Term
|
Definition
Protection of Information from accidental or intentional misuse by persons inside or outside an organization |
|
|
Term
Biggest issue surrounding information security |
|
Definition
Not a technical issue but a people issue |
|
|
Term
Information Security Policies |
|
Definition
Identify the rules required to maintain information security |
|
|
Term
Information Security Plan |
|
Definition
Details how an organization will implement the Information Security policies |
|
|
Term
5 Steps to create information security plan |
|
Definition
1. Develop the information security policies
2. Communicate the information security policies
3. Identify critical information assets and risks
4. Test and reevaluate risks
5. Obtain Stakeholder support |
|
|
Term
|
Definition
Method for confirming users' identities |
|
|
Term
|
Definition
process of giving someone permission to do or have something |
|
|
Term
|
Definition
1. ID and Password
2. Smart card or Token
3. Fingerprint or voice |
|
|
Term
|
Definition
Forging of identity for purpose of fraud |
|
|
Term
|
Definition
Technique to gain personal information for purpose of identity theft |
|
|
Term
|
Definition
electronic device that change user passwords automatically |
|
|
Term
|
Definition
-Device size of credit card
-Store information and small amounts of software to perform limited processing |
|
|
Term
|
Definition
-Identification of a user based on physical characteristic such as fingerprint, face, voice
-Costly and intrusive |
|
|
Term
|
Definition
Software that filters content to prevent the transmission of unauthorized information |
|
|
Term
|
Definition
|
|
Term
|
Definition
-Scrambles information into alternative form that requires a key or password to decrypt the information |
|
|
Term
|
Definition
Uses 2 keys
1. Public key that everyone can have
2. Private key for only the recipient |
|
|
Term
|
Definition
Hardware or software that guards a private network by analyzing the information and entering the network |
|
|
Term
|
Definition
Most common type of detection and response technology |
|
|
Term
|
Definition
-Forging of the return address on an e-mail so email appears to come from someone other than actual sender |
|
|
Term
|
Definition
Program or device that can monitor data traveling over a network |
|
|
Term
|
Definition
Use knowledge to invade other people's computers |
|
|
Term
|
Definition
Software written with malicious intent to cause annoyance or damage |
|
|
Term
|
Definition
Management of information flows between and among stages in a supply chain to maximize total supply chain effectiveness and profitability |
|
|
Term
4 Basic Components of Supply Chain Management
(SPOL) |
|
Definition
1. Supply Chain Strategy - manages resources to meet customet demand
2. Supply Chain Partner - partners throughout the supply chain -- deliver finished products, raw materials, services
3. Supply Chain Operation - Schedule for production activities
4. Supply Chain Logistics - product delivery process |
|
|
Term
Customer Relationship Management |
|
Definition
-Manage all aspects of customer's relationship w/ organization
-Increase loyalty and retention to increase profitability |
|
|
Term
|
Definition
Standardized set of activities that accomplish a specific task |
|
|
Term
Business Process Reengineering |
|
Definition
Analysis and redesign of workflow within and between enterprises |
|
|
Term
Enterprise Resource Planning |
|
Definition
Integrates all departments and functions throughout an organization into a single IT system |
|
|
Term
|
Definition
Collects data from across organization and generates an enterprisewide view |
|
|
Term
|
Definition
1923 Time Magazine
1929 Fortune
Business Week |
|
|
Term
|
Definition
Measures performance of IT system itself including throughput, speed, and availablility |
|
|
Term
|
Definition
Measures the impact IT has on business processes and activities including customer satisfaction, conversion rates, sell-through increases |
|
|
Term
|
Definition
a process of continuously measuring system results, identifying steps and procedures to improve system performance |
|
|
Term
|
Definition
Actual Results/Optimal System Performance |
|
|
Term
Chief Information Officer |
|
Definition
Oversees all uses of IT and ensures the strategic alignment of IT with business goals and objectives
-Manager
-Leader
-Communicator |
|
|
Term
|
Definition
Responsible for ensuring the throughput, speed, accuracy, availability, and reliability of IT |
|
|
Term
|
Definition
Responsible for ensuring the security of IT systems |
|
|
Term
|
Definition
Repsonsible for ensuring the ethical and legal use of information |
|
|
Term
|
Definition
Responsible for collecting, maintaining, distributing the organization's knowledge |
|
|
Term
|
Definition
Principles and standards that guide behavior toward other people |
|
|
Term
|
Definition
right to be left alone when you want to be, control of personal possessions, and not to be observed without your consent |
|
|
Term
|
Definition
protection of information from accidental or intentional misuse by persons inside or outside an organization |
|
|
Term
|
Definition
# of customers an organization "touches" for the first time and pursuades to purchase.
-Popular way to evaluate the effectiveness of banner, pop-up, and other ads on the internet |
|
|
Term
|
Definition
# of people who visit a site, click an ad, taken to the site of an advertiser |
|
|
Term
|
Definition
average rate of successful message delivery over a communication channel |
|
|