Data Management 1 8
Data Management 1 8
Data Management 1 8
E-BUSINESS & E-COMMERCE doing business, Typical examples of functions performed by an OAS
like trading, electronically and is now considered an include printing documents, mailing paperwork,
essential strategy for companies competing in today's mailing. maintaining a company calendar, and
business environment. For example, E-bay. producing reports. Primarily, an office automation
system assists in enhancing communication among
DATA MANAGEMENT Lesson 2 different departments so everyone can collaborate to
complete a task.
TYPES OF INFORMATION SYSTEM
Knowledge Management Systems- Stores and
Most businesses utilize six different information extracts information to help users enhance their
technology systems, each with functionality that knowledge and optimize collaboration efforts to
assists in managing a particular business unit or complete taskes •Examples of documents found in a
organizational level. knowledge management system include employee
training materials.
Company policies, and procedures, or answers to marketing data in an organization to streamline each
customer questions. Used by employees, customers, step of the sales process
management, and other various stakeholders involved
with the organization. It ensures that technical DATA MANAGEMENT Lesson 3
abilities are integrated throughout the company while COMPUTER ETHICS
providing visuals to help employees make sense of
the data they see. Thou shalt not use a computer to harm other people.
Management Information System - Uses various Thou shalt not interfere with other people's computer
transaction data from a TPS to help middle work.
management optimize planning and decision-making.
It retrieves TPS information, aggregates it, and Thou shalt not snoop around in other people's files.
generates reports to help those at the management
Thou shalt not use a computer to steal.
level know important details of a situation. -
Summaries and comparisons are utilized to allow Thou shalt not use a computer to bear false witness.
senior managers to optimize the decision making
process to achieve better results. Thou shalt not use or copy software for which you
have not paid.
Decision Support Systems - Processes data to assist
in management decision-making. It stores and gathers Thou shalt not use other people's computer resources
the information required for management to take the without authorization.
proper actions at the correct time. •For example, a
Thou shalt not appropriate other people's intellectual
bank manager can use a DS5 to assess the evolving
output.
loan trends to determine which yearly loon targets to
meet. Thou shalt think about the social consequences of the
program you write.
Decision models are programmed into the IS to
analyze and summarize large quantities of Thou shalt use a computer in ways that show
information and put it into a visual that makes it consideration and respect.
understandable.
NETWORK ATTACK
Executive Support System - Similar to a DSS but are
primarily used by executive leaders and owners to • A network attack is an attempt to gain unauthorized
optimize decision making. access to an organization's network, with the
objective of stealing data or perform other malicious
An expert system helps enterprise leaders find activity.
answers to non-routine questions so they can make
choices that improve the company's outlook and There are two main types of network attacks:
performance.
PASSIVE: Attackers gain access to a network and
Unlike a DSS, an executive support system provides can monitor or steal sensitive information, but
better telecommunication functionality and a bigger without making any change to the data, leaving it
computing functionality. intact.
SPECIFIC USE CASES FOR INFORMATION ACTIVE: Attackers not only gain unauthorized
SYSTEMS access but also modify data, either deleting,
encrypting or otherwise harming it.
Enterprise Resource Planning - Provides
organization-wide integration of important business TYPES OF EXPLOITS DOS/DDOS
activities, handles the allocation of resources to
optimize efficiency. PHISHING/SPEAR-PHISHING TROJAN HORSE
VIRUS
Accounting Information System - Manages all of the
accounting information in an organization, including ROOTKIT
payroll to streamline human resource tasks. SMISHING/VISHING
Sales Management System - An information system SPAM
that manages and monitors all of the sales and
WORM
DOS Many users are already aware of the dangers of
clicking a link in email messages.
• Denial-of-Service (DoS) is an attack meant to shut
down a machine or network, making it inaccessible to VISHING
its intended users.
Uses verbal scams to trick people into doing things
• Victims of attacks often target web servers of high- they believe are in their best interests. Vishing often
profile organizations such as banking, commerce, and picks up where phishing leaves off.
media companies, or government and trade
organizations. In the example above, the victim clicked on a link for
an online advertisement related to personal interests.
DDOS
• Malware embedded in the link triggered a lock-up
• Distributed denial-of-service (DDoS) attack is a that only the helpful "technician" on the other end of
malicious attempt to disrupt the normal traffic of a the phone could fix.
targeted server, service or network by overwhelming
the target or its surrounding infrastructure with a
flood of Internet traffic. SPAM
DDoS attacks achieve effectiveness by utilizing A digital junk mail unsolicited communications sent
multiple compromised computer systems as sources in bulk over the internet or through any electronic
of attack traffic. messaging system
PHISHING TROJAN HORSE
Type of social engineering attack often used to steal • A type of malware that downloads onto a computer
user data, including login credentials and credit card disguised as a legitimate program.
numbers.
It is so-called due to its delivery method, which
• It occurs when an attacker, masquerading as a typically sees an attacker use social engineering to
trusted entity, dupes a victim into opening an email, hide malicious code within legitimate software.
instant message, or text message.
VIRUS
SPEAR-PHISHING
A piece of code which is capable of copying itself
An email or electronic communications scam targeted and typically has a detrimental effect, such as
towards a specific individual, organization or corrupting the system or destroying data.
business.
RANSOMWARE
Although often intended to steal data for malicious
purposes, cybercriminals may also intend to install A type of malicious software that infects a computer
malware on a targeted user's computer. and restricts users' access to it until a ransom is paid
to unlock it.
ROOTKIT
HACKERS
A clandestine computer program designed to provide
continued privileged access to a computer while A computer hacker is a computer expert who uses
actively hiding its presence. their technical knowledge to achieve a goal or
overcome an obstacle, within a computerized system
Today rootkits are generally associated with malware by non standard means.
such as Trojans, worms, viruses - that conceal their
existence and actions from users and other system Share the knowledge and never damages the data.
processes.
TYPES OF HACKERS
SMISHING
WHITE HAT
• A form of phishing in which an attacker uses a
compelling text message to trick targeted recipients Hackers are also known as Ethical Hackers or a
into clicking a link and sending the attacker private Penetration Tester. White hat hackers are the good
information or downloading malicious programs to a guys of the hacker world.
smartphone.
• They focus on security and protecting IT system. goods and services, such as hacking tools and stolen
White hat hacking is legal. GRAY HAT data.
Hybrid between Black hat Hackers and White hat Cybercriminal underground markets are known to
hackers. They can hack any system even if they don't specialize in certain products or services.
have permission to test the security of the system but
they will never steal money or damage the system. HACKTIVISTS
The file system provides the details of data representation and DBMS gives an abstract view of data that hides the
storage of data. details
Storing and retrieving of data cant be done efficiently in a file DBMS is efficient to use as there are a wide variety
system of methods to store and retrieve data
It does not offer data recovery processes. There k a backup recovery for data in
Protecting a file system is very difficult. DBMS offers good protection mechanism.
Data inconsistency is higher in the file system. Data inconsistency is low in a database management
system.
The file system offer lesser security.
Database Management System offers high security.
old dots files and entities.
File System allows you to stores the data as Database
Not provide support for complicated Management System stores data
There is no efficient query processing in the file system. DBMS system provides backup and recovery of data
even if it is lost.
These system doesn't offer concurrency
You can easily query data in a database using the
SQL language.
● Database - group of interconnected data and data is •Forms provide a quick and easy way to modify and
a group of facts and figures needed to be processed in insert records into your databases.
producing information. •Has capabilities to answer more complex requests or
● DBMS - a software designed to store data in a way queries.
that it becomes easier to retrieve, manage, and •Access queries provide the capability to combine
processed to produce information data from multiple tables and place specific
DATA ORGANIZATION conditions on the data retrieved.
• This makes it easy to locate and access specific • Seamless integration- can work well along with
values within the database. other business applications and numerous different
data sources through its connector library. The
• It is "relational" because the values within each software’s DB enables users to store their data to
table are related to each other. Azure SQL and SQL Service to make sure that all the
information can be easily managed, remains reliable,
• Tables may also be related to other tables.
and is fully secured.
Renaming Fields
DATA MANAGEMENT Lesson 8 • When you create a new table, Access automatically
adds a new field called ID
MS ACCESS DATASHEET VIEW
with a data type of AutoNumber.
CREATE A TABLE IN DATA SHEET VIEW
• You can rename this field if you wish.
• Click the Table Button
• To do this, right-click in the field and select
• Click Table on the Ribbon (from the Create tab). Rename Field.
• A blank table will appear. • Access with highlight the field name for you to
Add a Field rename it.
• Select a data type from the contextual menu that Save the Table
expands when you click. • Once you've set up the table, you should save it.
• Not sure which data type to use? • To save the table, right-click on the table's tab and
• Think about the type of data that will be stored in select Save.
the field. That guide you as to which data type you • You can also close the table by clicking the X and
should choose here. Access will prompt you to save it.
Name the Field Name the Table
• Once you've selected a data type, Access highlights • Enter a name for the table and click OK.
the column header
The Table
so that you can name the field.
• The table is now added to the list of tables in the left
• Enter a name for the field. Navigation Panead
• Repeat steps 2 and 3 for as many fields that you
need to add