MIS_Notes_EndTerm
MIS_Notes_EndTerm
• An interactive IS that helps managers and other decision-makers use data, models, and
tools to solve complex problems and make informed decisions.
• Key components:
2. Software or models – Collects and stores data from various sources and
provides tools for analyzing it through statistical, simulation, and optimization
models
3. User Interface – The interactive front-end that allows users to access the data,
run analyses, and visualize results.
Types of DSS:
• Financial Modeling Tools (e.g., IBM Planning Analytics, Oracle Crystal Ball)
• Expert Systems (e.g., MYCIN for medical diagnosis, DENDRAL for chemical
analysis)
• Knowledge Management Systems (e.g., IBM Watson, SAP Knowledge
Management)
-----------------------------------------------------------------------------------------------------------
• To ensure that the Manufacturing department has the correct amount of material on-
hand at the time it is needed.
• MRP determines the number of parts, components, and raw material to produce a
product.
• Create schedule identifying the specific parts and material required to produce end
items.
• Inputs
• Bill of Material – List of all raw material, parts, and sub-assemblies need to
produce 1 unit of product.
• Output
• Primary Reports
• Secondary Reports
-------------------------------------------------------------------------------------------------------
ERP Systems are designed to correct a lack of communication among the functional
Information Systems (IS). ERP systems resolve this problem by tightly integrating the
functional IS areas via a common database.
For this reason, experts credit ERP systems with greatly increasing organizational productivity.
• Financial management
• Procurement
• Risk management
• Supply chain management
• Project management
• Manufacturing process
• Customer relationship management
• Human resources
Advantages of ERP:
Challenges of ERP:
• Data Security: Integrating data from different departments can create security risks.
Benefits:
• Customized features
• Greater control
• Data privacy
• No internet needed
• Integration with existing systems
2. Cloud: ERP software hosted on cloud servers and accessed through internet. It
eliminates the need for organization to maintain its own hardware and infrastructure. It
is suitable for small to medium size businesses.
Benefits:
Benefits:
• Broad functionality
• Versatility
• Data Control and access
• Easier transition to full cloud
• Combine best-of-breed
solutions
-----------------------------------------------------------------------------------------------------------
Cyber-security
1.1. Cyber
• The protection of the computer and its content, evolved into information technology or
IT security,
1.5. Cybersecurity
3. Threat Actors
• A threat actor is a person or group that carries out malicious activities to exploit
systems or data for financial, political, or personal gain.
1. Hobbyist
2. Hacktivist
3. Criminal Organization
4. Organized Crime Syndicate
3.1. Hobbyist
• Hobbyists are curious about how technology works and where the vulnerabilities lie.
• Attack level -> Low-level attacks
• Skill & Resource -> Low skilled and lightly resource.
• Motivation: Curiosity and a desire to build a reputation.
• How?
o Tend to leverage established tools and tactics, not building their own custom
software or reverse-engineering the complicated systems
o They're taking advantage of what is already been done.
• Alone or Teamwork: Often act alone
• They frequently violate confidentiality and potentially impact the access to a device or
service itself
3.2. Hacktivist
• Persistently engaged with their targets. They are mostly tied to nation-states or aligned
with their geopolitical goals.
• Attack level -> High-level attacks
• Skill & Resource -> Highly skilled and Highly resourced
• Motivation -> Espionage
• How?
o They can use various techniques and tactics to engage in espionage, stealing a
country’s secrets.
o Build their own tools for exploitation.
• Alone or Teamwork
o Large group
4. Hacking process
5. Attack
• Virus
• Trojan horse
• Spoofing
• Phishing
• Cybervandalism
• Insider job
• Denial-of-service
• Distributed denial-of-service
5.1. Virus
5.3. Spoofing
5.4. Phishing
5.5. Cybervandalism
5.7. Denial-of-service
• An advanced form of a Denial of Service (DoS) attack where multiple systems, often
distributed across various locations, work together to flood a target system, server, or
network with an overwhelming volume of illegitimate requests or excessive traffic.
• Reputational harm
• Damage and destruction of data
• Stolen money
• Lost productivity
• Theft of intellectual property
• Theft of personal and financial data
• Post-attack disruption to the normal course of business
• Restoration and deletion of hacked data
----------------------------------------------------------------------------------------------------------
Hardware Security
• Financial Consequences
• Economic impact of data breach: Financial losses, legal costs, compensation
• Operational downtime
• Hardware replacement cost
• Legal and Regulatory Implications
• Compliance with data protection (e.g., GDPR, CCPA) that penalizes
businesses for failing to secure hardware.
• Industry-specific regulations (e.g., healthcare, finance) and failed hardware
security lead to severe fines and penalties.
• Reputational Damage:
• Erosion of Customer Trust
• Stock price impact and decline in brand value
4. Hardware Security: Prevention Strategies
Software Security
1. Concept
• Ethical hacking is described as the legal access of a hacker to any organization's online
property after receiving prior permission from the organization.
• “Application testing, war dialing, network testing, wireless security, system hardening”,
are among the many services that require ethical hacking.
• Consent: Ethical hackers must have permission from the owners of the systems they
are testing.
• Legal Boundaries: The hacking must comply with national laws and regulations.
• Clear Objectives: The goals of the testing must be documented and agreed upon
beforehand.
-----------------------------------------------------------------------------------------------------------
Artificial Intelligence
Artificial Intelligence refers to the simulation of human intelligence by machines that can
perform tasks like reasoning, learning, and decision-making.
Key Features:
Examples:
Chatbots (e.g., ChatGPT), Virtual Assistants (e.g., Alexa), Recommendation Systems (e.g.,
Netflix).
Evolution of AI
Importance of AI in Business
• Data-Driven Decisions
• Analyze large datasets for actionable insights.
• Cost Efficiency
• Automates repetitive tasks, reducing operational costs.
• Enhanced Customer Experience
• Personalizes interactions through AI-driven chatbots and recommendations.
• Competitive Advantage
• Early adopters gain a technological edge in the market.
Impact of AI in Industries
Real-World Examples of AI
Notes: The list of real-world examples is extensive. You are encouraged as per your
interest.
Advantage
Future of AI in Business
• Integration with SMAC: AI will enhance Social, Mobile, Analytics, and Cloud
technologies.
1. Please refer to the mid-term notes in conjunction with this document/note for a
more comprehensive understanding.
2. Please re-visit and recall in-class assignments.
3. Please visit the major assignment and mid-term submissions.
4. Please read these topics in the reference book and research these topics on the
web.