Mis Final
Mis Final
Why is IS vulnerable ?
- Accessibility for networks : IS in different locations are
interconnected ; the potential for fraud, access, or abuse is not
limited to a single location, but can have multiple origins ( access
points) => Threats to IS can have technical, organizational or
environmental origins.
- Hardware problems : (breakdowns, improper use, configuration errors…)
- Software problems : improper installations- unauthorized changes
- Use of networks/ computers outside a firm’s control or loss and theft of
portable devices.
Unauthorized Access: This can happen through tapping or sniffing.
Tapping involves physically intercepting communication lines while
sniffing involves capturing data packets traveling over a network.
Errors: This includes message alteration where data is tampered with during
transmission.
Denial-of-service attacks: This overwhelms a system with traffic, making it
unavailable to legitimate users.
Internet vulnerabilities :
- The Internet is open to anyone. Its size means abuses have a wider
impact
- Use of fixed internet addresses ( Modem-DSL cables) means the
creation of fixed targets
- Unencrypted VOIP ( voice over internet protocol) : a technology that
lets you make and receive phone calls using a broadband internet
connection instead of a traditional phone line.
- E-mail, file sharing programs, instant messages:
interception
Attachment with malicious software
Transmitting trade secrets
Software vulnerabilities :
- Weakness or flaw in software design
● Bugs : Program defects or errors in the software codes that can be
exploited to get unauthorized access
● Zero defects cannot be achieved in software development
● Zero-day vulnerabilities : unknown to the vendor and for which there
are no patches. They can be discovered by attackers, security
researchers, or other third parties. Once discovered, the vulnerability can
be sold on the dark web or to government agencies for a high price, or it
can be used for malicious purposes.
● Protection against zero-day vuln
- Regular vulnerability assessments and penetration tests to
identify said vulnerabilities
- Staying up to date with regular security patches
- IS security systems :
- Technical controls :
● Firewall : combo of software and hardware that prevents unauthorized
users from accessing private networks. ( examines users’ credentials
before letting them in )
● Intrusion detection system : Detects unusual activity on networks. The IDS
send alerts to system administrators and even shut down sensitive parts of
a network if it detects unauthorized traffic.
● Virtual private network : Virtual private network between two networks
providing a safe connection between your computer and the vpn server
● Unified threat management : integrates multiple security solutions into
one appliance ( antivirus- ids- firewall )
● Encryption : Cryptographic algorithms to protect data. Quantum
computers pose a challenge to encryption algorithms
● Network segmentation : Dividing networks into small segments each with
its own security policies and access to isolate attacks and limit damage
- Administrative control :
- Password policies
- Access control policies : according to security profiles
- Incident reponse plans : framework for responding to attacks/ ssecutiy
incidents : specifies the roles of the stakeholders in the response process
- disaster recovery plans : Plan to restore critical IT structures and
data after a natural disaster / cyberattack : Minimize downtime
- Business continuity plans : core business running during
disruption : Alternative processes- comm protocols …
- Risk assessment :
● identify potential risks and stakes of their occurrence.
● Assigning potential loss for risks / profitability odds
● Evaluating prob of occurrence
Info security audit :
- Systematic evaluation of firm’s info policies, security systems,
procedures, practices to ensure they meet security standards
Physical controls :
- authentication tools : Passwords systems , smart cards,
biometric identification, two-factor authentication ( atm : debit
card and pin)
-
Chapter 9 :
Enterprise resource planning : Common central database with
integrated suite of software modules ( example : Oracle)
- collects data from divisions of a firm for use in nearly all of
firm’s internal business activities
- Business value : Greater efficiency, as it helps reduce
redundancy and duplication of resources across the firm / firm
wide information to support quick decision making / include
analytical tools to evaluate overall performance
The supply chain : Network of organizations and business processes
for producing materials - transforming them into products-
distribution
- Upstream supply chain : raw materials- components- earlier
stages of prod
- Downstream : Deals with everything after a product was
manufactured ( warehouse- delivery)
- Internal supply chain
- Supply chain management : supply chain inefficiencies waste
operating costs and result from inaccurate or untimely info :
● Just-in-time strategy : Components arrive as they are
needed ( sur commande)
● Finished goods shipped after leaving assembly line
● Safety stock : deal with uncertainties and unforeseen
events
● Bullwhip effect: Small and temporary change incustomer
demand that can cause amplified variations in orders
placed by retailers, wholesalers …
● Supply chain management software : Optimize plans for
sourcing, warehousing, manufacturing, and delivery
● Global supply chains : - Greater geographical distance-
timezone differences - legal requirements
=> Internet helps manage these complexities like
warehousing management, transportation, logistics,
outsourcing : from push to pull manufacturing .
push : forecast demand and push products to customers
Pull; Actual orders trigger the events of the supply chain
from each stage operating indep =>moving a
concurrent supply chain with the internet.
CRM Software :
Packages range from niche tools to large scale enterprise apps
PRM : partner relationship management :
CRM packages
- Sales force automation : sales prospect and contact info / quote
generation capabilities
some or all its offerings. Exp: dating sites, video games, music or films (Netflix, YouTube premium,
Amazon prime)
Freemium Model: the user can access the basic limited features of a product for free, but
Affiliate Model: Web sites redirect visitors to other Web sites in return for a commission or
a percentage of the revenue from any resulting sales ( fashion blogs - online magazines)
Drop shipping: The merchant displays products on his website and takes the orders under
his brand. He does not keep an inventory or handle the shipping. Products are purchased
from a third party as soon as a customer makes a purchase which is then shipped directly
- Long-tail marketing : Shift focus to less popular products, and finding customers
when demand is low. Sell high volumes of hard to find or uncommon products ( ex :
•Social e-commerce:
refers to the use of social media platforms to promote and sell products and services. These platforms are a
great way to reach a large audience. Examples include: Instagram's shopping, Facebook Marketplace, Twitter's
Social sign-on :
Crowdsourcing: the practice of obtaining ideas, content, or services from a large and diverse group
Live shopping: involves live streaming video of products being demonstrated or sold in real-time. This allows
customers to ask questions, interact with the seller, and make purchases directly from the video stream. ( tiktok)
- Transactions technologies
- Private industrial network : A private network used by a group of firms to manage their
supply chain activities. It consists of a large firm using an extranet to link to its key business partners to share
product design and development, production scheduling, inventory management, etc. The sponsoring firm sets the
- A net market place : Online platforms that facilitate transactions between buyers and
sellers. They typically operate in a specific industry and offer a range of services, such as
- Some e-hubs serve vertical markets for specific industries, such as automobiles or
telecommunications, whereas others serve horizontal markets for goods and services that
can be found in many industries, such as office equipment or transportation. Vertical : Specific
industries or sectors characterized by a particular focus on a niche market or specialized products and
services. Unlike horizontal markets, which cater to a broad range of industries or customers,
assets
- knowing how to do things effectively in ways others don’t :
knowledge.
● Knowledge storage :
- Creation of databases
● Knowledge dissemination
information
- Training programs, informal networks, and shared
important information.
–New markets
Major types of AI :
- Expert systems : Expert systems are computer-based systems that
emulate the decision-making ability of a human expert in a specific
domain or field. These systems are designed to solve complex
problems, provide advice, make recommendations, or perform
tasks that would typically require human expertise.They are used
for structured decisions where there are few alternatives that are all
known in advance.
- Machine learning : A type of Ai that allows computer systems to
learn from data without explicit knowledge
● Use statistical models to identify patterns and relationships in
data to make decisions or predictions
● ML is used in filtering spam emails
- Neural networks : A type of ai inspired by the structure of the human
brain. It is divided into interconnected nodes. They process input
data to make decisions about poorly understood complex problems
for which large amounts of data has been collected. Example : Face
recognition.
- Genetic algorithms : Similar to the process of natural selection. They
filter presented solutions to reach optimality ( cost minimization-
efficient scheduling etc)
- Natural language processing : A type of AI that processes human
language to understand, analyze and understand it. Can also
process text and human voice ( google search- google translate)
- Computer vision systems : Emulate human vision to process real
world images. Autonomous vehicle can recognize road signs,
deepface can recognize human faces and identify them in picture
- Robotics : Combines AI, mechanical engineering, and electronics to
assembly movement)
- Intelligent agents : Work without direct human intervention to carry
out repetitive, predictable tasks like deleting junk e-mail or finding
cheapest airfare. Use limited built-in or learned knowledge base