- 10 Marks
BMIS – May 2020 – L1 – Q5a – The internet, cloud computing, IS security and blockchain
Explain types of cyber-attacks that might cause a company’s website to shut down.
Find Related Questions by Tags, levels, etc.
Report an error
Find Related Questions by Tags, levels, etc.
Computer systems are increasingly being exposed to security risks which threaten the security and integrity of the systems and data storage. The good news however is that these risks can greatly be minimised through a variety of controls which provide network and communication security.
Required: Explain FIVE (5) controls which could be adopted by an organisation to provide security for its computer systems and data stored.
Find Related Questions by Tags, levels, etc.
Find Related Questions by Tags, levels, etc.
Computer systems are exposed to security risks that threaten the security and integrity of both the system and data held in it. These threats are becoming increasingly sophisticated and seem to multiply by the day, resulting in endless headaches for IT professionals.
With each new piece of technology arriving on the scene, a security threat seems to accompany it. The key for IT is to constantly evaluate current security measures and policies to identify any shortcomings that may be exposing the company to risk.
Required: Explain THREE main risks that threaten security and integrity of systems and data held in them and TWO ways to minimize such risks. (10 marks)
Find Related Questions by Tags, levels, etc.
SoEasy is a medium-sized firm in the detergent manufacturing sector. It started operations in 2008 and its customer base is quite large, comprising both foreign and local firms and individuals.
In July 2012, the management of SoEasy approved the automation of its operations using an off-the-shelf package. Around May 2013, a number of defects and problems were identified with the software. The local agents of the software providers were accordingly invited for a discussion and solution of the defects and problems.
The management of SoEasy directed that to save time, the agents should quickly do the fixes on their own for normal operations to continue.
After the agents reported they had completed their job, operations continued without any tests being performed. Two months later, operations nearly came to a halt because of software issues.
Required:
a) Explain how the software should have been acquired and the bugs (software errors) corrected. (10 marks)
b) Advise the management of SoEasy on the way software defects and problems should have been handled in the future. (10 marks)
Find Related Questions by Tags, levels, etc.
You are the Chairman of a committee appointed by the Management of your company to investigate the recent hacking of the firm’s computer network and consequent loss of very sensitive information, which disrupted operations for some days.
Required:
State and explain FOUR (4) measures which can be put in place to forestall the repetition of such an incident in the future. (10 marks)
Find Related Questions by Tags, levels, etc.
Your company’s computer network was recently hacked into by fraudsters, stealing sensitive information. This has affected the credibility of the company. State FIVE measures that can be put in place to prevent a repetition of such an incident in the future.
Find Related Questions by Tags, levels, etc.
Find Related Questions by Tags, levels, etc.
Computer systems are increasingly being exposed to security risks which threaten the security and integrity of the systems and data storage. The good news however is that these risks can greatly be minimised through a variety of controls which provide network and communication security.
Required: Explain FIVE (5) controls which could be adopted by an organisation to provide security for its computer systems and data stored.
Find Related Questions by Tags, levels, etc.
Find Related Questions by Tags, levels, etc.
Computer systems are exposed to security risks that threaten the security and integrity of both the system and data held in it. These threats are becoming increasingly sophisticated and seem to multiply by the day, resulting in endless headaches for IT professionals.
With each new piece of technology arriving on the scene, a security threat seems to accompany it. The key for IT is to constantly evaluate current security measures and policies to identify any shortcomings that may be exposing the company to risk.
Required: Explain THREE main risks that threaten security and integrity of systems and data held in them and TWO ways to minimize such risks. (10 marks)
Find Related Questions by Tags, levels, etc.
SoEasy is a medium-sized firm in the detergent manufacturing sector. It started operations in 2008 and its customer base is quite large, comprising both foreign and local firms and individuals.
In July 2012, the management of SoEasy approved the automation of its operations using an off-the-shelf package. Around May 2013, a number of defects and problems were identified with the software. The local agents of the software providers were accordingly invited for a discussion and solution of the defects and problems.
The management of SoEasy directed that to save time, the agents should quickly do the fixes on their own for normal operations to continue.
After the agents reported they had completed their job, operations continued without any tests being performed. Two months later, operations nearly came to a halt because of software issues.
Required:
a) Explain how the software should have been acquired and the bugs (software errors) corrected. (10 marks)
b) Advise the management of SoEasy on the way software defects and problems should have been handled in the future. (10 marks)
Find Related Questions by Tags, levels, etc.
You are the Chairman of a committee appointed by the Management of your company to investigate the recent hacking of the firm’s computer network and consequent loss of very sensitive information, which disrupted operations for some days.
Required:
State and explain FOUR (4) measures which can be put in place to forestall the repetition of such an incident in the future. (10 marks)
Find Related Questions by Tags, levels, etc.
Your company’s computer network was recently hacked into by fraudsters, stealing sensitive information. This has affected the credibility of the company. State FIVE measures that can be put in place to prevent a repetition of such an incident in the future.
Find Related Questions by Tags, levels, etc.
Elevate your professional expertise across key business domains with our comprehensive training programs
Follow us on our social media and get daily updates.
This feature is only available in selected plans.
Click on the login button below to login if you’re already subscribed to a plan or click on the upgrade button below to upgrade your current plan.
If you’re not subscribed to a plan, click on the button below to choose a plan