There were 53 Questions in All .... Total M a r k s: 80
MCQs = 40 for 40 Marks
Subjects= 13 for 40 Marks ( five for 2 marks , Five for 3 marks and three for 5 marks )
mcqs
Subjectives which i remember
1. Define Class? 2 marks
2. a)Define Ethics?
b) Code of ethics?
3. What is uses of DSS gives examples. 3 marks
4. What are the types of threats ? 5 marks
Answer: There are three types of threats.
1-Physical threats: It refers to damage caused to the physical infrastructure of information
system. For example:
1-Fire
2-Water
3-Intrusion
4-Energy variation
5-Pollution
6-Structural damage
2-Logical Threat: It refers to damage caused to the information system without any physical
presence.
1-Worms and viruses
2-Logical intrusion
5. What you know about Malware? and what types of the Malware are there gives examples.. 5 marks
6. What are components of Intrusion detection system? 3 marks
Sensors that are responsible for collecting data. The data can be in the form of network
packets, log files, system call, traces, etc. Analyzers that receive input from sensors and
determine intrusive activity An administrative console – it contains intrusion definitions applied
by the analyzers.A user interface
7.
There are two major components
• DSS data base – is a collection of current and historical data from internal external sources. It
can be a massive data warehouse.
• DSS data base – is a collection of current and historical data from internal external sources. It
can be a massive data warehouse.
8. list down the components of IDS
Components of IDS
An IDS comprises on the following:
• Sensors that are responsible for collecting data. The data can be in the form of network packets,
log files, system call traces, etc.
• Analyzers that receive input from sensors and determines intrusive activity.
• An administration
9. Define intrusion detection 2 marks
An element to securing networks is an intrusion detection system (IDS). IDS is used in
complement to firewalls. An IDS works in conjunction with routers and firewalls by monitoring
network usage anomalies. It protects a company’s information systems resources from external
as well as internal misuse
10. what is change management and what are its types? 5 marks
Types of change management:
1- Organizational Development:
2- Re-engineering
11. what is Access Controls , explain with a practical example? 3 marks
Access Controls
These controls establish the interface between the would-be user of the computer system and the
computer itself. These controls monitor the initial handshaking procedure of the user with the
operating system. For example when a customer enter the card and the pin code in an automatic
teller machine (ATM), the access controls are exercised by the system to block unwanted or
illegitimate access.
12. what are the intruders ?
13.
Detection
Intrusion detection
Intrusion detection refers to the process of identifying attempts to penetrate a system and gain unauthorized access. If audit trails have been designed and implemented to record appropriate information, they can assist in intrusion detection. Intrusion detection system can be made part of the regular security system to effectively detect intrusion. Real time intrusion detection is technical and complex to achieve but reasonable extent can be attained. Real-time intrusion detection is primarily aimed at outsiders attempting to gain unauthorized access to the system.
Variance detection and audit trails
Trends/variance-detection tools look for anomalies in user or system behavior. It is possible to
monitor usage trends and detect major variations. The log can be detected and analyzed to detect
the irregularity. For example, if a user typically logs in at 9 a.m., but appears at 4:30 a.m. one
morning, this may indicate either a security problem or a malfunctioning of the system clock,
that may need to be investigated. The log can be sorted/filtered for all log ins befor 9 a.m. from
that particular terminal
14. Differentiate between Objective & Scope of intrusion detection system. 3 marks
Sahred By Huma Ashraf
There were 40 MCQs
5 short q of 2 mark
5 short q of 3 mark
3 short q of 5 mark
Subjective portion is as followed
What are the parameters to b covered by designing useable n complete input ? 2
What are basic issues that should b considered at very beginning of system development planning ?2
Application events n user events belong to which audit record n y ? 2
Identify types of change management ?2
What are security threats to information system ?2
How passwords can b secured ? 3
What r reusable soft wares ?3
Define risk determination?3
How information is kept in purchase system ? 3
Differ CRM from ERP ?3
Important of computer security system in aviation industry ?5
How firewall protect the network from unauthorized access ? 5
How will u incorporate SDLC in risk management n write the phases of risk management ?5