Exam MIS

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Annex-B

NATIONAL UNIVERSITY OF MODERN LANGUAGES, ISLAMABAD


Department of -------------------------
End Term Examination Fall 2021

Roll No: Kc#1276 Class/ Section: Bb4

System ID: Program: BBA

Email Address: Haniamir81149@gmail.com Teacher’s Name: Fahad husain

Course Title: Campus: Karachi campus

Course Code: Class/ Section:

Instructions:

(1) Be mindful of time. Try to finish your answers within prescribed time. Upload
your answers within 15 minutes after the paper time.
(2) Honestly observe all online examination protocols with your cameras on.
(3) If you upload hand-written answer scripts, write legibly so that so that teachers
can conveniently read and grade your papers.
(4) Be precise and relevant in your answers.

Question no 1
Computer systems play such a basic part in trade, government, and lifestyle that firms have to be
make security and control a best need. Security refers to the approaches, strategies, and
specialized measures utilized to avoid unauthorized get to, change, robbery, or physical harm to
data frameworks. Controls comprise of all the strategies, arrangements, and organizational
strategies that guarantee the security of the organization’s resources, the exactness and
unwavering quality of its bookkeeping records, and operational adherence to administration
benchmarks.
When huge amounts of information are put away in electronic frame, they are vulnerable to
numerous more sorts of dangers than when they exist in manual shape. Through communications
systems, data frameworks in numerous areas can be interconnected. The potential for
unauthorized get to, mishandle, or extortion isn't restricted to a single area but can happen at any
get to point within the organize.
Users at the client layer can cause hurt by presenting mistakes or by getting to frameworks
without authorization. It is possible to get to information streaming over systems, take profitable
information during transmission, or modify messages without authorization. Radiation can
disturb a arrange at different focuses as well. Gatecrashers can dispatch dissent of benefit
assaults or malicious computer program to disturb the operation of Web sites.

Contemporary security challenges and vulnerabilities


a Web-based application ordinarily incorporates a Web client, a server, and corporate data
frameworks connected to databases. Each of these components presents security challenges and
vulnerabilities. floods, fires, control disappointments, and other electrical issues can cause
disturbances at any point within the arrange.
Frameworks glitch in case computer equipment breaks down, isn't arranged appropriately, or is
harmed by inappropriate utilize or criminal acts. Blunders in programming, inappropriate
establishment, or unauthorized changes cause computer program to come up short.
Without strong shields, valuable information may be misplaced, annihilated, or might drop into
the off-base hands, uncovering imperative exchange privileged insights or data that abuses
individual protection. A few stresses that outsourcing application advancement to seaward
companies might give openings for software engineers to embed covered up code that would
afterward empower somebody to pick up control over an application or its information.

Malicious Software:
it means software that can be utilized to compromise computer capacities, take information, bypass get
to controls, or something else cause hurt to the have computer. The foremost common sorts of
malicious; bugs, spyware, Trojan horses, worms and viruses.

• Worms
A worm may be a malevolent program which similar to that of a computer virus could be
a self-replicating program, in any case, within the case of worms, it consequently
executes itself.

• Bugs
In computing, a bug is a mistake within the source code that causes a program to deliver
startling comes about or crash inside and out. Computer bugs can influence an
application’s performance, so designers have to be made beyond any doubt they are
adjusted some time recently the computer program gets sold to customers.

• Spyware
It is undesirable software that penetrates your computing device, taking your internet
utilization information and touchy data.

• Trojan horse
Trojan could be a sort of malware that's regularly masked as legitimate software. Trojans
can be utilized by cyber-thieves and programmers attempting to pick up get to to users'
frameworks. Clients are ordinarily deceived by a few shapes of social designing into
stacking and executing Trojans on their frameworks.

• Virus
A virus could be a submicroscopic infectious agent that reproduces as it were interior the
living cells of a living being. Viruses taint all sorts of life shapes, from creatures and
plants to microorganisms, counting bacteria and archaea

Question 2
Firewalls anticipate unauthorized clients from getting to a private arrange when it is connected to the
Web. Interruption location frameworks screen private systems from suspicious arrange activity and
endeavors to get to corporate frameworks. Passwords, tokens, keen cards, and biometric verification
are utilized to verify frameworks clients. Antivirus computer program checks computer frameworks for
contaminations by infections and worms and frequently disposes of the pernicious computer program,
whereas antispyware program combats meddlesome and hurtful spyware programs. Encryption, the
coding and scrambling of messages, may be a broadly utilized innovation for securing electronic
transmissions over unprotected systems. Advanced certificates combined with open key encryption give
advance security of electronic exchanges by verifying a user’s personality. Companies can utilize fault-
tolerant computer systems or make high-availability computing situations to create beyond any doubt
that their data frameworks are continuously accessible. Utilize of computer program measurements and
thorough program testing offer assistance make strides program quality and unwavering quality.

Some important tools technologies for safeguarding Information Systems:

• Authentication:
The capacity to know that an individual is who he or she claims to be. Built up through
passwords.

• Password
It is known as it were to authorized clients. employments particular word to long on to a
computer framework and for getting to particular frameworks and records.

• Intrusion detection systems


It includes full-time observing instruments set at the foremost powerless focuses or hot spots of
corporate systems to identify and prevent gatecrashers ceaselessly. Produces an caution in case
it finds a suspicious or atypical occasion.

• Antivirus software
It anticipates, identifies, and expels malware, counting computer infections, computer worms,
Trojan steeds, spyware, and adware. Most are successful as it were against malware as of now
known when the computer program was composed. Must be persistently overhauled. Not
continuously successful since a few malwares can avoid antivirus location.

• Token
A physical gadget, comparative to a recognizable proof card, that's planned to demonstrate the
character of a single client. Little contraptions that regularly fit on key rings and show passcodes
that alter frequently.

• Smart card
A gadget around the estimate of a credit card that contains a chip designed with get to
authorization and other information.

• ENCRYPTION:
It Provides security for electronic transmission through the unprotected networks.

• Firewalls
It anticipates unauthorized clients from getting to private networks. A combination of
equipment and computer program that controls the stream of approaching and active arrange
traffic. Generally, set between the organization's private inner systems and doubted outside
systems, such as the Web, in spite of the fact that firewalls can moreover be utilized to secure
one portion of a company's arrange from the rest of the arrange.

Question 3

Basic components of computer network:


Computer frameworks share common gadgets, capacities, and highlights tallying servers, clients,
transmission media, shared data, shared printers and other equipment and computer program
resources, organize interface card (NIC), nearby working framework (LOS), and the arrange
working framework (NOS).

• Servers
Servers are computers that hold shared records, programs, and the organize working
framework. Servers give get to to organize assets to all the clients of the arrange.

• Clients
Clients are computers that get to and utilize the arrange and shared arrange assets. Client
computers are essentially the customers(users) of the arrange, as they ask and get
administrations from the servers.

• Transmission Media
Transmission media are the offices utilized to interconnect computers in a organize, such
as twisted-pair wire, coaxial cable, and optical fiber cable.

• Shared information
Shared information are information that record servers give to clients such as
information records, printer get to programs and e-mail.

• Shared printers and other peripherals


Shared printers and peripherals are equipment assets given to the clients of the arrange by
servers

• Network Interface Card


Each computer in a organize includes a uncommon development card called a organize
interface card (NIC). The NIC prepares(formats) and sends information, gets
information, and controls information stream between the computer and the network.

• Local Operating System


A nearby working framework permits individual computers to get to records, print to a
neighborhood printer, and have and utilize one or more disk and CD drives that are
found on the computer
• Network Working Framework
The organize working framework could be a program that runs on computers and servers
that permits the computers to communicate over the network.

• Hub

Center could be a gadget that parts a arrange association into different computers. It is
like a dispersion center. When a computer demands data from a organize or a specific
computer, it sends the ask to the center through a cable.

• Switch
Switch may be a media transmission gadget gathered as one of computer organize
components. Switch is like a Center but built in with progressed highlights. It
employments physical gadget addresses in each approaching messages so that it can
provide the message to the correct goal or port.

• Router
When we conversation almost computer organize components, the other gadget that
utilized to associate a LAN

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy