1. What is the definition of a ERP?
    1. Enterprise Resource Planning
      1. Suite of systems of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform.
  2. Why do companies adopt ERP systems?
    1. Cost reductions and productivity enhancements
  3. Who are the vendors?
    1. Microsoft Dynamics. ...
    2. Oracle e-Business Suite. ...
    3. SAGE. ...
    4. SAP Business One. ...
    5. Infor Global Solutions. ...
    6. NetERP from NetSuite. ...
    7. Lawson Software.
  4. ERP vs CRM Vs EAI(two questions)
    1. ERP -Enterprise Resource Planning
      1. Suite of systems of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform.
    2. CRM - Customer relationship management
      1. Suit of applications, a database, set of inherent processes
      2. Manage all interactions with customer through four phases of customer life cycle:
      3. Every contact/transaction is recorded in Database
      4. Supports customer-centric organizations
        1. CRM components exist for each stage of customer life cycle. All applications process a common database
        2. Design eliminates duplicate customer data and removes inconsistent data
    3. EAI - Enterprise Application Integration
      1. Suit of software applications that integrates existing systems by providing layers of software that connect applications
        1. ERP may not be appropriate for some companies, for the Enterprise application integration can help solve silo problems   
    4. How do they support enterprise systems?
      1. Help orgs rethink how they do work.
      2. Inherent processes
        1. -prebuilt procedures based upon “industry best practices”
        2. -saves money and time in BPR
      3. Eliminates costs of developing complex applications in-housed
  5. Risk and expenses associated with implementation or upgrading of enterprise system
    1. Business process Reengineering
      1. Difficult, slow and exceedingly expensive. Requires high level, expensive skills and considerable time
  6. What is data warehousing?
    1. a subject-oriented, integrated, time-variant and non-volatile collection of data in support of management's decision making process
  7. What is cloud computing?
    1. an information technology paradigm that enables ubiquitous access to shared pools of configurable system resources and higher-level services that can be rapidly provisioned with minimal management effort, often over the Internet
  8. What is social media?
    1. computer-mediated technologies that facilitate the creation and sharing of information, ideas, career interests and other forms of expression via virtual communities and networks
  9. What is EDI? Electronic Document interchange
    1. the concept of businesses communicating electronically certain information that was traditionally communicated on paper. The two classic examples of such information are purchase orders and invoices.
  10. What are the organizations involved in Social Media?
    1. Who are the sponsors?
      1. Companies and other organizations that support a presence on one or more
    2. Who are the application providers?
      1. Facebook, twitter, LinkedIn, Google
  11. What does SMIS stand for?
    1. Social Media Information System
      1. Supports sharing of content among networks of users
  12. The defender of a belief and seeker of a truth theory
    1. Defender of belief - wants others to join him in his belief and tries to form a hive around that belief.
    2. Seeker of a truth - has a desire to learn something, solve a problem, or make something happen.
  13. SLATE and folksonomy.

    1. SLATE -
        1. acronym that summarizes key characteristics of Enterprise 2.0:
          1. Search - people have more success searching than they do in finding from structured content
          2. Links - links to enterprise resources (like on the Web)
          3. Authoring - Create enterprise content via blogs, wikis, discussion groups, presentations, etc
          4. Tagged - flexible tagging ( e.g., delicious) results in folksonomies of enterprise content)
          5. Extensions - Using usage patterns to offer enterprise content via tag processing (ex. Pandora)
          6. Signaled - Pushing enterprise content to users based on subscriptions and alerts


    2. Folksonomy - a user-generated system of classifying and organizing online content into different categories by the use of metadata such as electronic tags.
  14. Enterprise 2.0
    1. the strategic integration of Web 2.0 technologies into an enterprise's intranet, extranet and business processes
  15. Problems of social networking and how to respond to these problems
risk of employee communication
  1. disclose
    1. be transparent: use your real name and employer
    2. be truthful - point out if you have a vested interest
    3. be yourself - stick to your expertise and write what you know
  2. protect
    1. don't tell secrets
    2. don't slam the competition
    3. don't overshare  
  3. use common sense  
    1. add value - make your contribution worthwhile
    2. keep it cool - don't inflame or respond to every criticism
    3. admit mistakes - be upfront and quick with corrections
  4. risk of inappropriate content
  1. designing a single individual to be responsible for official organizational social media  interactions and by creating a process to manage and monitor social media

  1. What is a Business Intelligence system?
    1. refers to technologies, applications and practices for the collection, integration, analysis, and presentation of business information
  2. Difference between pull and push record
    1. Pull record -
    2. Push record -
  3. What is Data Mining
    1. the computing process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems
  4. What is data acquisition about
    1. the process of sampling signals that measure real world physical conditions and converting the resulting samples into digital numeric values that can be manipulated by a computer
  5. What is metadata
    1. data [information] that provides information about other data". Three distinct types of metadata exist
  6. What is data granularity
    1. the level of depth represented by the data in a fact or dimension table in a data warehouse
  7. Data mart vs data warehouse
    1. Data mart -  the access layer of the data warehouse environment that is used to get data out to the users
    2. Data warehouse - a system used for reporting and data analysis, and is considered a core component of business intelligence
  8. Difference between structured and unstructured data
    1. Structured data - information with a high degree of organization, such that inclusion in a relational database is seamless and readily searchable by simple, straightforward search engine algorithms or other search operations; whereas unstructured data is essentially the opposite
    2. Unstructured data - information that either does not have a pre-defined data model or is not organized in a pre-defined manner. Unstructured information is typically text-heavy, but may contain data such as dates, numbers, and facts as well
  9. What is big data?
    1. data sets that are so voluminous and complex that traditional data processing application software are inadequate to deal with them
  10. Data mining is an important concept
    1. Data mining - the computing process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems
  11. What is the difference between static report and dynamic report
    1. Static report - a report that is run immediately upon request and then stored, with the data, in the Data Warehouse
    2. Dynamic report -  only the information needed to create the report is stored
  12. What is an exception report
    1. A listing of abnormal items or items that fall outside of a specified range.
  13. What is the difference between supervised and unsupervised data mining techniques
    1. Supervised data mining -  Data mining task of inferring a function from labeled training data.The training data consist of a set of training examples. In supervised learning, each example is a pair consisting of an input object (typically a vector) and a desired output value (also called thesupervisory signal).
    2. Unsupervised data mining - trying to find hidden structure in unlabeled data
  14. What is regression analysis vs cluster analysis
    1. Regression analysis - statistical modeling, regression analysis is a set of statistical processes for estimating the relationships among variables
    2. Cluster analysis - the task of grouping a set of objects in such a way that objects in the same group are more similar to each other than to those in other groups
  15. What is map reduce process of big data
    1. creates a map task to process each input split. The map task: Uses the InputFormat to fetch the input data locally and create input key-value pairs. Applies the job-supplied map function to each key-value pair
  16. What is HADOOP, the open source program that we use to process big data.
    1. an open-source software framework for storing and processing big data in a distributed/parallel fashion on large clusters of commodity hardware
  17. What is a cookie
    1. A small text file (up to 4KB) created by a website that is stored in the user's computer either temporarily for that session only or permanently on the hard disk (persistent cookie).
  18. What is linux? An operating system
    1. a name that broadly denotes a family of free and open-source software operating systems built around the Linux kernel. Typically, Linux is packaged in a form known as a Linux distribution for both desktop and server use
  19. What is the difference between system and program development
    1. System development -  a term used in systems engineering, information systems and software engineering to describe a process for planning, creating, testing, and deploying an information system.
    2. Program development - The process containing the five phases of program development: analyzing, designing, coding, debugging and testing, and implementing and maintaining application software.
  20. Definition of information system
    1. an organized system for the collection, organization, storage and communication of information
  21. What is the difference between the shelf software, tailored software and off the shelf software.
    1. Tailored software - software that is specially developed for some specific organization or other user.
    2. Off the shelf software -  an adjective that describes software or hardware products that are ready-made and available for sale to the general public.
  22. What is Feasibility study
    1. an assessment of the practicality of a proposed project or system
  23. The phases of a system development life cycle(Super important)
    1. What happens in them.
  24. Difference between normal and backup processing procedures
    1. Normal processing procedures -
    2. Backup processing procedures -
  25. What is the different type of testings? Unit testing, beta testing, integration
    1. Unit testing -  a software testing method by which individual units of source code, sets of one or more computer program modules together with associated control data
    2. Beta testing - the second phase of software testing in which a sampling of the intended audience tries the product out.
    3. Integration - the manufacturing approach of using computers to control the entire production process. This integration allows individual processes to exchange information with each other and initiate actions
  26. Difference between the different types of conversions, parallel vs pilot vs page
    1. Parallel conversion  -  a method for transferring between a previous (IT) system to a target (IT) system in an organization. In order to reduce risk, the old and new system run simultaneously for some period of time after which, if the criteria for the new system are met, the old system is disabled.
    2. Pilot conversion - a hardware or software migration method that involves rolling out the new system to a small group of users for testing and evaluation. During the pilot implementation, the test group users can provide valuable feedback on the system to make the eventual rollout to all users go more smoothly
    3. Page conversion -
  27. What is analysis paralysis
    1. the state of over-analyzing (or over-thinking) a situation so that a decision or action is never taken, in effect paralyzing the outcome.
  28. Role of development group of an IS department
    1. manages the process of creating new information systems as well as maintaining existing information
  29. What is the role of a network administrator
    1. maintains computer infrastructures with emphasis on networking. Responsibilities may vary between organizations, but on-site servers, software-network interactions as well as network integrity/resilience are the key areas of focus.
  30. What is alignment
    1. Arranging data to line up with a required format on a screen or printed form. (2) Arranging data in memory in increments of the fundamental "word size" of the computer in order to improve response times.
  31. What are the advantages and risk of outsourcing
    1. Outsourcing- the process of hiring another organization to perform a service
      1. Advantages
        1. Outsourcing is done to save costs
        2. To gain expertise
        3. To free management time
      2. Disadvantages
        1. Changing a network require time and resources
        2. It can be perceived as a drag on the organization's opportunities
  32. What is the difference between SAAS vs PAAS vs IAAS
    1. Software as a service, platform as a service, information as a service
      1. Software as a service - a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted.
      2. Platform as a service -  a category of cloud computing services that provides a platform allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app
      3. Information as a service - a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted
  33. What is your responsibilities as a user of an information system

  34. What is the difference between pretexting, hacking and system and phishing.
    1. Pretexting - a form of social engineering in which an individual lies to obtain privileged data.
    2. Hacking - use a computer to gain unauthorized access to data in a system
    3. Phishing - the attempt to obtain sensitive information such as usernames, passwords, and credit card details, often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.
  35. IP spoofing - the creation of Internet Protocol (IP) packets with a false source IP address, for the purpose of hiding the identity of the sender or impersonating another computing system.
  36. email spoofing -  the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source. Email spoofing is a tactic used in phishing and spam campaigns because people are more likely to open an email when they think it has been sent by a legitimate source.
  37. Drive by sniffers
    1. program and/or device that monitors data traveling over a network. Sniffers can be used both for legitimate network management functions and for stealing information off a network. Unauthorized sniffers can be extremely dangerous to a network's security because they are virtually impossible to detect and can be inserted almost anywhere
  38. Those hackers and phishers
  39. What is a DoS attack?
    1. a denial-of-service attack is a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
  40. What is encryption about?
    1. Encryption - the process of encoding a message or information in such a way that only authorized parties can access it. Encryption does not itself prevent interference, but denies the intelligible content to a would-be interceptor
  41. Usurpation -  
  42. What is the role of an intrusion detection system
    1. a device or software application that monitors a network or systems for malicious activity or policy violations.
  43. What’s a brute force attack
  44. What’s a key when we are talking about encryption
  45. What are the different types of security threats
    1. Botnets.
    2. Distributed denial-of-service (DDoS)
    3. Hacking.
    4. Malware.
    5. Pharming.
    6. Phishing.
    7. Ransomware.
    8. Spam.
  46. What is the difference between technical, data, human and procedures safeguards.
  47. What is the process of authenticating a user and identifying a user
  48. What is a smart care
  49. What is biometric authentication
  50. Difference between HTTP and HTTPS: S - socket secure layer
  51. What are the different types/layers of firewalls
    1. Filtering and application and internal firewalls
  52. What is malware
    1. What is adware
    2. Spyware
    3. Payloads
    4. Trojan horse
  53. What is an incident response paln
  54. How should employees react to security problems

  • how does a data breach occur attackers are always developing new ways,tools and techniques that allow them to steal more data/information \
    • so there is never one same data breach
    • sniffer - a program that detects data and records restricted information needed to gain access to files or network
    • attackers are usually searching for personally identifiable information
    • ppi is inoformation about an individual; name adress, date of birth, social security
  • what is the goal of information security?
  • what are the sources of threats?
    • unauthorized data disclosure
  • what types of security loss exists
    • unauthorized data disclosure
    • pretexting
    • phishing
    • spoofing
      • IP spoofing
      • Email Spoofing
    • Drive by sniffer
    • hacking
    • natural disasters
  • how big is the computer security problem
  • ponemon 2012 studies summary
    • median cost of computer crime increasing
    • malicious insiders increasingly serious security threat
    • data loss
  • how should you respond to security threats
    • take security seriously
    • create strong passwords
    • use multiple passwords
    • send no valuable data via email or IM
    • use https at trusted, reputable vendors
    • remove high-value assets from computers
    • clear browsing history, temporary files, and cookies
    • regularly update anti virus software
    • demonstrate security concern to your fellow workers
    • follow organizational security directives and guidelines
  • how can organizations respond to threats
    • technical safeguards
    • data safeguards
    • human safeguards
  • how should organizations respond to security incidents
    • have a plan in place
    • centralized reporting
    • specific responses
      • speed
      • preparation pays
      • don't make problem worse
      • practice
      •  

Comments

Popular posts from this blog

database