We have been working very hard since 2009 to facilitate in your learning Read More. We can't keep up without your support. Donate Now.

www.bit.ly/vucodes

+ Link For Assignments, GDBs & Online Quizzes Solution

www.bit.ly/papersvu

+ Link For Past Papers, Solved MCQs, Short Notes & More

CS507 Current Final Term Papers & Past Final Term Papers at One Place from 22 august TO 2 september2015

CS507 Current Final Term Papers & Past Final Term Papers at One Place from 22 august TO 2 september2015

Share Your Final Term Papers Here in Reply of this Discussion

May Allah Solve Our Problems and Give Us Success

You Can download papers by a simple click on file. All the uploaded filed are in Zip file or PDF format So Install Adobe Reader and Winrar Software’s to open these Files

Note: If you download files with Internet Download Manager (IDM), you would face problem of damage files. All files are correct and no damage file, If you face this problem, Open IDM > Click on Options > Click on File Types > Remove PDF and ZIP from files types and save. After it download again files, files will work properly.

You Can Download Solved Final Term Papers, Short Notes, Lecture Wise Questions Answers Files, Solved MCQs, Solved Quizzes , Solved Final Term Subjective Papers , Solved Final Term Objective Papers From This Discussion For Preparation Final Term Paper of Spring 2014

Or

For Important Helping Material related to this subject (Solved MCQs, Short Notes, Solved past PapersE-Books, FAQ,Short Questions Answers & more). You must view all the featured Discussion in this subject group.

For how you can view all the Featured discussions click on the Back to Subject Name Discussions link below the title of this Discussion & then under featured Discussion corner click on the view all link.

click on this link 

https://vustudents.ning.com/forum/topics/how-you-can-view-all-the


+ http://bit.ly/vucodes (Link for Assignments, GDBs & Online Quizzes Solution)

+ http://bit.ly/papersvu (Link for Past Papers, Solved MCQs, Short Notes & More)

+ Click Here to Search (Looking For something at vustudents.ning.com?)

+ Click Here To Join (Our facebook study Group)


Views: 1205

Replies to This Discussion

Kindly share papers here

thanks

August 22, 2015  8:00 a.m

OBJECTIVE

MCQs 15 to 20 were from the attached file.

5 to 6 were from Risk Mitigation process

5 to 6 were from Risk management

5 to 6 were from mid term lectures

5 to 6 were related to threats

SUBJECTIVE:

1) Risk Management process

2) Types of threats

3) Entity Relationship Diagrams

4) Cold site

5) Hot site

6) Impact analysis

I remember this much only.

Attachments:

Paper was easy as I have just studied from following topics.

Important Topics 

  • Symbols, Object Oriented Analysis and Design
  • Risk Management, Control Analysis, Risk Management
  • Security of Information System, Threat Identification, Control Adjustment
  • Unauthorized Intrusion, Antivirus Software, Types of Controls
  • Web Security, Factors encouraging Internet Attacks

MCQ's mostly from Past as well as some were new.

One Question of 5 Marks to draw ERD of a scenario

One Question of 5 Marks about Main parts of Computer where the Virus attacks

Q1- Identify the type of virus for each of the following statement.

 

Q2- In which type of attack, an unauthorized attacker monitors or listen the communication between two parties? Give at least one example of such type of attack.

Q3-Identify any two firewall philosophies that are generally followed by most of the organizations.

 

Q4-Ibrahim textile mill has its offices in different cities of Pakistan. As per business requirements, the firm has decided to launch new office in the U.A.E. The higher management wants to keep record (databases) of each employee at different locations. What will be the suitable solution of this problem?

 

Q5-Management information system of Howard University contains confidential information about their employees. As all of the information is collected, processed and stored in computers, so, there is the need to set security objectives for Howard University to secure their Management information system. Mention three main security objectives in this regard.

Security of IS:

 

Q6-A company's IT security officer noticed unnecessary modifications in database records. What will be the mechanism to identify the person who made unnecessary modifications? Explain this mechanism briefly

 

Q7-Identify and list at least three types of Intrusion Detection Systems (IDS).

 

Q8-Identify at least three vulnerabilities in which Intrusion Detection System (IDS) can not help

 

Q9-A company has launched its head office in Lahore and regional offices in other cities. For sharing information among all offices, the company needs to connect all of its offices with each others. What do you think which type of computing environment will serve better for this company? Support your answer with at least two arguments.

 

 

Q-10“XYZ” hospital's executive management decided that they will utilize best IT resources for true implementation of user identification controls. They have decided that user will prove himself a true user through his physical characteristics. Identify at least five most common physical characteristics in this regard.

 

Q11-Information system (IS) security manager determines the possibility of occurrence of threats and categorize threats in three levels of impact. What are these three levels of impact and in which phase security manager determines these levels.

my today's ppr good luck :)

  1. Global communication” is a network device manufacturing company; this company is currently planning to design an Intrusion detection system (IDS). Identify and list at least five features that should be available in IDS to make it effective, fully functional and a successful security measure.
  2. Analyze the following statements and give the name of active attack described in each case:
  • Duplicating logon procedures and capturing password of a user in such a way that the user thinks that he is interacting with the operating system.
  • Employing the facilities of the operating system without being subject to the normal controls.
  • Users run a program which undertakes unauthorized activities e.g. a copy of the sensitive data.
  • Unauthorized user behaves as an authorized user of the system.
  • Intercepting, modifying or substituting communications by new message.          

 3. “XYZ” hospital's executive management decided that they will utilize best IT resources for true implementation of user identification controls. They have decided that user will prove himself a true user through his physical characteristics. Identify at least five most common physical characteristics in this regard.

 4. A company has launched its head office in Lahore and regional offices in other cities. For sharing information among all offices, the company needs to connect all of its offices with each other’s. What do you think which type of computing environment will serve better for this company? Support your answer with at least two arguments.

 5. Identify Non-technical control and Technical control from the following list

  • Encryption controls methods in system
  • Office Building Operations
  • Environmental controls
  • Intrusion detection control methods in system
  • Use of Locks to doors
  • User authentication control methods in system

6. Identify and briefly explain two main steps followed during the threat identification phase of risk management.

7. A company's IT security officer noticed unnecessary modifications in database records. What will be the mechanism to identify the person who made unnecessary modifications? Explain this mechanism briefly.

8. Mention three salient features of Object Oriented Programming.

9.   Identify which of the recovery strategies will be suitable for each of the following situations:

           

  • a. Company A agrees to provide backup facility to Company B and Company B to company A.
  • b. ABC Telecom operational timings are 9 to 5 and they can tolerate downtime after 5.

10. Identify at least two natural threats that can be faced by any information system.

11. From each of the given statement identify the type of intrusion occurred.

  • Intruder visits the organization and steal information system assets.
  • Intruder is trying to have an unauthorized access to the system remotely.

12. What is the purpose of Double ellipse symbol in Entity Relationship Diagram?

Total Question = 52

40 MCQs ( Mostly from past papers and conceptual as well )

other are subjective

1. Features of Object Oriented Program

2. Difference between Intrusion Detection & Variance Detection

3. What mechanism should be adopted to the person who made modification in the system?

4. Identify technical and Non Technical operation ( Option or sentences were given, just have to identify )

5. Derived Attribute

6. In which type of attack, an unauthorized attacker monitors or listen the communication between two parties? Give at least one example of such type of attack.

Others are not getting remember,

Remember me in your prayers, Best of luck !!!

my todays paper

25-08-2015 8am

very easy paper

total question 52. marks 80

40 mcqs very easy. hardly 4-5 mcqs from first 22 lecs.

Subjective 12 questions

1. types of threats (2num)

2. Identify control name & explain briefly. (2num)

                 a. username

                  b. thumbscan

                  c. password

                 d. birthdate

3. Identify impact level (high or moderate) from threats given below (2num)

4. In which type of attack, an unauthorized attacker monitors or listen the communication between two parties? Give at least one example of such type of attack. (2num)

5. Management information system of Howard University contains confidential information about their employees. As all of the information is collected, processed and stored in computers, so, there is the need to set security objectives for Howard University to secure their Management information system. Mention three main security objectives in this regard. (3num)

6. A company's IT security officer noticed unnecessary modifications in database records. What will be the mechanism to identify the person who made unnecessary modifications? Explain this mechanism briefly. (3num)

7. two classifications of IT system controls and one example each (3num)

8. Identify Vulnerability lavel (high, low or no risk) from given below (3 num)

9. XYZ” hospital's executive management decided that they will utilize best IT resources for true implementation of user identification controls. They have decided that user will prove himself a true user through his physical characteristics. Identify at least five most common physical characteristics in this regard. (5num)

10. Phase of Risk Management in which chances of occurrences of threats identified can be determined. Also list three inputs of that phase. (5num)

11. How to protect critical business functions in the face of disaster. identify methodology. (5num)

12. Identify threats as physical or logical from given below (5num)

few questions are being repeated in all papers till now. so do focus on them. 

Good Luck.

 Paper easy r conceptual tha.

1.Make ER Diagram                                                      5 marks  

2. Physical Threat (Flood ke waja se data khtam ho gya)    2 marks

3.Difference between Scanners and Active monitors.          5 marks

4.Difference between Non technical and Technical methods  3 marks

5. Write recovery strategies.                                          5 marks

MCQs k topics ye thay:

1. Protocol (rules of communication)

2.Integrity 

3.Virses 

4. Risks Management k related 5 Mcqs thay & Risk transeference, Risk Avoidence.

5.Hactivists

6. Biomatric system

7.Audit trails

8.Recovery strategies

9.Monitoring

10.Active attacks

11.Intrusion Detective System

Remember me in your prayers

RSS

Looking For Something? Search Here

HELP SUPPORT

This is a member-supported website. Your contribution is greatly appreciated!

© 2020   Created by +M.Tariq Malik.   Powered by

Promote Us  |  Report an Issue  |  Privacy Policy  |  Terms of Service

.