DM L1-combined.pdf
Document Details
Uploaded by FelicitousOak263
D.V.O.R.E.F Senior High School
Tags
Full Transcript
DATA MANAGEMENT LESSON 1 INFORMATION SYSTEM LEARNING OBJECTIVES At the end of the lesson, students will be able to: define what an information system is by identifying its major components. know the importance of Information Systems to people, business and organization...
DATA MANAGEMENT LESSON 1 INFORMATION SYSTEM LEARNING OBJECTIVES At the end of the lesson, students will be able to: define what an information system is by identifying its major components. know the importance of Information Systems to people, business and organization INFORMATION SYSTEMS (IS) The study of complementary networks of hardware and software that people and organizations use to collect, filter, process, create, and distribute data. Combinations of hardware, software, and telecommunications networks that people build and use to collect, create, and distribute useful data, typically in organizational settings. Interrelated components working together to collect, process, store, and disseminate information to support decision making, coordination, control, analysis, and visualization in an organization. Information system Hardware Networks Software Procedures Data People COMPONENTS OF INFORMATION SYSTEMS The main components of information systems are computer hardware and software, telecommunications, databases and data warehouses, human resources, and procedures. The hardware, software, and telecommunications constitute information technology (IT), which is now ingrained in the operations and management of organizations. COMPUTER HARDWARE Physical equipment used for input, output and processing. The hardware structure depends upon the type and size of the organization. It consists of an input and an output device, operating system, processor, and media devices. This also includes computer peripheral devices. Eg Motherboard GPU Processor USB Mouse Printer Monitor Keyboard Ram COMPUTER SOFTWARE The programs/ application program used to control and coordinate the hardware components. It is used for analyzing and processing of the data. These programs include a set of instruction used for processing information. Software is further classified into 3 types: System Software Application Software Procedures System Software Application Software Operating System ★ Word Processing Software BIOS ★ Spreadsheet Software Device Driver ★ Multimedia Software Assembler ★ Enterprise Software Complier ★ Programming Software Loader DATABASES Data are the raw facts and figures that are unorganized that are and later processed to generate information. Software's are used for organizing and serving data to the user, managing physical storage of media and virtual resources. As the hardware can’t work without software the same as software needs data for processing. Data are managed using Database management system. Database software is used for efficient access for required data, and to manage knowledge bases. List of Popular Databases MySQL Amazon REDSHIFT SQL Google BigQuery mongoDB Druid Cassandra ORACLE Snowflake IBM DB2 NETWORK Networks resources refer to the telecommunication networks like the intranet, extranet and the internet. These resources facilitate the flow of information in the organization. Networks consists of both the physicals devises such as networks cards, routers, hubs and cables and software such as operating systems, web servers, data servers and application servers. Telecommunications networks consist of computers, communications processors, and other devices interconnected by communications media and controlled by software. Networks include communication media, and Network Support. HUMAN RESOURCES It is associated with the manpower required to run and manage the system. People are the end user of the information system, end- user use information produced for their own purpose, the main purpose of the information system is to benefit the end user. The end user can be accountants, engineers, salespersons, customers, clerks, or managers etc. People are also responsible to develop and operate information systems. They include systems analysts, computer operators, programmers, and other clerical IS personnel, and managerial techniques. Human resources - Performance - Recruiting - Training - Research - Skill - Employer - Potential - Leadership PROCEDURES The policies that govern the operation of an information system. "Procedures are to people what software is to hardware" is a common analogy that is used to illustrate the role of procedures in a system. Every system needs people if it is to be useful. WEB-BASED, GLOBAL PLATFORM The use of internet worldwide which is known as “World Wide Web”. It enables individuals to connect, compute, communicate, collaborate and compare everywhere and anywhere and at anytime. It also allows access to unlimited amounts of information, services and entertainment, to exchange knowledge and to produce and sell goods and services. Global web-based platform has created globalization and is spreading day by day. BUSINESS PRESSURE Market pressure which are generated by the global economy and strong competition, the changing nature of the workforce, and powerful customers. Technology pressures which mainly include technological innovation and information overload. Societal/political/legal pressures which are the social responsibility, government regulation/deregulation, spending for social programs, spending to protect against terrorism, and ethics. How Tech change ramps up Business pressures Many organizations are under pressure to reinvent themselves in order to avoid falling behind the competition– and on the wrong side of the digital revolution. Organizational Responses to Business Pressure Customer Focus By keeping a proper focus on customer by time to time review, we can save our customer from our competitor. Strategic Systems Providing help to the organization to increase the business profit. Make to Order An approach to make customized products and services Mass Customization Strategy to produce a product on large scale. IT ORIENTED ORGANIZATIONAL RESPONSES TO BUSINESS PRESSURES CUSTOMER FOCUS: organizational attempts to provide superb customer service can make the difference between attracting and keeping customers on the one hand and losing them to competitors on the other. For example, Amazon. E-BUSINESS & E-COMMERCE: doing business, like trading, electronically and is now considered an essential strategy for companies competing in today’s business environment. For example, E-bay. Management Information System MIS is a planned system of collecting, storing, and disseminating data in the form of information needed to carry out the functions of the management. WHY ARE INFORMATION SYSTEMS IMPORTANT TO YOU AS A STUDENT? The ability to understand the various business processes and create a link between the users or customers and the technology is the primary role of the Information Systems Specialist. Various career opportunities exist in the field of Information Systems. TYPES OF INFORMATION SYSTEM Quantities and the types of transactions performed vary, Most businesses utilize six different depending on the industry and information technology systems, size/scope of the company. each with functionality that assists in Examples of typical transactions managing a particular business unit include billing clients, bank deposits, or organizational level. new hire data, inventory counts, or a Because the business environment record of client-customer has a wide range of data relationship management data. requirements, business intelligence technology systems help each OFFICE AUTOMATION SYSTEMS department manage and organize all A network of various tools, of their data in a manner that helps technologies, and people required to unit members meet key objectives. conduct clerical and managerial tasks. INFORMATION SYSTEM Typical examples of functions CLASSIFICATION performed by an OAS include Operational Management printing documents, mailing Includes transaction processing paperwork, mailing, maintaining a system, office automation system, company calendar, and producing and knowledge management reports. system, handles structured data, Primarily, an office automation and used by workers and employees system assists in enhancing to streamline daily operations. communication among different departments so everyone can Tactical Management collaborate to complete a task. Used by business unit managers, handles semi-structured data, and KNOWLEDGE MANAGEMENT SYSTEMS includes management information Stores and extracts information to systems. help users enhance their knowledge and optimize collaboration efforts to Strategic Management complete tasks. Used by executives, handles Examples of documents found in a unstructured data, and includes the knowledge management system decision support system and include employee training materials, executive support system company policies, and procedures, or answers to customer questions. TRANSACTION PROCESSING SYSTEMS Used by employees, customers, A transaction encompasses all of the management, and other various purchases and sales of products and stakeholders involved with the services, along with any daily organization. business transactions or activities It ensures that technical abilities are required to operate a company. integrated throughout the company while providing visuals to help employees make sense of the data Unlike a DSS, an executive support they see. system provides better telecommunication functionality and MANAGEMENT INFORMATION SYSTEM a bigger computing functionality. Uses various transaction data from a TPS to help middle management SPECIFIC USE CASES FOR optimize planning and INFORMATION SYSTEMS decision-making. Enterprise Resource Planning - It retrieves TPS information, Provides organization-wide aggregates it, and generates reports integration of important business to help those at the management activities, handles the allocation of level know important details of a resources to optimize efficiency situation. Summaries and comparisons are Accounting Information System - utilized to allow senior managers to Manages all of the accounting optimize the decision making information in an organization, process to achieve better results. including payroll to streamline human resource tasks DECISION SUPPORT SYSTEMS Processes data to assist in Sales Management System - An management decision-making. information system that manages It stores and gathers the information and monitors all of the sales and required for management to take the marketing data in an organization to proper actions at the correct time. streamline each step of the sales For example, a bank manager can process use a DSS to assess the evolving loan trends to determine which yearly loan targets to meet. Decision models are programmed into the IS to analyze and summarize large quantities of information and put it into a visual that makes it understandable. EXECUTIVE SUPPORT SYSTEM Similar to a DSS but are primarily used by executive leaders and owners to optimize decision- making. An expert system helps enterprise leaders find answers to non-routine questions so they can make choices that improve the company's outlook and performance. COMPUTER ETHICS 1. Thou shalt not use a computer to harm other people 8. Thou shalt not appropriate other people's intellectual output. 2. Thou shalt not interfere with other people's computer work. 3. Thou shalt not snoop around in other people's files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false 9. Thou shalt think about the social consequences witness. of the program you write. 6. Thou shalt not use or copy software for which you have not paid. 10. Thou shalt use a computer in ways that show consideration and respect. NETWORK ATTACKS 7. Thou shalt not use other people's computer A network attack is an attempt to gain resources without authorization. unauthorized access to an organization’s network, with the objective of stealing data or perform other malicious activity. There are two main types of network attacks: PASSIVE: Attackers gain access to a network and can monitor or steal sensitive information, but without making any change to the data, leaving it intact. ACTIVE: Attackers not only gain unauthorized access but also modify data, either deleting, encrypting or otherwise harming it. Types of Exploits DOS/DDOS Phishing/Spear-phishing Rootkit Smishing/Vishing Spam Trojan Horse Virus Spear-phishing Worm An email or electronic communications scam targeted towards a specific individual, organization Denial-of-Service (DoS) Attack or business. In the most common example of Denial-of-Service Although often intended to steal data for malicious (DoS) attacks, an attacker uses a network of purposes, cybercriminals may also intend to install hijacked computers malware on a targeted user's computer. This network is used to flood the target site with phony server requests, leaving no bandwidth for Rootkit legitimate traffic A clandestine computer program designed to Denial-of-Service (DoS) is an attack meant to shut provide continued privileged access to a computer down a machine or network, making it inaccessible while actively hiding its presence. to its intended users. Today rootkits are generally associated with Victims of attacks often target web servers of malware such as Trojans, worms, viruses – that high-profile organizations such as banking, conceal their existence and actions from users and commerce, and media companies, or government other system processes. and trade organizations. Smishing Distributed Denial-of-Service A form of phishing in which an attacker uses a Distributed denial-of-service (DDoS) attack is a compelling text message to trick targeted recipients malicious attempt to disrupt the normal traffic of a into clicking a link and sending the attacker private targeted server, service or network by information or downloading malicious programs to a overwhelming the target or its surrounding smartphone. infrastructure with a flood of Internet traffic. Many users are already aware of the dangers of DDoS attacks achieve effectiveness by utilizing clicking a link in email messages. multiple compromised computer systems as Vishing sources of attack traffic. Uses verbal scams to trick people into doing things they believe are in their best interests. Phishing Vishing often picks up where phishing leaves off. Type of social engineering attack often used to In the example above, the victim clicked on a link steal user data, including login credentials and for an online advertisement related to personal credit card numbers. interests. It occurs when an attacker, masquerading as a Malware embedded in the link triggered a lock-up trusted entity, dupes a victim into opening an email, that only the helpful "technician" on the other end of instant message, or text message. the phone could fix. Spam They can hack any system even if they don't have A digital junk mail unsolicited communications permission to test the security of the system but sent in bulk over the internet or through any they will never steal money or damage the system. electronic messaging system. C. BLACK-HAT HACKERS Trojan Horse Unethical Hacker or a Security Cracker. A type of malware that downloads onto a Hack the system illegally to steal money or to computer disguised as a legitimate program. achieve their own illegal goals. It is so-called due to its delivery method, which Black hat hacking is illegal. typically sees an attacker use social engineering to They find banks or other companies with weak hide malicious code within legitimate software. security and steal money or credit card information. They can also modify or destroy the data as well. Virus A piece of code which is capable of copying itself Crackers and typically has a detrimental effect, such as Kind of bad people who breaks or violates the corrupting the system or destroying data. system or a computer remotely with bad intentions to harm the data and steal it. Ransomware Destroy data by gaining an unauthorized access A type of malicious software that infects a to the network. computer and restricts users' access to it until a There works are always hidden as they are doing ransom is paid to unlock it. illegal stuff. Bypasses passwords of computers and social Perpretrators of Network Attacks media websites, can steal your bank details and Hackers transfer money from bank. A computer hacker is a computer expert who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by nonstandard means. Share the knowledge and never damages the data. Types of Hackers A. WHITE HAT Malicious Insiders Hackers are also known as Ethical Hackers or a One of an organization's current or former Penetration Tester. employees, contractors, or trusted business White hat hackers are the good guys of the partners who misuses their authorized access to hacker world. critical assets in a manner that negatively affects They focus on security and protecting IT system. the organization. White hat hacking is legal. B. GRAY HAT Hybrid between Black hat Hackers and White hat hackers. The main difference between cybercrime and cyber terrorism lies in the objective of the attack. Cybercriminals are predominantly out to make money, while cyber terrorists may have a range of motives and will often seek to have a destructive impact, particularly on critical infrastructure. Industrial Spies The person engage in industrial espionage where the illegal and unethical theft of business trade secrets for use by a competitor to achieve a competitive advantage. Internet Trolls People who leave intentionally provocative or offensive messages on the internet in order to get attention, cause trouble or upset someone Internet Intruders People who install unwanted software while surfing the Internet, and that typically uses the Cybercriminals Internet in the process of exploiting the user and Individuals or teams of people who use the user's machine. technology to commit malicious activities on digital o MASQUERADER: An individual who is not systems or networks with the intention of stealing authorized to use the computer and who penetrates sensitive company information or personal data, a system’s access controls to exploit a legitimate and generating profit. user’s account Have access to the cybercriminal underground o MISFEASOR: A legitimate user who accesses markets found in the deep web to trade malicious data, programs, or resources for which such access goods and services, such as hacking tools and is not authorized, or who is authorized for such stolen data. access but misuses his or her privileges Cybercriminal underground markets are known to o CLANDESTINE USER: An individual who seizes specialize in certain products or services. supervisory control of the system and uses this control to evade auditing and access controls or to Hacktivists suppress audit. Groups of criminals who unite to carry out cyber attacks in support of political causes. Typically target entire industries but sometimes attack specific organizations who they feel don't align with their political views or practices. Cyberterrorists VIRTUAL PRIVATE NETWORK Benefits of a VPN Connection Virtual Private Network A VPN connection disguises your data traffic Describes the opportunity to establish a protected online and protects it from external access. network connection when using public networks. Unencrypted data can be viewed by anyone who It encrypt your internet traffic and disguise your has network access and wants to see it. With a online identity. VPN, hackers and cyber criminals can’t decipher This makes it more difficult for third parties to this data. track your activities online and steal data. oSECURE ENCRYPTION The encryption takes place in real time. oDISGUISING YOUR WHEREABOUTS o ACCESS TO REGIONAL CONTENT oSECURE DATA TRANSFER How does a VPN Work? A VPN hides your IP address by letting the network redirect it through a specially configured What should a good VPN Do? remote server run by a VPN host. You should rely on your VPN to perform one or This means that if you surf online with a VPN, the more tasks. VPN server becomes the source of your data. The VPN itself should also be protected against This means your ISP and other third parties compromise. cannot see which websites you visit or what data These are the features you should expect from a you send and receive online. comprehensive VPN solution A VPN works like a filter that turns all your data oEncryption of your IP address into"gibberish". oEncryption of protocols Even if someone were to get their hands on your oKill switch data, it would be useless. oTwo-factor authentication Remain incognito while browsing. Another use is using a public Wi-Fi. Your browsing activity not on the HTTPS website is visible to everyone nearby. Virtual Private Network Like LAN [local area network] but the major difference between VPN and LAN is that the devices that are part of a VPN could be anywhere not limited to a geographical area. If you want more privacy you can connect to a VPN. The local network will only see a single secure VPN connection. All other traffic will travel to VPN tunnel. Firewall A network security device that monitors and filters A VPN uses a technology called Tunnelling incoming and outgoing network traffic based on an Tunneling is a way to move packets from one organization's previously established security network to another. policies. Tunneling works via encapsulation: wrapping a It is essentially the barrier that sits between a packet inside another packet. private internal network and the public Internet. With a VPN, an employee can access his own Why do we use firewall? private corporate network while sitting at home or in Help protect your network by filtering traffic and a hotel. blocking outsiders from gaining unauthorized access to the private data on your computer. Many Chinese uses VPN to get around the great Its main purpose is to allow non-threatening traffic wall of china & gain access to the entire internet. in and to keep dangerous traffic out. Intranet We try to put these devices together in a A private network that can only be accessed by reasonable order authorized users. The prefix "intra" means "internal" and therefore Firewall implies an intranet is designed for internal A network security device that monitors incoming communications. and outgoing network traffic and permits or blocks For example, a business may create an intranet to data packets based on a set of security rules. allow employees to securely share messages and files with each other An intranet is a private network which is heavily protected by many different networking devices. Router A piece of network hardware that connects a local network to the internet. A router helps you connect multiple devices to the Internet, and connect the devices to each other. Firewalls Used in both personal and enterprise settings, and many devices come with one built-in, including Mac, Windows, and Linux computers DMZ Demilitarized Zone Known as a perimeter network or a screened subnetwork, is a physical or logical subnet that separates an internal local area network (LAN) from other untrusted networks -usually the public internet. Honeynet A network that is set up to attract potential attackers and distract them from your production network. IPS Intrusion Prevention System A network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits. IDS Intrusion Detection System A network security technology originally built for detecting vulnerability exploits against a target application or computer. This diagram is an overly-simplified version of the reality MANAGING KNOWLEDGE AND DATA Early 1990s-During this time, new client tools for developing applications including History of Database Management Systems the Oracle Developer, PowerBuilder, VB, Early days of keeping records and others were released The Sumerian uses tablet to keep records Mid 1990- Client-server database systems of their index of medical prescriptio were began to be used by the regular 1912's- Titanic ship manifest. desktop users to access computer systems 1910's- card catalogs. containing legacy data 1950's- record logbook. Late 1990- An Increase in demand for Flat file method- a simple consecutive list of Internet database connectors was caused records by an increased investment in online Finding record is sequential businesses. 2000s – Database applications continue to Modern days of keeping records grow even though the Internet industry went 1960's- when the use of computers became through a decline in the early 2000s. a more economical choice for private Today – Databases are everywhere and organizations, computerized database being used in enhancing people’s started. day-to-day lives. Many of the services Hierarchal Model-Parent Child node people utilize today are possible due to successfully use by NASA for lunar lander. databases. 1960's-First DBMS designed by Charles Bachman at CE known as IDS Integrated Data Warehousing Dato Store The secure electronic storage of information by a Network Model- it can have multiple parent, business or other organization. as it becomes complicated it is impossible The goal of data warehousing is to create a trove to manage of historical data that can be retrieved and analyzed 1970 to 1972- An important paper to to provide useful insight into the organization's propose the use of a relational database operations. model was published by EF. Codd. The thinking about databases was revolutionized Data Mining by his ideas Data mining helps to develop smart market 1974 and 1977, two major relational decision, run accurate campaigns, make database system prototypes were created, predictions, and more. Ingres and System R. developed at UBC With the help of Data mining, we can analyze and IBM San Jose respectively. customer behaviors and their insights Relational database- tables of related This leads to great success and data- driven information with connected fields easier to business. manage 1980s-Structured Query Language, also Data Governance known as SQL, became the standard query A set of processes that ensures that important language. The fast growth in computer data assets are formally managed throughout the sales advanced the database market, enterprise. causing major decline in the popularity of It ensures that trusted information is used for hierarchical and network database models, critical business processes, decision making and made relational database systems a accounting. commercial success. FILE-BASED SYSTEM VS DBMS The data files may be stored across multiple locations. Consequently, it is difficult to share the File-based Data Management System data easily with multiple users The systems used in organizing and maintaining data files are known as file-based data systems. Disadvantages of DBMS They are used to handling a single or multiple files Cost of Hardware and Software of a DBMS is quite but are not very efficient high DBMS cre often complex systems, so the training for users required. Database Management System (DEMS) DBMS can't perform sophisticated calculations It is a software system that lets users to define, It required a processor with the high speed of data create, maintain and manage access to the processing. database. The database can fail because or power failure or Through the DBMS, users can create, read, the whole system stops. update and delete data in a database. It is a layer The cost of DBMS is dependent on the between data and programs environment. function, or recurrent annual maintenance cost. Advantages of File Based System Not complicated and is simpler to use. This system is fairly economical. Simple and cheap, it is usually appropriate for home users and owners of small businesses. Used by smaller organizations or individual users, comparatively lesser amount of data is being stored. Thus, the data can be accessed more efficiently. Advantages of DBMS Controls the redundancy in the database. Restricts unauthorized access. Provides a storage structure and multiple techniques for query processing. Provides backup and recovery. Provides multiple user interfaces. Enforces Constraints on the data. Reduces application development time. Disadvantages of File Based System Limited to a smaller size and cannot store large amounts of data Relatively uncomplicated but this means it cannot support complicated queries, and data recovery. There may be redundant data as it does not have a complex mechanism to get rid of it. The data is not very secure in a file based system and may be corrupted or destroyed. MS ACCESS DATASHEET VIEW The Table The table is now added to the list of tables in the Create a Table in Data Sheet View left Navigation Pane. Click the Table Button Click Table on the Ribbon (from the Create tab). Data vs Database A blank table will appear. Data - Any kind of information presented in different formats (words, numbers, images) all this Add a Field information is data only, but when kept it together Click Click to Add to add a new field. and stored in a structured way, then it becomes Select a data type from the contextual menu that informational data. expands when you click. Database - Simply holds data that could be in any Not sure which data type to use? number of formats (electronic, printed, graphic, Think about the type of data that will be stored in audio, statistical, combinations). the field. That guide you as to which data type you A database is an electronic system that allows should choose here. data to be stored, easily accessed, manipulated and updated. To make real use of the data, you Name the Field need a Database Management System (DBMS). Once you've selected a data type, Access highlights the column header so that you can name Database vs DBMS the field. Database - group of interconnected data and Enter a name for the field. data is a group of facts and figures needed to be Repeat steps 2 and 3 for as many fields that you processed in producing information. need to add. DBMS - a software designed to store data in a way that it becomes easier to retrieve, manage, Renaming Fields and processed to produce information When you create a new table, Access automatically adds a new field called ID with a data Data Organization type of AutoNumber. The practice of categorizing and classifying data to You can rename this field if you wish. make it more usable. To do this, right-click in the field and select Location Rename Field. Alphabetical organization Access with highlight the field name for you to Time rename it. Hierarchy Enter a new name as required. Category Save the Table Relational Database Once you've set up the table, you should save it. Refers to a database that stores data in a To save the table, right-click on the table's tab and structured format, using rows and columns. select Save. This makes it easy to locate and access specific You can also close the table by clicking the X and values within the database. Access will prompt you to save it. It is "relational" because the values within each table are related to each other. Name the Table Tables may also be related to other tables. Enter a name for the table and click OK The relational structure makes it possible to run queries across multiple tables at once. Advantages of a Relational Database Scalability: New data may be added independent of existing records. Simplicity: Complex queries are easy for users to perform with SQL. Data Accuracy: Normalization procedures eliminate design anomalies. Data Integrity: Strong data typing and validity checks ensure accuracy and consistency. Security: Data in tables within a RDBMS can limit access to specific users. Collaboration: Multiple users can access the same database concurrently. Microsoft Access Forms provide a quick and easy way to modify and insert records into your databases. Has capabilities to answer more complex requests or queries. Access queries provide the capability to combine data from multiple tables and place specific conditions on the data retrieved. Microsoft Access Benefits Ease of use- Even first-timers succeed in navigating and using the software effectively. The available built-in templates, which can also be created and customized using the existing applications, can help in creating a database in a seamless and easy way. User friendly- does not require complex technical knowledge in order to make it work, making it a great software to use for individuals without coding skill but in need of software to create and share applications that can boost the efficiency of the team and the productivity of the business. Seamless integration- can work well along with other business applications and numerous different data sources through its connector library. The software’s DB enables users to store their data to Azure SQL and SQL Service to make sure that all the information can be easily managed, remains reliable, and is fully secured.