Topic: Information Systems Development and Security

Search 500 + past questions and counting.
Professional Bodies Filter
Program Filters
Subject Filters
More
Tags Filter
More
Check Box – Levels
Series Filter
More
Topics Filter
More

Define the term:

i. “Data Transmission”. (2 Marks)

ii. “Data warehouse”. (2 Marks)

iii. Explain the term “Error Detection” in relation to data transmission and list four error detection algorithms. (6 Marks)

i. Data Transmission:

Data transmission is the process of sending and receiving data or information from one point to another through a communication channel such as a wired or wireless medium.

ii. Data Warehouse:

A data warehouse is a centralized repository for storing large volumes of structured and organized data, typically used for analysis and reporting purposes.

iii. Error Detection:

Error detection refers to the process of identifying errors in data transmission to ensure that the data received is accurate and free from corruption. It is crucial in maintaining data integrity during communication.

Error Detection Algorithms:

    1. Parity Check
    2. Checksum
    3. Cyclic Redundancy Check (CRC)
    4. Hamming Code

Differentiate between Feedback and Feedforward control systems.

Feedback Control Systems:

  1. Nature: Reactive in nature; responds to changes after they occur.
  2. Function: Measures actual performance, compares it to a set standard, and takes corrective action if necessary.
  3. Application: Used in situations where the system needs to correct deviations and bring processes back on track.
  4. Examples: Thermostat regulating room temperature, quality control in manufacturing.

Feedforward Control Systems:

  1. Nature: Proactive in nature; anticipates changes and adjusts accordingly before they occur.
  2. Function: Focuses on preventing deviations by monitoring inputs and predicting their impact on the process.
  3. Application: Used in dynamic environments where preemptive action is necessary to avoid disruptions.
  4. Examples: Weather forecasting to plan for agricultural activities, financial budgeting to avoid cash flow problems.

The following are measures for the management of risks EXCEPT

A. Identifying risks to system security
B. Evaluating and prioritising the identified risks
C. Developing controls to avoid the identified risks or control the risk within acceptable limits
D. Implementing the controls and monitoring their effectiveness
E. Allowing the risks to manifest and monitor control

Answer: E

Explanation: The correct answer is E because allowing risks to manifest is not a risk management measure. Instead, risk management focuses on identifying, evaluating, and controlling risks to prevent them from occurring.

With reference to the web, the meaning of the acronym HTML is:

A. Hypertext Markup Language
B. Hypertext Makeup Language
C. Hyperlast Markup Language
D. Hypertest Makeup Language
E. Hypertext Mark Language

Answer: A

Explanation:
HTML stands for Hypertext Markup Language, which is the standard language used to create and design web pages. It structures the content on the web using tags.

a. Storage controls are controls put in place at the database level where data is stored.
You are required to enumerate FIVE examples of storage controls. (5 Marks)

  • File Labeling: Files are labeled in a particular order to prevent accidental loss of storage media.
  • Segregation of Duties: There is segregation of duties between the input and storage officers to reduce risks.
  • Authorized Access: Access to storage media must be properly authorized to prevent unauthorized actions.
  • Database Access Control: Access to the database itself must be properly authorized and controlled.
  • Activity Log: A log file must be maintained, recording every activity carried out on the database.

As a valuable resource of an organisation, information should be controlled, secured, and protected from unauthorized disclosure and destruction.
In the light of the above statement, you are required to explain briefly each of the following:

a. Information System Controls
b. Data Encryption
c. Biometric Identification Devices
d. Firewall

a. Information System Controls
Information system controls are procedures and mechanisms that ensure the accuracy, integrity, and security of data processed by an information system. They include preventive, detective, and corrective controls that safeguard the system against threats such as data breaches, unauthorized access, and data loss.

b. Data Encryption
Data encryption is the process of converting readable data into an unreadable format to protect it from unauthorized access. Encrypted data can only be decrypted and read by someone who has the correct encryption key, ensuring the confidentiality and security of sensitive information during transmission or storage.

c. Biometric Identification Devices
Biometric identification devices use unique biological characteristics such as fingerprints, retinal scans, or facial recognition to authenticate individuals and grant them access to a system or facility. This method of identification enhances security by making it more difficult for unauthorized users to gain access.

d. Firewall
A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and untrusted external networks, such as the internet, protecting the organization’s network from external attacks and unauthorized access.

A software system that provides a variety of tools for investigating a suspect’s personal computer is called:

A. Forensic software
B. Cyber software
C. Cloud software
D. Crime software
E. Software toolkit

Answer: A. Forensic software

Explanation: Forensic software is used by investigators to gather and analyze data from a suspect’s computer or digital devices. It provides specialized tools for recovering deleted files, analyzing data trails, and uncovering evidence of cybercrimes. This software plays a crucial role in digital forensics and law enforcement investigations.

The act of illegal copying of a set of instructions or programs is technically described as which of the following?

A. Virus attack
B. Piracy
C. Theft
D. Crime
E. Privacy infringement

Answer: B. Piracy

Explanation: Piracy refers to the illegal copying, distribution, or use of software, music, movies, or other copyrighted materials without the proper authorization. It is a form of intellectual property theft and is considered a major issue in software development and content creation industries.

IT controls are often described in TWO categories or types namely: IT general controls and which of the following controls?

A. System
B. Software
C. Hardware
D. Application
E. Program

Answer: D. Application

Explanation: IT controls are generally divided into two main categories: IT general controls (which address overall security and operations) and application controls (which focus on specific applications and ensure data accuracy and integrity). General controls provide the foundational framework for all IT systems, while application controls deal with the proper functioning of individual software applications.

Availability and continuity of IT resources is dependent on backup and which of the following procedures?

A. Logical
B. Physical
C. Procurement
D. Recovery
E. System

Answer: D. Recovery

Explanation: For IT systems to ensure availability and continuity, backup procedures must be paired with recovery procedures. Backups provide copies of critical data, and recovery procedures ensure that data and systems can be restored quickly in the event of a failure or disaster. Without a proper recovery plan, backups alone would be insufficient in maintaining system continuity.