MIS Exam 3 Spring

Origin of the term "Cloud Computing

-Comes from early days of the internet where we drew the network as a cloud and didn't care where the messages went"
-First cloud around networking (TCP/IP abstraction)
-Second cloud around docs (WWW data abstraction)

Cloud computing:

a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources
-can be rapidly provisioned and released with minimal management effort or service provider interaction

Cloud computing characteristics:

1. On-demand self-service
2. Broad network access
3. Resource pooling (location independence)
4. Rapid elasticity
5. Measured service

Cloud service models:

1. Cloud software as a service (SaaS)
2. Cloud Platform as a service (PaaS)
3. Cloud infrastructure as a service (IaaS)
-To be considered 'cloud' they must be deployed on top of cloud infrastructure that has the key characteristics

Cloud software as a service (SaaS):

Use provider's applications over a network

Cloud Platform as a service (PaaS):

Deploy customer-created applications to a cloud

Cloud infrastructure as a service (IaaS):

Rent processing, storage, network capacity, and other fundamental computing resources

Cloud deployment models:

1. Public Cloud
2. Private cloud
3. Community cloud
4. Hybrid cloud

Public cloud:

Sold to the public, mega-scale infrastructure

Private cloud:

enterprise owned or leased

Community cloud:

shared infrastructure for specific community

Hybrid cloud:

composition of two or more cloud

Common cloud characteristics:

massive scale, homogeneity, virtualization, resilient computing, low cost software, geographic distribution, service orientation, advanced security technologies

Cloud security key issues:

trust, multi-tenancy, encryption, compliance

Multi-Tenancy:

refers to a software architecture in which a single instance of software runs on a server and serves multiple tenants.

Tenant:

a group of users who share a common access with specific privileges to the software instance

General security advantages:

-shifting public data to a external cloud reduces the exposure of the internal sensitive data
-cloud homogeneity makes security auditing/testing simpler
-cloud enable automated security management
-redundancy/ disaster recovery

General security challenges:

-Loss of administrative control: trusting vendor's security model, customer dependent on vendor to respond to audit findings, obtaining support for investigations, indirect admin accountability
-Loss of physical control

Security relevant cloud components:

-Cloud provisioning services
-Cloud data storage services
-Cloud Processing infrastructure
-Cloud Support services
-Cloud Network and perimeter security
-Elastic elements: storage, processing, and virtual networks

Cloud provisioning services:

Pros: rapid reconstitution of services, enables availability, advanced honey net capabilities
Cons: impact of compromising the provisioning service

Cloud data storage services:

Pros: data fragmentation & dispersal (enhances performance), automated replication, provision of data zones (by country), encryption at rest and in transit, automated data retention
Cons: isolation management/ data multi-tenancy, storage controller, expos

Cloud Processing infrastructure:

Pros: ability to secure master images and push out secure images
Cons: Application multi-tenancy (many users of a single software instance), reliance on hypervisors (The software that hosts virtual machines), process isolation/ application sandboxes

Cloud Support services:

Pros: On demand security controls (authentication, logging, firewalls
Cons: Additional risk when intergraded w customer applications, needs certification & accreditation as a separate application , code updates

Cloud Network and perimeter security:

Pros: distributed denial of service (DDOS) protection, virtual network (VLAN) capabilities, perimeter security (IDS, firewall, authentication)
Cons: virtual zoning with application mobility

What stage of the SDLC process would project manager most likely make a "Go/ No Go" decision?

Systems Investigation

When was the world wide web invented and by who?

1989 - Tim Berners-Lee

Why the web evolves: The Web Landscape

-Social Media: Interaction among people where they create, share and exchange info & ideas in virtual communities & networks. Ex: Facebook, twitter, instagram, snapchat

Five Social Media Trends for 2017:

1. Social Messaging
2. The fight against fake news
3. Authentic content
4. Augmented

Why the web evolves: (The web landscape)

Content management systems: software that allows publishing, editing and modifying content from a central interface, providing procedures to manage workflow in a collaborative enviornment (EX: wordpress, joomla)

What's the most critical component of managing website transformation?

Communication

Website Transformation Process: Phase 1: Defining the project

-Team formation, team project management site, development, test & production servers, web surveys, site & content

Website Transformation Process: Phase 2: Developing site structure

-content outline &site map, content analysis, global features & content types, content sharing relationships, user roles, content moderation & workflow

Website Transformation Process: Phase 3: Production

-content creation &revision, primary theme & site production, CMS admin training, site replication & customization

Website Transformation Process: Phase 4: Training, Launch, & Buildout

site buildout & content addition, phased site launch, site archives, project closeout

Website Transformation Process: Phase 5: Site & CMS Maintenance:

site maintenance, CMS & server maintenance, other site conversion, expanded CMS training

What's the most critical component of managing website transformation?

Communication

What type of project management documentation includes information about all of the Triple constraints?

Gantt Chart

3 main obj of IT Strategic Plan:

1. aligned w the org's strategic plan
2. must provide for an IT architecture that seamlessly networks users, apps and databases
3. must efficiently allocate IS development resources among competing projects so they can be completed on time within budget

4 common approaches to cost-benefit analysis:

1. Net present value (NPV)
2. Return on investment (ROI)
3. Breakeven analysis
4. Business case approach

A cost-benefit analysis is related most closely to what type of project management feasibility assessment?

economic

Acquiring IT apps BUY:

Pros: many types available, saves time, don't need to hire special people, vendor updates software frequently, price is lower
Cons: may not meet company's needs, difficult to modify, may not have control over changes, venders may go out of business

Acquiring IT apps LEASE:

Two types:
1. lease from an outsourcer & install it on the company's premises
2. using an application system provider (ASP)

Acquiring IT apps DEVELOPMENT IN-HOUSE:

Two approaches:
1. build from scratch
2. Build from components

Making the adobe creative cloud available to UofA students is an example of what type of approach for software acquisition?

Lease

Systems Development Life Cycle (SDLC) Systems Analysis is the:

process whereby systems analysts examine the business problem that the organization plans to solve with an IS

SDLC: Systems Design:

describes how the system will resolve the business problem
-Deliverable: a set of technical system specifications

What SDLC stage would changes to the systems requirements be the most costly to make?

operation and maintenance

Tools for systems development:

1. Prototyping
2. Integrated computer-assisted software engineering tools (CASE)
3. component-based development
4. object-oriented development

Alternative methods and tools (Systems development):

1. joint app design (JAD)
2. Rapid app development (RAD)
3. Agile development
4. End-user development
5. tools for systems development

Business metrics that describe the performance of critical business activities are known as:

key performance indicators

What type of problem has an optimal solution can be reached through single set of steps based on an algorithm?

structured

A business intelligence tool that uses abstractions such as color and graphical images like instrument gauges to allow executives to grasp business situations quickly is known as a:

digital dashboard

Often presented visually on an executive dashboard, what type of report focuses attention on business processes whose performance falls outside the range of their defined KPI metrics?

exception

A graphical description of a database that describes the way in which an organizations data & business activities are associated with one another is known as _________:

an entity relationship diagram

In a relational database, what term refers to the collection of items that are all related to a single unique value, where the single value often serves as the primary key?

a record

In the case study discussed in database management class, how did marketing use info to improve the profitability of their sales?

customers were classified according into a status level & market segment

The characteristics of big data are described as being related to volume, velocity and what other characteristic?

variety

What type of data mining analysis identifies patterns in the data based on geographical or temporal proximity?

clustering

Concerns over discrimination, data contamination and intellectual property were legal and ethical issues discussed in relation to what topic?

data mining

When analyzing a set of click-steam data, what term is used to describe the percentage of rows containing an item relative to the total number of rows?

support

What is the term used to describe the process of reducing the number of dimensions of a multi-dimensional data cube?

projection

What type of data structure allows us to organize multi-dimensional info from a data warehouse so that is can be viewed using different data abstractions?

data cube