Please enable JavaScript.
Coggle requires JavaScript to display documents.
CS 330, A (A), Business, D1: A, Middle, Screen Shot 2022-04-13 at 4.28.45…
CS 330
1 - IT Infrastructure
and Emerging
Technologies
2 - Databases
3 - Networking
4 - MIS
Management Information Systems
5 - Business Processes and Types of Info Systems
6 - Organizations and IS
7 - Social Ethical and Legal Issues
8 - Security
9 - Managing Knowledge
4 more items...
Secure Communication
encryption vs decryption
symmetric key encryption
brute force search and
computationally secure
hash function
key distribution problem
public key encryption
: public key vs private key
digital signature
certificates (have DS of CA)
secure browsing
The Challenges (Sources of Problems)
People
Bugs and Points of Vulnerability (tapping, sniffing, radiation, data breaches)
NSA could breach many security protocols
Classes of Threats (Common Malware)
Computer virus (attaches to sw/data)
Worm (virus but run on their own)
Trojan Horse (benign then explodes)
Phishing (pretend & ask)
DOS (overwhelm website)
Sniffing (eavesdrop nw communication)
Spam (junk email)
Botnet (computers used for common purpose)
Ransomware (publish unless ransom paid)
Computer Security
definition
6 security services are needed
Authentication (who)
Access Control (access to)
Data Confidentiality (not shared)
Data Integrity (is true)
Availability (of services)
Non-Repudiation (protection against denial)
Tools for Protecting IS
Authentication approaches (know, have, are)
Password hackers
Firewalls
Intrusion detection systems
Antivirus software (signature)
Wireless Security (3 parameters)
Bandwidth (newer => faster)
Security (newer => more secure)
Authentication (personal/enterprise)
Aside: Problem introduced by ISP
System Security (securing your system)
barest minimum: password, antivirus protection, auto update apps
best practices
Isolate and Encrypt Sensitive data
Minimize your attack surface (WPA3, firewall, off modem)
Security and Control Framework
business value (legal)
legal and regulatory requirements
PIPEDA (safeguarding)
discovery request (respond)
C-SOX (financial)
Tools
Risk Assessment
Security Policy
Acceptable Use Policy
Disaster Recovery Planning
Business Continuity Planning
Security Auditing
Moral Dimensions of Information Age
Technology Trends (storage costs decreasing, computing power increases, big data, growth of internet, growth of mobile phone usage)
Implications:
Personal information
Property rights
Data and system quality
Accountability
Quality of life
Moral Dimensions of Information Age
Aspects:
ethical
social
legal/political
Key legal terms:
responsibility
accountability
liability
due process
Ethical Principles
Golden Rule (U => others, others => U)
Kant's Categorical Imperative (everyone, anyone)
Descartes' Rule of Change (repetition)
Utilitarian Principle (highest value, all concerned)
Risk Aversion Principle (high cost of failure)
List of Concerns
Personal Information
Digital Property Rights
Data and System Quality
Accountability and Liability
Quality of Life
Personal Information
PIPEDA
privacy
What is PI
Concerns (terms of service)
WWW challenges to Privacy
Information collected + used (NORA)
Strategies (2 browsers, old comp, library)
3 more items...
Digital Property Rights
IP, protected by one of
trade secret (confers economic advantage, EULA)
copyright
patent (exclusive monopoly, rule in Canada)
Challenges to IP (copy & distribute)
Copyright Modernization Act (Canada's response- digital locks)
Data and System Quality
No program error-free
Accountability and Liability
Information provider (producer liable) vs service provider (producer not liable)
Quality of Life
Blurred work-home boundaries
Centralized control
Rapidity of change
Dependency of IS
Cybercrime
Job loss
Repetitive stress injury/carpal tunnel syndrome
Overview of Organizations
Motivation
Office politics skills
technical vs behavioral view
Considerations for an IS
Routines and business processes => efficiency
Organizational politics => struggle for resources
Organizational culture => unquestioned goals/products
Organizational environment => regulations, competitors, customers, etc.
Organizational structure => diff structure, diff IS
Other features
Impact of IS on Organizations
reduces the cost of information (transactional, agency, flattens, innovations)
Competitive Advantage
Porter's Competitive Forces Model (strategies)
The Business Value Chain Model (where to put IS?, primary vs support activities)
Business Processes
what is it?
collection of business functions and collection of business processes
How does an IS fit in?
Technical (can we?)
Behavioural (should we?)
Goal: Enhance BP through automation
Types of Information Systems (3 Q's asked for each)
Sales and Marketing (CRM)
Manufacturing and Production (SCM)
Financing and Accounting (AIS)
Human Resources (HRMS)
Questions asked:
Which BP can be automated?
What data can be gathered?
What information can help improve business?
Types of Management
3 levels: senior, middle, and operational
IS for Different levels
Senior: (ESS)
Middle (DSS, MIS)
Operational (TPS)
Relationship amount different IS's
ERP integrates IS's into one big system
TPS
: automates BP's
MIS
: routine reports on dep current performance to middle management
DSS
: supports ad-hoc decision making by middle management
ESS
: supports ad-hoc decisions requiring judgement, evaluation, and insight by senior management
After automation: Business Intelligence
Collect data
Extract Information
Create Business Intelligence
What is MIS
Key definitions: data, information, and information technology (IT), information system (IS)
dimensions of an information system
technical
organizational (diff groups diff needs, rules)
management
Why have MIS?
The mission
Improve performance of people using IT
Automate data gathering, dist, etc. using IT
data => info using BI
Important terminology: IT, data, information, BI, IS, management IS (MIS)
Strategic Objectives of an IS
Create or Maintain a Competitive Advantage
Adapt to internal or external change (creative destruction)
Cost/Benefit Analysis (ROI, contemporary assets)
1)
help develop new products/services/business models
understand customers/suppliers
improve decision making by most recent/relevant info
survival, respond to change
Contemporary Approaches: from IS to MIS
technical:
CS
operations research
management science
behaviour
sociology
economics
psychology
we take a
sociotechnical approach
Overview of Computer Networks
key components: computer network, NIC, NOS, Connection medium, dedicated servers, hubs, bridges, switches, routers, firewall
Circuit switching and packet switching
Characteristics of Networks
Topology: star, bus, ring
Geographic scale: NFC, PAN, LAN (WLAN), WAN
Protocol: network protocol, internet protocol suite
transmission media
services
Internet Protocol Suite (each exists for source and destination)
Application Layer
Transport Layer
Internet Layer
Network Interface Layer
Transmission Media
Physical: twister pair, coaxial cable, fiber optic cable
Wireless: bluetooth, wifi, wimax, 3rd - 5th generation cellular towers
bandwidth vs latency
The Internet is not the Web
Difference between the two
Important terms: HTTP, HTML, URL, hyperlink, hypertext
IP Address and the DNS
IP address, domain name, DNS
Internet Services
VoIP
VPN (and motivation)
RFID
Important Concepts:
concurrent access, data integrity, redundancy, inconstancy, strongly coupled
Types of Database Models
Hierarchy
Network
Relational
Object-Oriented
Relational Databases
entities, attribute, field, domain, record
table, relation
primary key
composite key
candidate key
foreign key
DBMS
2 problems (how data is stored, different views for different groups)
Solution, 3 schema architecture
External Schema (logical view)
Conceptual Schema (global view)
Physical Schema (physical view)
Above leads to data independence
Operations: Select, Join, Project
data manipulation language vs data definition language
Types of Databases
Limitations of Relational Databases
Hierarchical databases
Network Database
OO Database
Relational Database Design
Good design criteria: correctness, completeness, minimum redundancy
Steps
Identify entities and create ER, (entities, relationships, attributes, cardinality, total/partial participation)
Map ER Diagram to DB Tables
Normalize the Design (BCNF, FD)
Beyond Relational Databases:
Data warehouse
Data marts
OLAP
Data Mining
Managing Data Resources
Information Policy
Ensuring Data Quality
Why Understanding IT is important
Hardware Components
Processor
Main Memory
Secondary Storage
Input Devices
Output Devices
Communication Devices
Measuring the Amount of Data:
bit vs byte
bandwidth
The processor
word size
64-bit architecture
backwards compatibility
efficiency vs speed
operations
executing an instruction
processor caches (memory vs speed)
multicore processors (ex. two-core)
processing power in clock speed
Components:
Program Counter (PC)
Instruction Register (IR)
Arithmetic Logic Unit (ALU)
Registers
Control Unit
Cache
Memory Hierarchy
Speed vs capacity chart
Type types of RAM: SRAM and DRAM
Types of Memory
Main memory: registers, caches, and RAM
Secondary Storage
Secondary Storage
How hard drives work: platter, RPM, actuator arm, read/write heads
Mean time between failures
annualized failure rate
SSDs: pros and cons
Hybrid drives
Optical drives
Accessing Performance: price per GB, capacity, bandwidth, durability
Improving Performance
Adding RAM improve performance?
Monitor RAM you are using.
Specialty Computers
Mainframes: hot swap
Supercomputers
Microcontrollers
Evolution of IT Infrastructure
Stages:
Mainframe
Personal Computers
Clients/Servers
Enterprise Computing
Cloud and mobile computing
Client/Server vs P2P
Drivers of Technology
Drivers:
Moore's law
Law of mass digital storage
Metcalfe's law
Declining Communication Costs
Creation of standards
Infrastructure Components
Components:
Computer hardware platforms
Operating System Platforms
Enterprise Applications
Data Management and Storage (RAID)
Network and Telecom Platforms
Internet Platforms
Service Platform
For 5, the following are important to understand:
network
hub
bridge
switch
router
firewall
NIC
NOC
Contemporary Hardware Trends
Trends:
Mobile Digital Platform
Consumerization of IT and BYOD
Grid Computing
Virtualization
Load balancing, cloud computing, and on-demand computing
Green computing
High performance and power-saving processors
Autonomic computing
Future Trends
nanotechnology
quantum computing
Contemporary Software Trends
Open-Source Software
HTML and HTML5
Web Services and SOA
Software Outsourcing
Management Issues
Issues
Dealing with Change
Management and Governance
Infrastructure Investments:
a) Total cost of ownership
b) Competitive Forces
A
A
Service/Outcome
Business
Business Functions
Business Processes
D1: A
Monitor ths.
D2: A
Middle
Implement plans of
Senior
$$
Important Notes
IT => meeting objectives, IS => helping make decisions
Operational
Be able to describe the first 4 in Process section
Government and regulations also important.
Hash function guarantees that message came from sender.
Tool 3
Tool 6: Sample Audit