Bis Final Exam Notes
Bis Final Exam Notes
Bis Final Exam Notes
1) Hardware (pc access to SMARTV3) Digital technologies: electronic tools, system, devices &
2) Software (Google Chrome, Microsoft Edge) resources that generate, store or
3) Data (students’ data to access SMARTV3) process data.
4) Network (UMS Wifi, Eduroam)
Landscape: a large are of countryside especially in relation to
5) Process (Login via SMARTV3 login page)
its appearance.
6) People (user & IT dept)
Technology: the study & knowledge of the practical esp.
industrial, use of scientific discoveries.
Main elements: tangible (hardware) & intangible (software)
of IT system.
1
BT22103 BIS | TEH HUI SHEAN
2
BT22103 BIS | TEH HUI SHEAN
3
BT22103 BIS | TEH HUI SHEAN
~ businesses are in better position when there are more - use IS to enable a focused strategy on a single market
options of suppliers. niche, specialization
~ factors that determine bargaining power of suppliers: - eg: 5-star hotel chains, apple membership
a) Switching cost of companies in the industry - contemporary CRM systems feature analytical capabilities
b) Presence of available substitutes for intensive customer data analysis
c) Strength of their distribution channels
d) strengthen customer & supplier intimacy
d) Uniqueness/level of differentiation in the
product/services the supplier is delivering. - internet technology is based on universal standards, making
it easy for rivals to compete on price alone & for new
Eg:
competitors to enter the market
+ aviation company use of fuel supply (Shell, Petronas,
- use IS to develop strong ties & loyalty with customers &
Petron etc) & aircraft supply (Boeing or Airbus)
suppliers
- increase switching cost
- eg: Starbucks (redeemable point collections)
3 strategies competitive advantages in IS
1) Synergies
- when output of some units are used as inputs to
others/organizations pool market & expertise
- involved takeover, merger, joint venture & strategic alliance
- eg: Google purchase Youtube, Digi-Celcom joint venture
2) Core Competencies
- activity for which firm is world-class leader
- relies on knowledge, experience & sharing this across
business units
- eg: Procter & Gamble intranet
4
BT22103 BIS | TEH HUI SHEAN
5
BT22103 BIS | TEH HUI SHEAN
Collaboration
- become inevitable in pursuing e-business.
- eg: upin ipin & Astro
- Technology platforms associated with collaborations
6
BT22103 BIS | TEH HUI SHEAN
- increase integration & expedite the flow of information: CHAPTER 4 TELECOMMUNICATIONS &
a) Intranet – internal networks based on internet
standards. Often are private access area in
WIRELESS TRCHNOLOGY
company’s website. What is internet?
b) Extranets – company websites accessible only to - world’s most extensive network
authorized vendors & suppliers facilitate - internet service providers (ISPs)
collaboration.
● provides connection
● types of internet connections
~ dial-ups
~digital subscriber line
~ cable internet connections
~ satellite
~ t1/t3 lines
The Web
Hypertext: ~ hypertext markup language (html)
~ hypertext transfer protocol (http)
~ uniform resource locator (url)
Web service: ~ software for locating & managing web pages.
Network
– collection of nodes connected to each other electronically
to support the communication between the nodes.
– when computers are connected, it is also called a computer
network.
Computer Network
- major components in simple network
● client & server computers
● network interfaces (NICs)
● connection medium
● network operating system (NOS)
● hubs, switches, routers
7
BT22103 BIS | TEH HUI SHEAN
● packet switching
- software-defined networking (SDN) - method of slicing digital messages into parcels
● functions of switches & routers managed by central (packets), sending packets along different
program communication paths as they become available & then
reassembling packets at destination
- previous circuit-switched networks required assembly
of complete point-to-point circuit
- packet switching more efficient use of network’s
communications capacity
8
BT22103 BIS | TEH HUI SHEAN
Types of networks
> signals: digital vs analog
> modem: translates digital signals into analog form & vice
versa.
9
BT22103 BIS | TEH HUI SHEAN
The Internet
> Inter-networking (intranet-extranet) / International
networking
> basic format: html
> accessing: web browser via http/https via search engines.
> www: one part of the internet
Stores, retrieves, formats & displays information in
page format using generally accepted standards.
10
BT22103 BIS | TEH HUI SHEAN
11
BT22103 BIS | TEH HUI SHEAN
M-commerce
- mobile commerce, a subset of e-commerce
- started in late 90s but not fully accepted
- in 2018, m-commerce strongly used by consumers
- enormous growth in terms of mobile access device
Mobile apps as collaboration tools
- collaboration & social technologies can be classified in Trend of mobile apps development 2021 & beyond
terms of whether they support interactions at the same or ● folding display – Samsung z flip
different time or place & whether these interactions are ● mobile wallets – touch n go, apple pay, grabpay etc
remote or collocated. ● wearables – smart watches & smart lenses linked with
a) synchronous – instant messaging, video call smartphones
b) asynchronous – email, wikis, docs. Editing ●enterprise mobile apps – developed by company to do
company related daily activities. Able to improve
communications, improve productivity & employees’
satisfaction. Eg: Lark
● 5G mobile internet network – adoption of 5G technology
networks of mobile devices.
12
BT22103 BIS | TEH HUI SHEAN
CHAPTER 7 COMPUTER OPERATION & > green computing: practices, design & manufacture the
computer related that only produce minimize impact to the
DATABASE CONTEXT (HARDWARE) environment. ↑ performance & power saving processors
IT infrastructure – platform for supporting all IS in the
business. Types of computers
● Hardware – consists of the physical devices associated ● personal computers & mobile devices
with a computer system ● workstations
● Software ● servers
● Data management ● mainframes
● Networking ● supercomputers
● Services ● grid computing
13
BT22103 BIS | TEH HUI SHEAN
14
BT22103 BIS | TEH HUI SHEAN
System software:
> software which interacts primarily with the hardware.
> an intermediate medium between the user, the hardware
& the application software
> consists of programs which regulates the operation of a
computer & its devices.
> important for every computer device
> Integrated software: software applications that combine
different components of online software applications.
> Functions:
~ enables the computer to run properly & smoothly.
~ controls other devices connected to the computer.
~ processes other programs in the computer’s memory
~ monitors commands in the processor & how
applications are carried out.
Software & Its Significance Operating System (OS)/Software Platform
- a program that controls the function of a computer
Software usage: - enables the application software to interact with the
> helps businesses to produce more competent activities. computer hardware & other software
> allows users to develop interesting projects related to > main function is to:
multimedia & graphics. 1) run the computer.
> supports users of different ages, backgrounds & categories 2) runs applications & manages the computer’s hardware
> is broad, cannot be applied in many places, anywhere & at 3) acts as a middleware for the application software to
any time interact with the CPU & users to communicate with the
> facilitates communication between users & their computer system
computers. 4) supervises the overall operation of a computer such as
> is the easiest & fastest way to connect users & the program management, scheduling, system maintenance
hardware. & manages the CPU & memory
> allows users to interact wisely with the hardware & other > How an OS work?
parts of the computers. 1) once data are entered into a computer, the OS will be
loaded from the hard disk into the computer memory
2) the OS will ensure that all activities in the computer
run smoothly includes identifying new devices, starting
new application software etc
15
BT22103 BIS | TEH HUI SHEAN
> OS features:
- icons: graphic representations which can represent
words used in a program
- files & folders: very useful tools to manage data stored
in the computer Types of OS
- windows & dialog boxes: help users to view information - real-time OS: used mostly in industrial systems to manage
displayed on the screen of the computer resources of the computer so that certain processes are
- pointer: controlled by input devices such as the mouse & performed precisely within the specific time
touchpad & it can be used to select icons, menus or tabs - single-user/single task OS: designed for individuals to
in the computer perform one task at a time
- many other features that have their own functions & - single user/multitasking OS: designed for individuals to run
uniqueness several programs at the same time
> OS functions: - multi-user OS: enables multiple users to run several
- coordinates instructions between users, hardware & programs simultaneously
application software
- enables the computer to boot Application software
● booting is a process of starting & restarting a computer - end-user software
● warm boot: process switching on the computer by - designed to help users in their daily tasks such as browsing
restarting the Internet & writing letters
● cold boot: process of switching on a computer that has - application software functions:
been turned off ● provides usability to support many tasks related to
- load & run applications personal use
● multitasking – few applications running at the same ● helps organizations to run many activities
time ● increases interaction between users
- types of application software:
1) browser
2) communication
3) data management
4) desktop publishing
5) email
6) groupware
7) presentation graphics
8) programming
9) spreadsheet
10) word processing
16
BT22103 BIS | TEH HUI SHEAN
17
BT22103 BIS | TEH HUI SHEAN
18
BT22103 BIS | TEH HUI SHEAN
Malicious Software
19
BT22103 BIS | TEH HUI SHEAN
Risk management
- determines level of risk to firm if specific activity or process
is not properly controlled
● types of threat
● probability of occurrence during year
● potential losses, value of threat
● expected annual loss
● Identity theft
Security policy
+ phishing
- ranks information risks, identifies acceptable security goals
+ evil twins
& identifies mechanisms for achieving these goals
+ pharming
- drives other policies
● click fraud
● acceptable use policy (AUP)
● cyberterrorism
● defines acceptable uses of firm’s information resources
● cyberwarfare (possible in future WW3)
& computing equipment
- identify management
What is the business value of security & control
● identifying valid users
> failed computer systems can lead to significant or total loss
● controlling access
of business function
> firms are now more vulnerable than ever
Disaster recovery planning & business continuity planning
- confidential personal & financial data
> disaster recovery planning
- trade secrets, new products, strategies
- devices plans for restoration of disrupted services
> a security breach may cut into a firm’s market value almost
> business continuity planning
immediately
- focuses on restring business operations after disaster
> inadequate security & controls also bring forth issues of
> both types of plans needed to identify firm’s most
liability
critical systems
- business impact analysis to determine impact of an
Electronic evidence & computer forensics
outage
Electronic evidence
- management must determine which systems restored
- evidence for white collar crimes often in digital form
first
- proper control of data can save time & money when
responding to legal discovery request
The role of auditing
Computer forensics
> information systems audit
- scientific collection, examination, authentication,
~ examines firm’s overall security environment as well
preservation & analysis of data from computer storage
as controls governing individual IS
media for use as evidence in court of law
> security audits
- recovery of ambient data
~ review techs, procedures, documentation, training &
personnel
Information system controls
~assess financial & organizational impact of each
- maybe automated or manual
threat
- general controls
20
BT22103 BIS | TEH HUI SHEAN
> list & rank control weaknesses & the probability of - two methods of encryption
occurrence = symmetric key encryption
> assess financial & organization impact of each threat > sender & receiver use single, shared key
= public key encryption
What are the most important tools & technologies for > uses 2 mathematically related keys: public key &
safeguarding IS? private Key
● identity management software > sender encrypts message with recipient’s public
~ automates keeping track of all users & privileges key
~ authenticates users, protecting identities & controlling > recipient decrypts with private key
access
● authentication
~ password systems
~ tokens
~ smart cards
~ biometric authentications
~ two-factor authentication Encryption & public key infrastructure
● firewall a) digital certificate
~ combination of hardware & software that prevents - data file used to establish the identity of users & electronic
unauthorized users from accessing private networks assets for protection of online transactions
~ technologies include: - uses a trusted third party, certification authority (CA), to
> packet filtering validate a user’s identity
> stateful inspection - CA verifies user’s identity, stores information in CA server,
which generated encrypted digital certificate containing
> network address translation (NAT)
owner ID info & copy of owner’s public key
> application proxy filtering
● intrusion detection system
~ monitors hot spots on corporate networks to detect &
deter intruders
● antivirus & antispyware software
~ checks computers for presence of malware & can often
eliminate it as well
~ requires continual updating
● unified threat management (UTM) systems
21
BT22103 BIS | TEH HUI SHEAN
Security issues for cloud computing & the mobile digital CHAPTER 9 ENTERPRISE & FUNCTIONAL
platform
APPLICATIONS
● Security in the cloud
Defining enterprise
- security policies should include & cover any special
requirements for mobile devices - a company or business, often a small one
- mobile device management tools - a business which aims to make a profit
> authorization Enterprise system
> inventory records - enterprise resource planning (ERP) systems
> control updates - suite of integrated software modules & a common central
> lockdown/erase lost device database
> encryption - collects data from many division of firm for use in nearly all
● Securing mobile platform firm’s internal business activities
- information entered in one process is immediately available
Ensuring software quality for other processes.
● software metrics: objective assessments of system in form - support organization-wide process coordination &
of quantified measurements integration
> number of transactions - eg: Xeersoft, sage, Microsoft dynamics 365
> online response time
How enterprise systems work
> payroll checks printed per hour
> known bugs per hundred lines of code
● early & regular testing
● walkthrough: review of specification or design document
by small group of qualified people
● debugging: process by which errors are eliminated
Enterprise software
- built around thousands of predefined business processes
that reflect best practices
● finance & accounting
● hr
● manufacturing & production
● sales & marketing
● marketing
● cs
● r&d
●distribution
- to implement, firms:
● select functions of system they wish to use
● map business processes to software processes
22
BT22103 BIS | TEH HUI SHEAN
23
BT22103 BIS | TEH HUI SHEAN
Business
Tipping points
- moments when specific techs shifts hit mainstream society
- expected to occur in the next 10 years & therefore vividly
capture the deep shifts triggered by IR 4.0
24
BT22103 BIS | TEH HUI SHEAN
25
BT22103 BIS | TEH HUI SHEAN
● Business/Organization:
- utilization of big data
- emergence of future internet & web 3.0
- privacy concern
- introduce of new internet domain
- future currency
Individual/society
- similar with organizations
~ privacy concern
~ use IT for decision making process related
~ utilization of social media for daily life
~ future banking, payment & currency
The consequences of the future of IS
> Business/Organization
● management/business able to calculate the risk in more
effective
● business will have a lot of choices in term of supplier
● utilize the networking in term of domestic &
international
● marketing will deployed in more effective channel
● daily operation will become more effectively in context
increases the performance & reduce the cost operation as
well
26
BT22103 BIS | TEH HUI SHEAN
27