Chapter 2 - IS 300
Card Set Information
Chapter 2 - IS 300
The combination of social, legal, economic, physical, and political factors in which businessesconduct their operations.
business-information technology alignment
The tight integration of the IT function with the strategy, mission, and goals of the organization.
A collection of related activities that produce a product or a service of value to the organization, its business partners, and/or its customer
Those business activities related to the production and distribution of the firm's products and services, thus creating value.
Business activities that do not add value directly to a firm's product or service under consideration but support the primary activities that do add value.
An electronic description of an individual and his or her habits.
A model of informed consent in which a business is prohibited from collecting any personal information unless the customer specifically authorizes it.
The process of forming a digital dossier.
Clandestine software that is installed on your computer through duplicitous methods.
A third party that acts as a trusted intermediary between computers (and companies) by issuing digital certificates and verifying the worth and integrity of the certificates.
A backup location that provides only rudimentary services and facilities.
secure socket layer (SSL)(also known as transport layer security)
An encryption standard used for secure transactions such as credit card purchases and online banking.
A principle that users be granted the privilege for some activity only if there is a justifiable need to grant this authorization.
A collection of related computer system operations that can be performed by users of the system.
public-key encryption(also called asymmetric encryption)
A type of encryption that uses two different keys, a public key and a private key.
A process that encrypts each data packet to be sent and places each encrypted packet inside another packet.
virtual private network (VPN)
A private network that uses a public network (usually the Internet) to securely connect users by using encryption.
A site that provides many of the same services and options of the hot site, but does not include the company's applications