In this type of organization, departments are organized on the basis of core competencies.
What is a functional organization?
A series of structured activities or tasks performed to achieve a specific goal, often resulting in a product or service for customers.
What is a business process?
According to our textbook, on average, it takes ___ days to discover a data breach.
What is 21 days?
ERP
Enterprise Resource Planning
A coordinated set of actions to fulfill goals, objectives, and purposes.
What is strategy?
Systems in place before organizations transition to newer systems.
What are legacy systems?
This theory aligns decisions regarding business strategy, IS, and organizational design.
What is the information systems strategy triangle?
The use of two or more authorization methods to gain access to a system.
What is multifactor authentication?
SAP
Systems Applications and Products
A clear statement that unifies an organization's effort and describes what the firm is about.
What is a mission statement?
** Daily Double **
An incremental data-driven approach to quality management for eliminating defects from a process.
What is Six Sigma?
Organizational variables used by decision makers to effect changes in their organization.
What are managerial levers?
People hired to try to break into systems to help the client firm uncover weaknesses.
What are white hat hackers?
BPR
Business Process Reengineering
An architecture based on services provided over the internet.
What is cloud computing?
This company produces the leading ERP software.
What is SAP?
A blueprint for translating business strategy into infrastructure.
What is architecture?
Software and sometimes hardware-based filter that prevents or allows outside traffic from accessing the network.
What is a firewall?
TQM
Total Quality Management
A strategy that aims to establish competitive advantage by having the lowest cost of operation in the industry.
What is cost leadership?
This company produces popular cloud-based SAAS customer relationship management software.
Who is Salesforce?
In computing, this is a series of technologies that allows the division of physical computing resources into a series of virtual machines, operating systems, processes or containers.
What is virtualization?
Security leaders use this concept, known for having multiple layers of different security technologies, policies, and practices, to increase the security and decrease the risk of a cyber breach.
What is defense in depth?
NIST
National Institute of Standards and Technology
** Daily Double **
Anything tangible or intangible that can be used by a company to create, produce and/or offer its products.
What is an IT asset?