-
Information age
When infinite quantities of facts are widely available to anyone who can use a computer.
-
Data
Raw facts that describe the characteristics of an event or object.
-
Information
Is data converted into a meaningful and useful context.
-
Variable
Is a data characteristic that stands for a value that changes or varies over time.
-
Business Intelligence (BI)
Is information collected from multiple sources such as suppliers, customers, competitors, partners, and industries that analyzes patterns, trends, and relationships for strategic decision making.
-
Knowledge
Includes the skills, experience, and expertise, coupled with information and intelligence, that creates a person's intellectual resources.
-
Knowledge Workers
Are individuals valued for their ability to interpret and analyze information.
-
Accounting
Records, measures, and reports monetary transactions
-
Finance
Deals with strategic financial issues including money, banking, credit, investments, and assets
-
Marketing
Supports sales by planning, pricing, and promoting goods or services
-
Operations Management
Manages the process of converting or transforming or resources into goods or services
-
Sales
Performs the function of selling goods or services
-
Production
The process where a business takes raw materials and processes them or converts them into a finished product for its goods or services.
-
Productivity
The rate at which goods and services are produced based upon given total inputs.
-
System Thinking
A way of monitoring the entire system by viewing multiple inputs being processed or transformed to produce outputs while continuously gathering feedback on each part.
-
Feedback
Information that returns to its original transmitter (input, transform, or output) and modifies the transmitter's actions.
-
Management Information Systems (MIS)
A business function, like accounting and hr, which moves information about people, products, and processes across the company to facilitate decision making and problem solving.
-
Business strategy
A leadership plan that achieves a specific set of goals or objectives
-
First-mover advantage
Occurs when a company can significantly increase its market share by being first with a new competitive advantage.
-
Competitive Intelligence
The process of gathering information about the competitive environment, including competitors' plans, activities, and products, to improve a company's ability to succeed.
-
Porter's Five Forces Model
Analyzes the competitive forces within the environment in which a company operates to assess the potential for profitability in an industry.
- 1) Threat of Substitute Products or Services
- (the power of the customers to purchase alternatives)
2) Supplier Power (the power of suppliers to drive up prices of materials)
3) Threat of New Entrants (the power of competitors to enter a market)
4) Buyer Power (the power of customers to drive down prices)
5) Rivalry among Existing Competitors (The power of competitors)
-
Switching costs
Costs that make customers reluctant to switch to another product or service.
-
Supply chain
Consists of all parties involved, directly or indirectly, in obtaining raw materials or a product.
-
Product differentiation
Occurs when a company develops unique differences in its products or services with the intent to influence demand.
-
Business process
A standardized set of activities that accomplish a specific task, such as processing a customer's order.
-
Value chain analysis
Views a firm as a series of business processes that each add value to the product or service.
-
Primary value activities
Shown at the bottom of the value chain, acquire raw materials and manufacture, deliver, market, sell, and provide after-sales services.
-
Inbound logistics
Acquires raw materials and resources and distributes to manufacturing as required
-
Operations
Transforms raw materials or inputs into goods and services.
-
Outbound logistics
Distributes goods and services to customers.
-
Marketing and sales
Promotes, prices, and sells products to customers.
-
Service
Provides customer support after the sale of goods and services.
-
Support value activities
Along the top of the value chain, include firm infrastructure, hr management, technology development, and procurement. These support the primary value activities.
-
Firm infrastructure
Includes the company format or departmental structures, environment, and systems.
-
Technology development
Applies MIS to processes to add value
-
Procurement
Purchases inputs such as raw materials, resources, equipment, and supplies.
-
Chief Security Officer (CSO)
Responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hackers and viruses.
-
Chief Technology Officer (CTO)
Responsible for ensuring the speed, accuracy, availability, and reliability of the MIS.
-
Chief Privacy Officer (CPO)
Responsible for ensuring the ethical and legal use of information within a company.
-
Chief Information Officer (CIO)
Responsible for 1) overseeing all uses of MIS and 2) ensuring that MIS strategically aligns with business goals and objectives.
-
Chief Knowledge Officer (CKO)
Responsible for collecting, maintaining, and distributing company knowledge.
-
Three common tools managers use to analyze competitive intelligence and develop competitive advantage:
1) The Five Forces Model (for evaluating industry attractiveness)
2) The three generic strategies (for choosing a business focus)
3) Value chain analysis (for executing business strategies)
-
Three generic strategies for entering a new market:
1) Broad cost leadership
2) Broad differentiation
3) Focused strategy (niche)
-
Decision making process:
- *Problem identification
- *Data collection
- *Solution generation
- *Solution test
- *Solution selection
- *Solution implementation
-
Analytics
The science of fact-based decision making
-
Decision-making essentials at the operational level:
Employees develop, control, and maintain core business activities required to run the day-to-day operations.
-
Structured decisions
Operational decisions are considered structured decisions, which arise in situations where established processes offer potential solutions.
-
Decision-making essentials at the managerial level:
Employees are continuously evaluating company operations to hone the firm's abilities to identify, adapt to, and leverage change.
-
Semistructured decisions
Managerial decisions are considered semistructured decisions; they occur in situations in which a few established processes help to evaluate potential solutions, but not enough to lead to a definite recommended decision.
-
Decision-making essentials at the strategic level:
Managers develop overall business strategies, goals, and objectives as part of the company's strategic plan.
-
Unstructured decisions
Strategic decisions are highly unstructured decisions, occurring in situations in which no procedures or rules exist to guide decision makers toward the correct choice.
-
Project
A temporary activity a company undertakes to create a unique product, service, or result.
-
Metrics
Measurements that evaluate results to determine whether a project is meeting its goals.
-
2 core metrics:
- *Critical success factors (CSF)
- *Key performance indicators (KPI)
-
Critical Success Factors (CSF)
The crucial steps companies perform to achieve their goals and objectives and implement their strategies.
-
Key Performance Indicators (KPI)
The quantifiable metrics a company uses to evaluate progress toward critical success factors.
-
Market share
The proportion of the market that a firm captures.
-
Effectiveness MIS metrics
Measure the impact MIS has on business processes and activities, including customer satisfaction and customer conversion rates.
Usability, customer satisfaction, conversion rates, financial
-
Efficiency MIS Metrics
Measure the performance of MIS itself, such as throughput, transaction speed, system availability information accuracy, and response time.
-
Throughput
The amount of information that can travel through a system at any point in time.
-
Transaction speed
The amount of time a system takes to perform a transaction.
-
System availability
The number of hours a system is available for users.
-
Information accuracy
The extent to which a system generates the correct result when executing the same transaction numerous times.
-
Response time
The time it takes to respond to user interactions such as a mouse click
-
Usability
The ease with which people perform transactions and/or find information.
-
Customer satisfaction
Measured by satisfaction surveys, percentage of existing customers retained, and increases in revenue dollars per customer.
-
Conversion rates
The number of customers an organization "touches" for the first time and persuades to purchase its products or services. This is a popular metric for evaluating the effectiveness of banner, pop-up, and pop-under ads on the Internet.
-
Financial effectiveness metrics
Such as ROI, cost-benefit analysis, and break-even analysis.
-
Operational Support Systems:
- Transactional information
- Online transaction processing (OLTP)
- Transaction processing system (TPS)
-
Transactional information
Encompasses all the information contained within a single business process or unit of work, and its primary purpose is to support the performance of daily operational or structured decisions.
-
Online transaction processing (OLTP)
The capture of transaction and event information using technology to 1) process the information according to defined business rules, 2) store the information, and 3) update existing information to reflect the new information.
-
Transaction processing system (TPS)
The basic business system that serves the operational level (analysts) and assists in making structured decisions.
-
Source documents
The original transaction record
-
Managerial Support Systems:
- Analytical information
- Online analytical processing (OLAP)
- Decision support systems (DSSs)
- What-if analysis
- Sensitivity analysis
- Goal-seeking analysis
- Optimization analysis
-
Analytical information
Encompasses all organizational information, and its primary purpose is to support the performance of managerial analysis or semistructured decisions.
-
Online analytical processing (OLAP)
The manipulation of information to create business intelligence in support of strategic decision making.
-
Decision support systems (DSSs)
Model information using OLAP, which provides assistance in evaluating and choosing among different courses of action.
-
What-if analysis
Checks the impact of a change in a variable or assumption on the model.
-
Sensitivity analysis
A special case of what-if analysis, is the study of the impact on other variables when one variable is changed repeatedly.
-
Goal-seeking analysis
Finds the inputs necessary to achieve a goal such as a desired level of output.
-
Optimization analysis
An extension of goal-seeking analysis, finds the optimum value for a target variable by repeatedly changing other variables, subject to specified constraints.
-
Strategic Support Systems:
- Executive information system (EIS)
- Visualization
- Consolidation
- Drill-down
- Slice-and-Dice
-
Executive information system (EIS)
A specialized DSS that supports senior-level executives and unstructured, long-term, nonroutine decisions requiring judgement, evaluation, and insight.
-
Granularity
Refers to the level of detail in the model or the decision-making process.
-
Visualization
Produces graphical displays of patterns and complex relationships in large amounts of data.
-
Digital dashboard
Tracks KPIs and CSFs by compiling information from multiple sources and tailoring it to meet user needs.
-
Consolidation
The aggregation of data from simple roll-ups to complex groupings of interrelated information.
-
Drill-down
Enables users to view details, and details of details, of information.
-
Slice-and-Dice
The ability to look at information from different perspectives.
-
Artificial intelligence systems:
- Expert systems - playing chess
- Neural networks - credit card companies checking for fraud
- Genetic Algorithms - investment companies in trading decisions
- Intelligent agents - environmental scanning and competitive intelligence
- Virtual reality - working virtually around the globe
-
Intelligent systems
Various commercial applications of artificial intelligence.
-
Expert systems
Computerized advisory programs that imitate the reasoning processes of experts in solving difficult problems.
-
Neural netowrk
AKA artificial neural network, is a category of AI that attempts to emulate the way the human brain works. Neural networks analyze large quantities of information to establish patterns and characteristics in situations where the logic or rules are unknown.
-
Fuzzy logic
A mathematical method of handling imprecise or subjective information. The basic approach is to assign values between 0 and 1 to vague or ambiguous information (0 = info not included, 1 = inclusion or membership)
-
Genetic algorithms
An artificial intelligence system that mimics the evolutionary.
-
Mutation
The process within a genetic algorithm of randomly trying combinations and evaluating the success (or failure) of the outcome.
-
Intelligent agent
A special-purpose knowledge-based information system that accomplishes specific tasks on behalf of its users.
-
Shopping bot
A software that will search several retailer websites and provide a comparison of each retailer's offerings including price and availability.
-
Augmented reality
A computer-simulated environment that can be a simulation of the real world or an imaginary world.
-
Customer-facing processes
Aka Front-office processes, result in a product or service received by an organization's external customer. Include fulfilling orders, communicating with customers, and sending out bills and marketing information.
-
Business-facing processes
Aka back-office processes, are invisible to the external customer but essential to the effective management of the business; they include goal setting, day-to-day planning, giving performance feedback and rewards, and allocating resources.
-
Business process patent
A patent that protects a specific set of procedures for conducting a particular business activity.
-
Core processes
Business processes, such as manufacturing goods, selling products, and providing service, that make up the primary activities in a value chain.
-
Business process modeling (or mapping)
The activity of creating a detailed flowchart or process map of a work process that shows its inputs, tasks, and activities in a structured sequence.
-
Business process model
A graphic description of a process, showing the sequence of process tasks, which is developed for a specific purpose and from a selected viewpoint.
-
As-Is process models
Represents the current state of the operation that has been mapped, without any specific improvements or changes to existing processes.
-
To-Be process models
Show the results of applying change improvement opportunities to the current (As-Is) process model.
-
Swim lane
The swim lane layout arranges the steps of a business process into a set of rows depicting the various elements.
-
Workflow
Includes the tasks, activities, and responsibilities required to execute each step in a business process.
-
Business process improvement
Attempts to understand and measure the current process and make performance improvements accordingly.
-
Automation
The process of computerizing manual tasks, making them more efficient and effective and dramatically lowering operational costs.
-
Streamlining
Improves business process efficiencies by simplifying or eliminating unnecessary steps.
-
Bottlenecks
Occur when resources reach full capacity and cannot handle any additional demands; they limit throughput and impede operations.
-
Redundancy
Occurs when a task or activity is unnecessarily repeated, for example, if both the sales department and the accounting department check customer credit.
-
Cycle time
The time required to process an order, is a common KPI for operations management.
-
Business process reengineering (BPR)
The analysis and redesign of workflow within and between enterprises.
-
Business process management (BPM) systems
Focus on evaluating and improving processes that include both person-to-person workflow on evaluating and improving processes that include both person-to-person workflow and system-to-system communications.
-
Digital Dawinism
Implies that organizations that cannot adapt to the new demands placed on them for surviving in the information age are doomed to extinction.
-
Disruptive technology
A new way of doing things that initially does not meet the needs of existing customers.
-
Sustaining technology
Produces an improved product customers are eager to buy, such as a faster car or larger hard drive.
-
Hypertext markup language (HTML)
Links documents, allowing users to move from one to another simply by clicking on a hot spot or link.
-
Hypertext transport protocol (HTTP)
The Internet protocol web browsers use to request and display web pages using universal resource locators.
-
Universal resource locator (URL)
The address of a file or resource on the web such as www.apple.com is the domain name.
-
Applet
A program that runs within another application such as a website.
-
Web 1.0 (or Business 1.0)
A term to refer to the World Wide Web during its 1st few years of operation between 1991 and 2003
-
Difference between Ecommerce and Ebusiness
Ecommerce refers only to online transactions and Ebusiness includes Ecommerce along with all activities related to internal and external business operations such as servicing customer accounts.
-
Paradigm shift
Occurs when a new radical form of business enters the market that reshapes the way companies and organizations behave.
-
Information richness
Refers to the depth and breadth of details contained in a piece of textual, graphic, audio, or video information.
-
Information reach
Measures the number of people a firm can communicate with all over the world.
-
Mass customization
The ability of an organization to tailor its products or services to the customers' specifications.
-
Personalization
Occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal to that person, say by tailoring its website to individuals or groups based on profile information, demographics, or prior transactions.
-
Long tail
Chris Anderson, editor-in-chief of Wired magazine, describes niche-market ebusiness strategies as capturing the long tail, referring to the tail of a typical sales curve.
-
Intermediaries
Agents, software, or businesses that provide a trading infrastructure to bring buyers and sellers together.
-
Disintermediation
The introduction of ebusiness brought about disintermediation, which occurs when a business sells directly to the customer online and cuts out the intermediary.
-
Reintermediation
Here steps are added to the value chain as new players find ways to add value to the business process.
-
Cybermediation
Refers to the creation of new kinds of intermediaries that simply could not have existed before the advent of ebusiness, including comparison shopping sites such and bank account aggregation services such as Citibank.
-
Interactivity
Measures advertising effectiveness by counting visitor interactions with the target ad, including time spent viewing the ad, number of pages viewed, and number of repeat visits to the advertisement.
-
Associate (affiliate) program
Allows a business to generate commissions or referral fees when a customer visiting the website clicks on a link to another merchant's website.
-
Banner ad
A box running across a website that advertises the products and services of another business.
-
Click-through
A count of the number of people who visit one site and click on an advertisement that takes them to the site of the advertiser.
-
Cookie
A small file deposited on a hard drive by a website containing information about customers and their browsing activities.
-
Viral marketing
A technique that induces websites or users to pass on marketing message to other websites or users, creating exponential growth in the message's visibility and effect.
-
Clickstream data
Through this they can observe the exact pattern of consumer's navigation through a site.
-
Ebusiness model
A plan that details how a company creates, delivers, and generates revenues on the Internet.
-
Dot-com
The original term for a company operating on the internet.
-
Content providers
Generate revenues by providing digital content such as news, music, photos, or videos.
-
Infomediaries
Provide specialized information on behalf of producers of goods and services and their potential customers.
-
Online marketplace
Bring together buyers and sellers of products and services (like ebay and amazon)
-
Portals
Operate central website for users to access specialized content and other services.
-
Service providers
Provide services such as photo sharing, video sharing, online backup and storage (mapquest, youtube)
-
Transaction brokers
Process online sales transactions
-
Internet Service Provider (ISP)
A company that provides access to the internet for a monthly fee (AT&T)
-
Podcasting
Converts an audio broadcast to a digital music player.
-
Content management systems (CMS)
Help companies manage the creation, storage, editing, and publication of their website content.
-
Taxonomy
The scientific classification of organisms into groups based on similarities of structure or origin.
-
Information architecture
is the set of ideas about how all information in a given context should be organized.
-
Web 2.0 (or Business 2.0)
The next generation of internet use - a more mature, distinctive communications platform characterized by new qualities such as collaboration, sharing, and free.
-
4 Characteristics of Web 2.0
- 1. Content sharing through open sourcing
- 2. User-contributed content
- 3. Collaboration inside the organization
- 4. Collaboration outside the organization
-
Open system
consists of nonproprietary hardware and software based on publicly known standards that allows third parties to create add-on products to plug into or interoperate with the system.
-
Source code
Contains instructions written by a programmer specifying the actions to be performed by computer software.
-
Open source
Refers to any software whose source code is made available free for any third party to review and modify.
-
User-contributed content (or user-generated content)
Created and updated by many users (like wikipedia and youtube)
-
Reputation system
One of the most popular forms of user-generated content where buyers post feedback on sellers.
-
Collaboration system
A set of tools that supports the work of teams or groups by facilitating the sharing and flow of information.
-
Collective intelligence
Is collaborating and tapping into the core knowledge of all employees, partners, and customers.
-
Knowledge management (KM)
- The most common form of collective intelligence found inside the organization is knowledge management which involves capturing, classifying, evaluating, retrieving, and sharing information assets in a way that provides context for effective decisions and actions.
-
Knowledge management system (KMS)
Supports the capturing, organization, and dissemination of knowledge (ie know-how) throughout an organization.
-
Explicit knowledge
Consists of anything that can be documented, archived, and codified, often with the help of MIS
-
Tacit knowledge
The knowledge contained in people's heads.
-
Crowdsourcing
Refers to the wisdom of the crowd (most common form of collective intelligence found outside the organization).
-
Asynchronous communications
Communication such as email in which the message and the response do not occur at the same time.
-
Synchronous communication
Communication that occurs at the same time such as IM or chat.
-
Social networking analysis (SNA)
Maps group contacts (personal and professional) identifying who knows each other and who works together.
-
Folksonomy
Similar to taxonomy except that crowdsourcing determines the tags or keyword-based classification system.
-
Social bookmarket
Allows users to share, organize, search, and manage bookmarks.
-
Microblogging
The practice of sending brief posts (140-200 characters) to a personal blog, either publicly or to a private group of subscribers who can read the posts as IMs or as a text msgs.
-
Real Simple Syndication (RSS)
A web format used to publish frequently updated works, such as blogs, news headlines, audio, and video, in a standardized format.
-
Network effect
describes how products in a network increase in value to users as the number of users increases.
-
Mashup
A website or web application that uses content from more than one source to create a completely new product or service.
-
Application programming interface (API)
A set of routines, protocols, and tools for building software applications. A programmer then puts these building blocks together.
-
Semantic web
A component of Web 3.0 that describes things in a way that computers can understand.
-
Egovernment
Involves the use of strategies and technologies to transform governments by improving the delivery of services and enhancing the quality of interaction between the citizen-consumer within all branches of government.
-
Mobile business (or mbusiness, mcommerce)
The ability to purchase goods and services through a wireless internet-enabled device.
-
Information ethics
Govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself (with or without the aide of computer technology)
-
Digital rights management
A technological solution that allows publishers to control their digital media to discourage, limit, or prevent illegal copying and distribution.
-
Information management
Examines the organizational resource of information and regulates its definitions, uses, value, and distribution ensuring it has the types of data/information required to function and grow effectively.
-
Information governance
A method or system of government for information management or control.
-
Information compliance
is the act of conforming, acquiescing, or yeilding information
-
Information property
An ethical issue that focuses on who owns information about individuals and how information can be sold that focuses on who owns information about individuals and how information can be sold and exchanged.
-
Ediscovery
Refers to the ability of a company to identify, search , gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry.
-
Child Online Protection Act (COPA)
Passed to protect minors from accessing inappropriate material on the internet.
-
Click-fraud
The abuse of pay-per-click, pay-per-call, and pay-per-conversion revenue models by repeatedly clicking on a link to increase charges or costs for the advertiser.
-
Competitive click-fraud
A computer crime where a competitor or disgruntled employee increases a company's search advertising costs by repeatedly clicking on the advertiser's link.
-
Acceptable use policy (AUP)
Requires a user to agree to follow it to be provided access to corporate email, information systems, and the internet.
-
Nonrepudiation
A contractual stipulation to ensure that ebusiness participants do not deny (repudiate) their online actions.
-
Cybervandalism
The electronic defacing of an existing website.
-
Typosquatting
A problem that occurs when someone registers purposely misspelled variations of well-known domain names.
-
Website name stealing
the theft of a website's name that occurs when someone, posing as a site's administrator, changes the ownership of the domain name assigned to the website to another website owner.
-
Mail bomb
Sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning.
-
Teergrubing
An antispamming approach where the receiving computer launches a return attach against the spammer, sending email messages back to the computer that originated the suspected spam.
-
Workplace MIS monitoring
Tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.
-
Downtime
Refers to a period of time when a system is unavailable
-
Drive-by hacking
A computer attach where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.
-
Adware
Allows internet advertisers to display advertisements without the consent of the computer user.
-
Spyware
A special class of adware that collects data about the user and transmits it over the internet without the user's knowledge or permission.
-
Black-hat hackers
Break into other people's computer systems and may just look around or may steal and destroy information
-
Crackers
Have criminal intent when hacking
-
Script kiddies or script bunnies
Find hacking code on the internet and click-and-point their way into systems to cause damage or spread viruses.
-
White-hat hackers
Work at the request of the system owners to find system vulnerabilities and plug the holes.
-
Backdoor programs
Open a way into the network for future attacks
-
Denial-of-service attack (DoS)
Attacks from multiple computers that flood a website with so many requests for service that it slows down or crashes.
-
Polymorphic viruses and worms
Change their form as the propagate
-
Trojan-horse virus
ides inside other software, usually as an attachment or a downloadable file.
-
Worm
Spreads itself, not only from file to file, but also from computer to computer. Worms do not need to attach themselves to anything to spread (like a virus does).
-
Spyware
A special class of adware that collects data about the user and transmits it over the internet without the user's knowledge or permission.
-
Elevation of privilege
A process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system.
-
Hoaxes
Attack computer systems by transmitting a virus hoax, with a real virus attached. By masking the attack in a seemingly legitimate message, unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends, infecting many users along the way
-
Malicious code
Includes a variety of threats such as viruses, worms, and trojan horses
-
Packet tampering
Consists of altering the contents of packets as they travel over the internet or altering data on computer disks after penetrating a network.
-
Sniffer
A program or device that can monitor data traveling over a network.
-
Spoofing
The forging of the return address on an email so that the message appears to come from someone other than the actual sender.
-
Splogs (spam blogs)
Fake blogs created solely to raise the search engine rank of affiliated websites.
-
Insiders
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
-
Social engineering
Through this hackers use their social skills to trick people into revealing access credentials or other valuable information.
-
Information security plan
Details how an organization will implement the information security policies.
-
Information secrecy
The category of computer security that addresses the protection of data from unauthorized disclosure and confirmation of data source authenticity.
-
Phishing
A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate businesses.
-
Phishing expedition
Is a masquerading attack that combines spam with spoofing.
-
Spear phishing
A phishing expedition in which the emails are carefully designed to target a particular person or organization.
-
Vishing (or voice phishing)
A phone scam that attempts to defraud people by asking them to call a bogus telephone number to "confirm" their account information.
-
Zombie
A program that secretly takes over another computer for the purpose of launching attacks on other computers.
-
Zombie farm
A group of computers on which a hacker has planted zombie programs.
-
Pharming attack
Uses a zombie farm, often an organized crime association, to launch a massive phishing attack.
-
Cryptography
The science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them.
-
Advanced encryption standard (AES)
- The National Institute of Standards and Technology (NIST) introduced an AES designed to keep government information secure.
-
Public key encryption (PKE)
This uses 2 keys: a public key that everyone can have and a private key for only the recipient.
-
Certificate authority
A trusted 3rd party that validates user identities by means of digital certificates (like VeriSign)
-
Digital certificate
A data file that identifies individuals or organizations online and is comparable to a digital signature.
-
Firewall
Hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings.
-
Intrusion detection software (IDS)
Features full-time monitoring tolls that search for patterns in network traffic to identify intruders.
|
|