How organizations should respond to security incidents

Assignment Help Management Information Sys
Reference no: EM131111214

Question 1. A(n) ____________ is a network of activities that generate value by transforming inputs into outputs.

business process

competitive strategy

linkage

information system
 
Question 2. Which of the following factors determines the structure, features, and functions of an information system used in a company?

The competitive strategy

The value of its brands

The size of the company

The technology used by competitors
 
Question 3. According to Porter's model of business activities, interactions across value chain activities are called ____________ .

support activities

triggers

linkages

cross-functionalities

Question 4. Which of the following is NOT a part of the five components of an information system for collaboration?

Hardware

Software

Data

Procedures

People

Information

Question 5. Which of the following is the most important trait that an effective collaborator should have?

Avoiding unpopular ideas

Persuasive presentation skills

Willingness to enter into difficult conversations

Previous experience as a collaborator

Question 6. Describe the process by which organizations develop their information systems.

Your response should be at least 200 words in length.

Question 7. Explain the differences between cooperation and collaboration, and then discuss the criteria for successful collaboration. Use examples as needed. Your response should be at least 200 words in length.

Question 8. Which of the following refers to a small, portable storage device that can be used to back up data and to transfer it from one computer to another?

Thumb drive

Projector

Mouse

Barcode scanner

Question 9. Which of the following is an advantage to an organization if its BYOD policy offers wireless network to mobile devices?

The organization can sniff employees' mobile traffic.

Employees gain public access from any device, not just mobile devices.

The policy appears to be permissive without actually being so.

Employees resist turning over the management of their own hardware to the organization.

Question 10. A ____________ is a small, lightweight, power-conserving, computing device that is capable of wireless access.

PC

mainframe computer

server

mobile device

Question 11. A database is required instead of a spreadsheet when ____________ .

professionals need to keep a track of things

a user requires control over data

lists involve data with multiple themes

one or more users want to access the same data

Question 12. Which of the following statements is true of closed source projects?

Only users and developers are allowed to alter the source code in closed source projects.

Anyone can obtain the source code for a closed source project.

Only trusted programmers are allowed to make changes to a closed source project.

Programmers can alter the closed source code based on their interests and goals.

Question 13. Explain what mobile devices are and why mobile systems are important. Give examples of mobile devices, and, if applicable, name a mobile device you use and why you use it.

Your response should be at least 200 words in length.

Question 14. Describe a DBMS and its functions. List, at minimum, three of the popular DBMS products and give a brief description of each.

Your response should be at least 200 words in length.

Question 15. A computer ____________ is a collection of computers that communicate with one another over transmission lines or wirelessly.

database

application

network

server

Question 16. Computers that reside in different geographic locations are connected using a(n) ____________ .

WAN

LAN

URL

XML

Question 17. Compared to in-house hosting, cloud-based hosting ____________ .

provides better vision of disaster preparedness capabilities

minimizes the risk of investing in technology that will soon become obsolete

provides greater control over the location of data

requires a significant amount of capital

Question 18. ____________ is a suite of applications called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform.

Enterprise resource planning

Customer relationship management

Enterprise application integration

Business process reengineering

Question 19. In cloud computing, resources are said to be "pooled" because organizations ____________ .

use the public Internet to create the appearance of a private connection

use open source standards that enable users to modify a program's source code

offer their services to each other free of charge, in a give-and-take arrangement

share the same physical hardware through virtualization

Question 20. Explain what an information silo is and discuss the fundamental problems of information silos. Close the discussion by explaining how this problem can be remedied.

Your response should be at least 200 words in length.

Question 21. Explain what is meant by computer network and describe the various types of networks.

Your response should be at least 200 words in length.

Question 22. Which of the following statements is true of social CRM?

Customers likely to generate the most business get the most attention from the organization.

All the customer relationship processes in social CRM are structured and controlled.

Each customer crafts his or her own relationship with the company.

Though relationships emerge from joint activity, companies control the customers.

Question 23. ____________ is the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it.

Intellectual property protection

Knowledge management

Business process reengineering

Repository management

Question 24. ____________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction.

Data optimization

Database normalization

Data mining

Data warehousing

Question 25. Web 2.0 refers to Web-delivered services and content paid for by ____________ .

SM sponsors

users

advertisers

investors

Question 26. ____________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data.

Data entry

Data acquisition

Data mining

Data encryption

Question 27. What is knowledge management and what are its primary benefits?

Your response should be at least 200 words in length.

Question 28. Define social media and social media information systems. Name the three SMIS organizational roles.

Your response should be at least 200 words in length.

Question 29. Rapid application development, the unified process, extreme programming, and scrum have led to ____________ .

the waterfall method

the swim-lane method

agile development

SDLC

Question 30. A ____________ shows the tasks, dates, and dependencies for the tasks of a project.

scatter plot

Gantt chart

Pareto chart

control chart

Question 31. The first step in the system definition phase of the systems development life cycle (SDLC) is to ____________ .

plan the project

conduct a feasibility study

determine the goals and scope

form the project team
 
Question 32. Project teams create a ____________, which is a hierarchy of the tasks required to complete a project.

critical path

work breakdown structure

scatter plot

control chart

Question 33. The SDLC process follows a linear sequence from requirements to design to implementation. Therefore, the SDLC process is also known as the ____________ .

waterfall method

swim-lane method

scrum process

agile development method

Question 34. Discuss some of the key aspects to developing successful process and systems development projects.

Your response should be at least 200 words in length.

Question 35. What are the phases of the systems development life cycle (SDLC)?

Your response should be at least 200 words in length.

Question 36. The responsibilities of a ____________ include advising the chief information officer, executive group, and project managers on emerging technologies.

technical writer

chief financial officer

system analyst

chief technology officer
 
Question 37. ____________ is the process of hiring another organization to perform a service.

Merging

Outsourcing

Headhunting

Diversifying

Question 38. In the IS department, the ____________ group manages the process of creating new information systems as well as maintaining existing information systems.

operations

technology

development

outsourcing relations
 
Question 39. A ____________ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine test plans.

system analyst

business analyst

user support representative

systems auditor
 
Question 40. Every IS user has a right to a secure computing environment. This means that:

The organization should protect his/her computer and its files

The user should solely be in charge of protecting the organization's computers and files

The user should inform the IS about software upgrades

The user will never face a network problem

Question 41. Describe the major functions of the IS department.

Your response should be at least 200 words in length.

Question 42. Explain what is meant by outsourcing. Explain the management advantages of outsourcing.

Your response should be at least 200 words in length.

Question 43. Which of the following is classified as a technical safeguard?

Cookies

Firewalls

Key escrow

Passwords
 
Question 44. When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of ____________ .

unauthorized data disclosure

incorrect data modification

faulty services

loss of infrastructure

Question 45. ____________ is the term used to denote viruses, worms, and Trojan horses.

Malware

Cookie

Firewall

Spam

Question 46. ____________ present the largest risk for an organization's infrastructure loss.

Employees

Natural disasters

Hackers

Competitors

Question 47. A(n) ____________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.

intrusion detection system

keylogger

botnet

access control system

Question 48. Explain how organizations should respond to security incidents. Provide an example to support your answer.

Your response should be at least 200 words in length.

Question 49. Define threat, vulnerability, safeguard, and target. Support your answer with examples.

Your response should be at least 200 words in length.

Unit VIII Research Paper

Utilizing the unit lessons, textbook, CSU Online Library, and other outside sources, write a two-page (not including title and reference pages)

Research Paper identifying the key components of information systems management discussed throughout this course.

Provide a description of an organization you are familiar with (possibly a company you have worked for in the past or are currently working for) and describe briefly what services they contribute. Then, select three out of the six questions below, and provide detailed answers, supporting those answers by referencing any sources used. Be sure to use examples from your research to strengthen your argument as needed.

• What personal knowledge management tools does this organization utilize?

• What steps has this organization taken in securing their information and knowledge?

• What has this organization done to gain and sustain an advantage over their competitors?

• Describe in detail how this organization manages the components of its IT infrastructure.

• In what ways does the organization demonstrate successful collaboration?

• Identify at least two types of hardware and two types of software used by this organization.

APA rules for formatting, quoting, paraphrasing, citing, and listing of sources are to be followed.

Information about accessing the Blackboard Grading Rubric for this assignment is provided below.

Reference no: EM131111214

Questions Cloud

Give a descriptive measure of model adequacy : Refer to the Interfaces (Mar.-Apr. 1990) study of La Quinta Motor Inns, Exercise 10.13 (p. 578).The researchers used state population per inn (x1), inn room rate (x2), median income of the area (x3), and college enrollment ( x4) to build a first-o..
Definition of demand and the law of demand : In detail, explain how the 5 variables/determinants of Demand, Be sure to relate your explanations back to the definition of Demand and the Law of Demand.
Create several new generic movement methods : Create several new generic movement methods
How can the formula for the future value of an annuity : How can the formula for the future value of an annuity be modified to find the future value of an annuity due?
How organizations should respond to security incidents : What steps has this organization taken in securing their information and knowledge? What has this organization done to gain and sustain an advantage over their competitors?
An important goal in occupational safety : An important goal in occupational safety is "active caring." Employees demonstrate active caring (AC) about the safety of their co-workers when they identify environmental hazards and unsafe work practices and then implement appropriate corrective..
Sources of the economies of scale : Under Lists, click on "Global 2000 Leading Companies" to see the list of the world's largest firms. View the complete list. From the list, select two firms from two different industries and discuss the likely sources of the economies of scale that..
Efficient ways to calculate the present value of an ordinary : What are the most efficient ways to calculate the present value of an ordinary annuity?
Sale of guns changed since : How has the sale of guns changed since the 9/11 attacks? Approximately how many guns are there currently in the US?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Concerning privacy the united statesa provides a great deal

concerning privacy the united statesa. provides a great deal of legislation that purports to offer some privacy

  Prepare an executive summary document to board of directors

You will need to prepare an executive summary document (1 page maximum) to the board of directors

  Focus on the concept of information systems

Describe an organization of your choice. You will use this organization as you focus on the concept of information systems

  Discuss the history of hipaa

Discuss the history of HIPAA

  Show the threat of open source software

Comment on open source software - How is Microsoft and other software manufacturers combating the threat of open source software and other free tools that compete

  Multidimensional analysis data versus information1 how can

multidimensional analysis data versus information1. how can you use a relational database to store data be specific.2.

  Show components of an information systems functional area

Components of an Information Systems Functional Area - Explain of each of the departments and Clarify the major role each department plays with IS.

  What are the benefits and risks of cloud computing

What are the benefits and risks of cloud computing? Do you use a cloud to store any of your files or photographs? Does your employer use a cloud to store files or sensitive documents? Don't be quick to say 'no' - do a little research and leg work..

  Why supply chain management is important

Provide at least three reasons why supply chain management is an important part of the value delivery network.

  Requirements for entry into the apple app store

Provide a description of the requirements for entry into the Apple App Store. This is for an app that finds healthcare providers based on user search criteria

  Explain the attributes of image coding

Explain the attributes of image coding and what each contributes to the presentation of your image, and why you might use an alt attribute to display a text alternative to an image

  Explain differences between cooperation and collaboration

Explain the differences between cooperation and collaboration, and then discuss the criteria for successful collaboration. Use examples as needed.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd