Key Terms
Current primary use
Security (unlocking devices, authentication).
Future potential
Product and service customization.
One-line summary
Businesses use information to gain competitive advantage. Zoom in and it cuts across everything — primary activities and
Key feature
EDI (Electronic Data Interchange) — enables large quantities of data like invoices and orders to be instantly shared bet
Range
Harmless (displaying an image) to catastrophic (permanently erasing data, destroying entire networks).
Motives include
Profit (ransomware), political messaging, personal amusement, exposing vulnerabilities, sabotage, denial of service.
Cost
Both time and money while systems are down.
ERP (Enterprise Resource Planning)
System that tracks business resources and commitments across departments
POS (Point of Sale)
System that captures transaction data at checkout
RFID (Radio Frequency Identification)
Chip-based technology that enables physical-world tracking
Intranet
Private internal network for staff only; built on LAN/WAN technology
Extranet
Intranet extended to selected external parties (customers, suppliers)
EDI (Electronic Data Interchange)
Technology enabling instant digital data sharing between organizations, replacing paper
Virus
Code inserted into a program that lies dormant until triggered
Ransomware
Profit-motivated malware that locks files and demands payment