Ch-8: Securing Information Systems
1. Authentication – the process of identifying an individual, usually based on
Password systems
Tokens
Smart cards
Biometric authentication
2. DoS Attack – when hackers flood a network server or Web server with many thousands of false communications or requests for services to crash the network. The network receives so many queries that it cannot keep up with them and is thus unavailable to service legitimate requests.
3. MIS Audit – Examines firm’s overall security environment as well as controls governing individual information systems.
– Reviews technologies, procedures, documentation, training, and personnel.
– May even simulate disaster to test response of technology, IS staff, other employees
– Lists and ranks all control weaknesses and estimates probability of their occurrence
– Assesses financial and organizational impact of each threat
4. Public key infrastructure (PKI) -
– Use of public key cryptography working with certificate authority
– Widely used in e-commerce
Ch-9: Achieving OE and CI: Enterprise Application
5. Demand vs. Supply driven SCM
Push-based model – production schedules are based on forecasts or best guesses of demand for products and products are “pushed” to customers. Pull-based model – demand-driven model, actual customer orders or purchases trigger events in the supply chain.
6. Enterprise resource planning (ERP) - is a business management software—usually a suite of integrated applications—that a company can use to collect, store, manage and interpret data from many business activities.
Material requirements planning (MRP) - is a production planning and inventory control system used to manage manufacturing processes.
Manufacturing resource planning (MRP II) is defined as a method for the effective planning of all resources of a manufacturing company. Ideally, it addresses operational planning in units, financial planning, and has a simulation capability