answer
Capturing and integrating customer data from all over the organization
question
What is the difference between an Operational CRM and an Analytical CRM
answer
- Operational - Customer facing apps such as sales force automation, call center and customer service support and marketing automation - Analytical - Analyzes customer data from operational CRM
question
Describe two challenges of implementing an Enterprise Application
answer
1. Expensive to implement and use 2. Changes in process cause need to change ERP
question
Define the five type of computer hardware
answer
1. Supercomputer 2. Mainframe 3. Server 4. Workstation 5. Personal Computer
question
Explain the difference between operational and backup data storage
answer
- Operational - For processing transaction or for data analysis - Backup - Short-term copies of organization data, used to recover from system related disaster
question
Explain the difference between Web 1.0 and Web 2.0
answer
Web 1.0 presents information to users, web 2.0 there is a 2 way communication channel
question
Describe the benefits of dedicated videoconferencing
answer
Have dedicated setups for high quality video and audio sharing, can be built into conference rooms and meeting spaces and you get the benefit of easily communicating with people at other locations
question
Identify the four main benefits of an intranet / employee portal
answer
1. Real time access 2. Enterprise Search 3. Collaboration 4. Employee Portals benefit self service
question
List 2 types of enhancing cooperation with social media
answer
1. Instant messaging 2. Microblogging
question
Give three organizational issues that could come up implementing Enterprise 2.0
answer
1. Generation gap 2. Technology integration 3. Security
question
What is a potential pitfall of using social media as Web 2.0 Marketing
answer
Can be hard to distinguish how professional to stay on social media as a company
question
What are the Three V Challenges that organizations have with Big data
answer
1. Volume 2. Variety 3. Velocity
question
Explain why businesses need to now continuously plan
answer
Businesses need to monitor, track, and update systems while managing them in real time
question
Define how databases can eliminate redundancies
answer
By having things in one database, less people can have old outdated information
question
What is a key indicator report
answer
Reports that provide a summary of critical information on a recurring schedule
question
Why would a company want to mine internet
answer
To gain information on customers and other companies
question
Give the three type of ways to visualize information from business analytics
answer
1. Dashboards 2. Visual Analytics 3. Geographic Info Systems
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New