Mis Questions
Mis Questions
There are two types of network topologies: physical and logical. Physical topology emphasizes
the physical layout of the connected devices and nodes, while the logical topology focuses on the
pattern of data transfer between network nodes.
The physical and logical network topologies of a network do not necessarily have to be identical.
However, both physical and network topologies can be categorized into five basic models:
Bus Topology: All the devices/nodes are connected sequentially to the same backbone or
transmission line. This is a simple, low-cost topology, but its single point of failure
Star Topology: All the nodes in the network are connected to a central device like a hub
or switch via cables. Failure of individual nodes or cables does not necessarily create
downtime in the network but the failure of a central device can. This topology is the most
preferred and popular model.
Ring Topology: All network devices are connected sequentially to a backbone as in bus
topology except that the backbone ends at the starting node, forming a ring. Ring
topology shares many of bus topology's disadvantages so its use is limited to networks
that demand high throughput.
Tree Topology: A root node is connected to two or more sub-level nodes, which
themselves are connected hierarchically to sub-level nodes. Physically, the tree topology
is similar to bus and star topologies; the network backbone may have a bus topology,
while the low-level nodes connect using star topology.
Mesh Topology: The topology in each node is directly connected to some or all the other
nodes present in the network. This redundancy makes the network highly fault-tolerant
but the escalated costs may limit this topology to highly critical networks. The diagram
bellows
Ethics is set of moral principles that govern the behavior of a group or individual. An ethical
principle is a base accepting position which directly or indirectly leads to an ethical standard.
Ethics generally refers to human activities that are measured good or proper within the
situation of a group – i.e., law, and typically implies or plainly involves punishment by the
group against the individual who violates the ethical standard. Key six ethics principles are
Ensure integrity: In business, the functions and use of information must be done
with integrity.
Must be informed: The users and the relevant people must be fully about the
purpose, methods and intended possible uses.
The confidentiality of information: The people related job and functions must
maintain the confidentiality of relevant information that important for the
organization and the functions.
Must participate in a voluntarily: None of the people must be forced for doing
anything. The must do that in a voluntary way, free from any coercion.
Harm to participants must be avoided: Those facts and people are considered as
harmful for the system, must be avoided.
Independence: The independence must be clear, and any conflicts of interest or
partiality must be explicit.
14. What are components of an organization flame work for security and control?
Firms need to establish a good set of both general and application controls for their
information systems. A risk assessment evaluates information assets, identifies control
points and control weaknesses, and determines the most cost-effective set of controls.
15. What are the most important tools and technologies for safe guarding information
security systems?
Firewalls prevent unauthorized users from accessing a private network when it is linked
to the Internet. Intrusion detection systems monitor private networks from suspicious
network traffic and attempts to access corporate systems. Passwords, tokens, smart cards,
and biometric authentication are used to authenticate system users. Antivirus software
checks computer systems for infections by viruses and worms and often eliminates the
malicious software, whereas antispyware software combats intrusive and harmful
spyware programs. Encryption, the coding and scrambling of messages, is a widely used
technology for securing electronic transmissions over unprotected networks. Digital
certificates combined with public key encryption provide further protection of electronic
transactions by authenticating a user’s identity. Companies can use fault-tolerant
computer systems or create high-availability computing environments to make sure that
their information systems are always available. Use of software metrics and rigorous
software testing help improve software quality and reliability.
16. Why information systems are vulnerable to destruct error and abuse?
Digital data are vulnerable to destruction, misuse, error, fraud, and hardware or software
failures. The Internet is designed to be an open system and makes internal corporate
systems more vulnerable to actions from outsiders. Hackers can unleash denial-of-service
(DoS) attacks or penetrate corporate networks, causing serious system disruptions. Wi-Fi
networks can easily be penetrated by intruders using sniffer programs to obtain an
address to access the resources of the network. Computer viruses and worms can disable
systems and Web sites. The dispersed nature of cloud computing makes it difficult to
track unauthorized activity or to apply controls from afar. Software presents problems
because software bugs may be impossible to eliminate and because software
Database System: A database system is more popular term which is a group of application
programs that interact with database through DBMS and database alone.