INFORMATION SYSTEMS - CS507 Final Term Subjectives All in One
INFORMATION SYSTEMS - CS507 Final Term Subjectives All in One
INFORMATION SYSTEMS - CS507 Final Term Subjectives All in One
In order to justify the product design, which two approaches can be followed? (2 marks)
“Exception report can also be prepared from audit logs”. In this statement, what does Exception report mean
and what does it contain? (2 marks)
Consider a situation where unauthorized changes are made to system accidently or deliberately, then what
kind of threat has occurred and why? (2 marks)
From the given below statements recognize types of intrusion occurs in a system
Zara creates her account at gmail.com. She login her account, check her mails. Then she reset her
passwords to keep her account secure from hackers. How can she make password more secure? (3 marks)
Ibrahim textile mill is going to launch an information system to interconnect its entire departments. The mill
owner wants the implementation of Information System immediately. It is very difficult for developer team to
make such information system in a very short time. As an I.T consultant what will you suggest to resolve this
issue? (3 marks)
Can we classify disaster with respect to its categories? If yes, then write down the classification. (3 marks)
How will you incorporate SDLC in risk management? Also identify phases of Risk Management? (5 marks)
A management consulting firm specializing in change management processes such as launching new
businesses, completing mergers, and doing internal reorganizations. The firm needed to automate their
business processes. In addition, the company needed new functionality such as the ability to build client
activity sequences and hierarchies, capture and update the status of change management events,
disseminate change activity information by viewing, printing, summarizing, and building presentations. How
can you fulfill its requirement change? (5 marks)
Suzuki motors has its own website. All of their brand details are available. Now they have launched a new
brand of car, they have organized all the data related to their brand and finally drawn out a report. How is
report preparation beneficial? (5 marks)
FINALTERM EXAMINATION
Spring 2011
CS507- Information Systems
17th July, 2011
FINALTERM EXAMINATION
Spring 2011
CS507- Information Systems
5 Marks Question:
Q6: Differentiate between CRM and ERP?
Q7: Define Ecommerce and also tell how it helps in Business?
Q8: How much IS Integration function important and define in detail?
Q9: Compare the functions of Small Size Organization to the Large Size
Organization?
Q10: Define Firewall in detail and how it protects computer from the threats?
Answer
“A threat is some action or event that can lead to a loss.”
Various types of threats may exist that could, if they occur result in
information assets being exposed, removed either temporarily or
permanently, lost, damaged, destroyed, or used for un-authorized
purposes are identified. Susceptibility to threats, whether logical or
physical are a major risk factor for the data base
and information system of an organization. These risks are to be
identified and steps that include physical and logical controls need to
be instituted and monitored on a regular basis.
Define Computer Aided Manufacturing (CAM)? (2 marks)
Answer
Computer-aided manufacturing (CAM) is a form of automation
where computers communicate work instructions directly to the
manufacturing machinery. The technology evolved from the
numerically controlled machines of the 1950s, which were directed
by a set of coded instructions contained in a punched paper tape.
Today a single computer can control banks of robotic milling
machines, lathes, welding machines, and other tools, moving the
product from machine to machine as each step in the
manufacturing process is completed. Such systems allow easy, fast
reprogramming from the computer, permitting quick implementation
of design changes. The most advanced systems, which are often
integrated with computer-aided design systems, can also manage
such tasks as parts ordering, scheduling, and tool replacement. It is
a system that uses computer aided techniques to control production
facility. Some of these techniques are Computer-aided process
planning – Use of computer to control activities and functions to
prepare a detailed set of plans and instructions to produce a
machine or part. -- Machines Computerised Numerical control (CNC)
– refers specifically to the computer control of machine tools for the
purpose of (repeatedly) manufacturing complex parts in metal as
well as other materials. e.g. drills, wood routers use this technology.
Robotics programming – The science or study of the technology
associated with the design, fabrication, theory, and application of
robots. – Automobile industry.
Answer
A Trojan horse is a malicious program that is disguised as or
embedded within legitimate software. They may look useful or
interesting (or at the very least harmless) to an unsuspecting
user,but are actually harmful when executed. Examples are
Logic bomb – Trojan horses are triggered on certain event, e.g.
when disc clean up reaches a
certain level of percentage
Time bomb – Trojan horse is triggered on a certain date.
What are the objectives of ERP? (2 marks)
Answer
Enterprise Resource Planning or ERP uses multimodal application
software for improving the performance of the internal business
processes. ERP software systems may include application modules
for supporting marketing, finance, accounting and human resources
Answer
“ERP (enterprise resource planning) is an industry term for the
broad set of activities supported by multi-module application
software that helps a manufacturer or other business manage the
important parts of its business, including product planning, parts
purchasing, maintaining inventories, interacting with suppliers,
providing customer service, and tracking orders.
Answer
Ethical Challenges
Information system security association of USA has listed down
following ethical challenges
1. Misrepresentation of certifications, skills
2. Abuse of privileges
3. Inappropriate monitoring
4. Withholding information
5. Divulging information inappropriately
6. Overstating issues
7. Conflicts of interest
8. Management / employee / client issues
Answer
Systems Development Life Cycle System Development Life Cycle
(SDLC) is the overall process of developing information systems
through a multi-step process from investigation of initial
requirements through analysis, design, implementation and
maintenance. SDLC is also known as information systems
development or application development. SDLC is a systems
approach to problem solving and is made up of several
phases, each comprised of multiple steps. It describes the stages a
system passes through from inception until it is discarded or
replaced. SDLC provides
• Structure
• Methods
• Controls
• Checklist
Answer
Risk identification is often confused with risk mitigation. Risk
mitigation is a process that takes place after the process of risk
assessment has been completed. Let’s take a look at various risk
mitigation options.
• Risk assumption: To accept the potential risk and continue
operating the IT system or to
implement controls to lower the risk to an acceptable level.
• Risk Avoidance: To avoid the risk by eliminating the risk cause and
e.g. forgo certain functions of
the system or shut down the system when risks are identified.
• Risk Limitation: To limit the risk by implementing controls that
minimize the adverse impact of a
threat’s exercising a vulnerability e.g. use of supporting preventive
and detective controls.
• Risk Planning: To manage risk by developing a risk mitigation
plant that predicts implements and
maintains controls.
• Research and acknowledgement: To lower the risk of loss by
acknowledging vulnerability or flaw
and researching controls to correct the vulnerability.
• Risk Transference: To transfer the risk by using other options to
compensate loss such as
purchasing insurance.
Answer
A Trojan horse is a malicious program that is disguised as or
embedded within legitimate software.
They may look useful or interesting (or at the very least harmless)
to an unsuspecting user, but are actually harmful when executed.
Examples are
Logic bomb – Trojan horses are triggered on certain event, e.g.
when disc clean up reaches a
certain level of percentage
Time bomb – Trojan horse is triggered on a certain date.
Answer
Production Sub System
It can be seen as the most critical part of the entire manufacturing
sub system. Basically it tracks the flow of the job through the entire
production process. It also records change in form of goods or
transfer of goods from one place to the other.
Example Consider a manufacturing entity working with three
processing departments and one assembly
department. As raw materials pass through the processes, the sub
system records the relevant information at specific points or
locations until the finished goods are transferred to stock room
Answer
Model driven DSS uses following techniques
What-If analysis
Attempt to check the impact of a change in the assumptions (input
data) on the proposed solution
e.g. What will happen to the market share if the advertising budget
increases by 5 % or
10%?
Goal Seek Analysis
Attempt to find the value of the inputs necessary to achieve a
desired level of output. It uses “backward” solution approach e.g. a
DSS solution yielded a profit of $2M. What will be the necessary
sales volume to generate a profit of $2.2M?
Define object mark 2
Answer
An object is defined as
“an abstraction of something in a problem domain, reflecting the
capabilities of the system to keep information about it, interact with
it, or both.”
How virus and worn can be transmitted into computer?
Identify any three sources? (3)
Answer:
Virus or worms are transmitted easily from the internet by
downloading files to computers web browsers. Other methods of
infection occur from files received though online services, computer
bulletin board systems, local area networks. Viruses can be placed
in various programs, for instance
1. Free Software – software downloaded from the net
2. Pirated software – cheaper than original versions
3. Games software – wide appeal and high chances
4. Email attachments – quick to spread
5. Portable hard and flash drives – employees take disks home and
may work on their own personal PC, which have not been cleaned or
have suitable anti-viruses installed on them.
Answer
Answer
The three security goals.
• Loss of integrity: System and data integrity refers to the
requirement that information should be
protected from improper modification. Integrity is lost if unauthorized
changes are made to the data or IT system by either intentional or
accidental loss of system or data. Violation of integrity may be the
first step in a successful attack against availability or confidentiality.
For all these reasons, loss of integrity reduces assurance of an IT
system.
• Loss of availability: If a mission-critical IT system is unavailable to
its end user, the organization’s missions may be affected. Loss of
system functionality and operational effectiveness.
• Loss of confidentiality: System and data confidentiality refers to the
protection of information from unauthorized disclosure. The impact of
unauthorized disclosure of confidential information can
range from the jeopardizing of national security. Unauthorized,
unanticipated, or unintentional disclosure could result in loss of public
confidence embarrassment or legal action against the
organization
Consequences of thread occurrence? Mark 5
Answer When a threat occurs, there can be following consequences.
1. Controls against the threat exists
• Controls can help stop the occurrence of the threat.
• Threat occurs but damage is avoided by the controls
• Threat circumvents controls and causes damage
2. Controls against threat do not exist.
• Threat has not yet been identified
• Threat has been identified but the consequent loss is considered as
minor
• Threat occurs, whether identified or Threat can cause damage
whether controls exist or not.
5. What you know about Malware? and what types of the Malware are there
gives examples.. 5 marks
6. What are components of Intrusion detection system? 3 marks
Sensors that are responsible for collecting data. The data can be in the form of
network
packets, log files, system call, traces, etc. Analyzers that receive input from
sensors and
determine intrusive activity An administrative console – it contains intrusion
definitions applied
by the analyzers.A user interface
7.
10. what is change management and what are its types? 5 marks
Types of change management:
1- Organizational Development:
2- Re-engineering
13.
Hackers
A hacker is a person who attempts to invade the privacy
of the system. In fact he attempts to gain un
authorized entry to a computer system by circumventing
the system’s access controls. Hackers are normally
skilled programmers, and have been known to crack
system passwords, with quite an ease. Initially hackers
used to aim at simply copying the desired information
from the system. But now the trend has been to corrupt
the desired information.
( M a r k s: 2 )What is an entity?
EntityAn entity is an object that exists and is
distinguishable from other objects. An entity is
described using a setof attributes. For example
specific person, company, event, plant, crop,
department, section, cost center.
( M a r k s: 2 ) What is CRM?
CRM is a business strategy that goes beyond increasing
transaction volume.• Its objectives are to increase
profitability, revenue, and customer satisfaction.• To
achieve CRM, a company wide set of tools, technologies,
and procedures promote the relationshipwith the
customer to increase sales.• Thus, CRM is primarily a
strategic business and process issue rather than a
technical issue.
OR
Customer relationship management (CRM) is a widely-
implemented strategy for managing a company’s
interactions with customers, clients and sales
prospects. It involves using technology to organize,
automate, and synchronize business processes—
principally sales activities, but also those
for marketing, customer service, and technical support.
The overall goals are to find, attract, and win new
clients, nurture and retain those the company already
has, entice former clients back into the fold, and
reduce the costs of marketing and client service.
[1]
Customer relationship management describes a company-
wide business strategy including customer-interface
departments as well as other departments.[2]
Hackers
A hacker is a person who attempts to invade the privacy
of the system. In fact he attempts to gain un
authorized entry to a computer system by circumventing
the system’s access controls. Hackers are normally
skilled programmers, and have been known to crack
system passwords, with quite an ease. Initially hackers
used to aim at simply copying the desired information
from the system. But now the trend has been to corrupt
the desired information
I.
10) define IDS 2 marks
Intrusion Detection Systems (IDS)Another element to
securing networks is an intrusion detection system
(IDS). IDS is used incomplement to firewalls. An IDS
works in conjunction with routers and firewalls by
monitoringnetwork usage anomalies. It protects a
company’s information systems resources from external
aswell as internal misuse.
I.
11) describe trojans virus 2 marks
A Trojan horse is a malicious program that is disguised
as or embedded within legitimate software.They may look
useful or interesting (or at the very least harmless)
to an unsuspecting user, but areactually harmful when
executed. Examples are• Logic bomb – Trojan horses are
triggered on certain event, e.g. when disc clean up
reaches acertain level of percentage• Time bomb –
Trojan horse is triggered on a certain date.
I.
Subjective Part of Final Term paper Share by one
student
I.
II. 10) How can we make our password secure?
Passwords“Password is the secret character string that
is required to log onto a computer system,
thuspreventing unauthorized persons from obtaining
access to the computer. Computer users maypassword-
protect their files in some systems.”Misuse of
passwordsA very simple form of hacking occurs when the
password of the terminal under the use of aparticular
employee is exposed or become commonly known. In such a
situation access to theentire information system can be
made through that terminal by using the password. The
extent ofaccess available to an intruder in this case
depends on the privilege rights available to the
user.33.5 Best Password practices• Keep the password
secret – do not reveal it to anyone• Do not write it
down – if it is complex, people prefer to save it in
their cell phone memory, orwrite on a piece of paper,
both of these are not preferred practices.
• Changing password regularly – Passwords should be
associated with users not machines.Password generation
program can also be used for this purpose.• Be discreet
– it is easy for the onlookers to see which keys are
being used, care should be takenwhile entering the
password.• Do not use obvious password – best approach
is to use a combination of letters, numbers,upper case
and lower case. Change passes word immediately if you
suspect that anyone elseknows it
I.
II. 11) Identify components of Intrusion detection
system?
Components of an IDSAn IDS comprise of following
components:• Sensors that are responsible for
collecting data. The data can be in the form of
networkpackets, log files, system call, traces, etc.•
Analyzers that receive input from sensors and determine
intrusive activity• An administrative console – it
contains intrusion definitions applied by the
analyzers.• A user interface