Topic: The Internet, Cloud Computing, IS Security and Blockchain

Search 500 + past questions and counting.
  • Filter by Professional Bodies

  • Filter by Subject

  • Filter by Series

  • Filter by Topics

  • Filter by Levels

BMIS – May 2020 – L1 – Q5a – The internet, cloud computing, IS security and blockchain

Explain types of cyber-attacks that might cause a company’s website to shut down.

Your company’s website has been shut down as a result of a cyber-attack.

Required:
Explain SEVEN (7) types of attacks that might have caused the shutdown. (10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – May 2020 – L1 – Q5a – The internet, cloud computing, IS security and blockchain"

BMIS – Nov 2023 – L1 – Q5a – The internet, cloud computing, IS security and blockchain

Explain five controls that an organization can adopt to provide security for its computer systems and stored data.

Computer systems are increasingly being exposed to security risks which threaten the security and integrity of the systems and data storage. The good news however is that these risks can greatly be minimised through a variety of controls which provide network and communication security.

Required: Explain FIVE (5) controls which could be adopted by an organisation to provide security for its computer systems and data stored.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – Nov 2023 – L1 – Q5a – The internet, cloud computing, IS security and blockchain"

BMIS – Nov 2017 – L1 – Q5 – The internet, cloud computing, IS security and blockchain

Distinguish between data and information, explain the steps in converting data into information, and identify essential qualities of information.

a) Distinguish between data and information.
(2 marks)

b) Explain the steps involved in converting data into information.
(10 marks)

c) Identify and explain FOUR essential qualities of information.
(8 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – Nov 2017 – L1 – Q5 – The internet, cloud computing, IS security and blockchain"

BMIS – May 2017 – L1 – Q4b – The internet, cloud computing, IS security and blockchain

Identify key risks threatening system security and data integrity and outline methods to minimize these risks.

Computer systems are exposed to security risks that threaten the security and integrity of both the system and data held in it. These threats are becoming increasingly sophisticated and seem to multiply by the day, resulting in endless headaches for IT professionals.

With each new piece of technology arriving on the scene, a security threat seems to accompany it. The key for IT is to constantly evaluate current security measures and policies to identify any shortcomings that may be exposing the company to risk.

Required: Explain THREE main risks that threaten security and integrity of systems and data held in them and TWO ways to minimize such risks. (10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – May 2017 – L1 – Q4b – The internet, cloud computing, IS security and blockchain"

BMIS – Nov 2015 – L1 – Q7 – The internet, cloud computing, IS security, and blockchain

Discuss the proper acquisition of software and handling of software defects and problems.

SoEasy is a medium-sized firm in the detergent manufacturing sector. It started operations in 2008 and its customer base is quite large, comprising both foreign and local firms and individuals.

In July 2012, the management of SoEasy approved the automation of its operations using an off-the-shelf package. Around May 2013, a number of defects and problems were identified with the software. The local agents of the software providers were accordingly invited for a discussion and solution of the defects and problems.

The management of SoEasy directed that to save time, the agents should quickly do the fixes on their own for normal operations to continue.

After the agents reported they had completed their job, operations continued without any tests being performed. Two months later, operations nearly came to a halt because of software issues.

Required:
a) Explain how the software should have been acquired and the bugs (software errors) corrected. (10 marks)
b) Advise the management of SoEasy on the way software defects and problems should have been handled in the future. (10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – Nov 2015 – L1 – Q7 – The internet, cloud computing, IS security, and blockchain"

BMIS – April 2022 – L1 – Q5b – The internet, cloud computing, IS security and blockchain

Explain four measures to prevent the repetition of a hacking incident in a company’s network.

You are the Chairman of a committee appointed by the Management of your company to investigate the recent hacking of the firm’s computer network and consequent loss of very sensitive information, which disrupted operations for some days.

Required:
State and explain FOUR (4) measures which can be put in place to forestall the repetition of such an incident in the future. (10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – April 2022 – L1 – Q5b – The internet, cloud computing, IS security and blockchain"

BMIS – May 2016 – L1 – Q7b – The internet, cloud computing, IS security and blockchain

State five measures that can be put in place to prevent hacking of a company’s computer network.

Your company’s computer network was recently hacked into by fraudsters, stealing sensitive information. This has affected the credibility of the company. State FIVE measures that can be put in place to prevent a repetition of such an incident in the future.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – May 2016 – L1 – Q7b – The internet, cloud computing, IS security and blockchain"

BMIS – May 2020 – L1 – Q5a – The internet, cloud computing, IS security and blockchain

Explain types of cyber-attacks that might cause a company’s website to shut down.

Your company’s website has been shut down as a result of a cyber-attack.

Required:
Explain SEVEN (7) types of attacks that might have caused the shutdown. (10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – May 2020 – L1 – Q5a – The internet, cloud computing, IS security and blockchain"

BMIS – Nov 2023 – L1 – Q5a – The internet, cloud computing, IS security and blockchain

Explain five controls that an organization can adopt to provide security for its computer systems and stored data.

Computer systems are increasingly being exposed to security risks which threaten the security and integrity of the systems and data storage. The good news however is that these risks can greatly be minimised through a variety of controls which provide network and communication security.

Required: Explain FIVE (5) controls which could be adopted by an organisation to provide security for its computer systems and data stored.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – Nov 2023 – L1 – Q5a – The internet, cloud computing, IS security and blockchain"

BMIS – Nov 2017 – L1 – Q5 – The internet, cloud computing, IS security and blockchain

Distinguish between data and information, explain the steps in converting data into information, and identify essential qualities of information.

a) Distinguish between data and information.
(2 marks)

b) Explain the steps involved in converting data into information.
(10 marks)

c) Identify and explain FOUR essential qualities of information.
(8 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – Nov 2017 – L1 – Q5 – The internet, cloud computing, IS security and blockchain"

BMIS – May 2017 – L1 – Q4b – The internet, cloud computing, IS security and blockchain

Identify key risks threatening system security and data integrity and outline methods to minimize these risks.

Computer systems are exposed to security risks that threaten the security and integrity of both the system and data held in it. These threats are becoming increasingly sophisticated and seem to multiply by the day, resulting in endless headaches for IT professionals.

With each new piece of technology arriving on the scene, a security threat seems to accompany it. The key for IT is to constantly evaluate current security measures and policies to identify any shortcomings that may be exposing the company to risk.

Required: Explain THREE main risks that threaten security and integrity of systems and data held in them and TWO ways to minimize such risks. (10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – May 2017 – L1 – Q4b – The internet, cloud computing, IS security and blockchain"

BMIS – Nov 2015 – L1 – Q7 – The internet, cloud computing, IS security, and blockchain

Discuss the proper acquisition of software and handling of software defects and problems.

SoEasy is a medium-sized firm in the detergent manufacturing sector. It started operations in 2008 and its customer base is quite large, comprising both foreign and local firms and individuals.

In July 2012, the management of SoEasy approved the automation of its operations using an off-the-shelf package. Around May 2013, a number of defects and problems were identified with the software. The local agents of the software providers were accordingly invited for a discussion and solution of the defects and problems.

The management of SoEasy directed that to save time, the agents should quickly do the fixes on their own for normal operations to continue.

After the agents reported they had completed their job, operations continued without any tests being performed. Two months later, operations nearly came to a halt because of software issues.

Required:
a) Explain how the software should have been acquired and the bugs (software errors) corrected. (10 marks)
b) Advise the management of SoEasy on the way software defects and problems should have been handled in the future. (10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – Nov 2015 – L1 – Q7 – The internet, cloud computing, IS security, and blockchain"

BMIS – April 2022 – L1 – Q5b – The internet, cloud computing, IS security and blockchain

Explain four measures to prevent the repetition of a hacking incident in a company’s network.

You are the Chairman of a committee appointed by the Management of your company to investigate the recent hacking of the firm’s computer network and consequent loss of very sensitive information, which disrupted operations for some days.

Required:
State and explain FOUR (4) measures which can be put in place to forestall the repetition of such an incident in the future. (10 marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – April 2022 – L1 – Q5b – The internet, cloud computing, IS security and blockchain"

BMIS – May 2016 – L1 – Q7b – The internet, cloud computing, IS security and blockchain

State five measures that can be put in place to prevent hacking of a company’s computer network.

Your company’s computer network was recently hacked into by fraudsters, stealing sensitive information. This has affected the credibility of the company. State FIVE measures that can be put in place to prevent a repetition of such an incident in the future.

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "BMIS – May 2016 – L1 – Q7b – The internet, cloud computing, IS security and blockchain"

error: Content is protected !!
Oops!

This feature is only available in selected plans.

Click on the login button below to login if you’re already subscribed to a plan or click on the upgrade button below to upgrade your current plan.

If you’re not subscribed to a plan, click on the button below to choose a plan