A model that organizations use to introduce new systems to the workplace.
What is Leavitt's Diamond Model?
The technique used to gain unauthorized access to a device or a network
What is an Attack Vector?
Where you enter or edit data in the active cell
A picture can be added to a worksheet
What is background?
Getting an email from the Dean asking for an available mobile number
What is phishing?
Transforms the inputs to outputs in such a way that the value of the input is increased.
What is the value chain?
Unintended release of sensitive data or the access of sensitive data by unauthorized individuals, often resulting in identify theft.
What is a data breach?
A group of cells in a rectangular block
What is a cell range?
An equal sign is used at the start of the cell
What is a formula?
Function that counts numeric values
What is the count function?
An example of this is Starbucks using AI to understand customer preferences.
What is Information Systems as a means to gain a competitive advantage?
Four levels in a layered security solution design.
What are organizational, network, application, and end-user?
A line is added along the edge of a cell, row, column or table.
What is a border?
Formats can be copied and pasted in various options
What is format painter and paste special?
Transpose data with this feature
What is format painter and paste special - transpose?
Corporate strategy, business unit strategies, innovative thinking and technology innovations
What are four drivers that sets IS strategy?
A risk assessment is a key step within this strategy used to implement CIA at the organizational level
What is security strategy?
What is page break preview?
Cell positioning can be changed using this feature
Confidentiality, Integrity, Availability
What is the CIA Security Triad?
Microsoft Dynamics, SAP, Vantage by Epicor, and QuickBooks are examples of this sphere of influence
What is Enterprise Information System?
Response activities used when a cyber attack occurs
What are incident notification, protection of evidence and activity logs, incident containment, eradication, and incident follow-up?
Percent values are stored as decimals but displayed as this
What is a percent symbol?
Combining two cells together
What is merge cells?
A key value chain for information systems
What is supply chain?