CS507 – Information SystemsIn CS507 Information Systems we have you covered with Digitized Past Papers From Fall of Mid Term and Final Term.Mid/FinalPreparationQuizAssignment/GDBNotes FINAL TERM CS507_Final_Fall2011_Papapers_ashiq View Download CS507_Final_Term_14_papers_solved View Download2 Comments AYESHA MUMTAZ on February 8, 2019 at 12:39 pm Define E_Learning? Answer : E-Learning E-Learning is the online delivery of information for purposes of education, training, knowledge management, or performance management. It is a web – enabled system that makes knowledge accessible to those who need it, when they need it – anytime, anywhere. E-learning is useful for facilitating learning at schools What is E-GOVERNMENT? Answer: 41.5 E Government E-Government / electronic government / digital government, or online government. The terms refer to government’s use of information and communication technology (ICT) to exchange information and services with citizens, businesses, and other arms of government. E-Government may be applied by legislature, judiciary, or administration, in order to improve internal efficiency, the delivery of public services, or processes of democratic governance. The primary delivery models are 1. Government-to-Citizen or Government-to-Customer (G2C) 2. Government-to-Business (G2B) and 3. Government-to-Government (G2G) What are types of IDS and explain each briefly? Answer: Types of IDS includes: • Signature-based: These IDS systems protect against detected intrusion patterns. The intrusive patterns they can identify are stored in the form of signatures. • Statistical-based: These systems need a comprehensive definition of the known and expected behaviour of systems. • Neural networks: An IDS with this feature monitors the general patterns of activity and traffic on the network and creates a database. How many Components of an ID is described in your course? Answer : Components of an IDS An IDS comprise of following components: • Sensors that are responsible for collecting data. The data can be in the form of network packets, log files, system call, traces, etc. • Analyzers that receive input from sensors and determine intrusive activity • An administrative console – it contains intrusion definitions applied by the analyzers. • A user interface Differenciate Deny-all philosoph and Accept All Philosophy? To be effective, firewalls should allow individual on the corporate network to access the Internet and at the same time, stop hackers or others on the Internet from gaining access to the corporate network to cause damage. Generally, most organizations can follow any of the two philosophies • Deny-all philosophy — which means that access to a given recourses will be denied unless a user can provide a specific business reason or need for access to the information resource. • Accept All Philosophy — under which everyone is allowed access unless someone can provide a reason for denying access. Explain following statement means ??? ‘’ Better people mean more secure networks ‘’ Answer: The shortage of trustworthy people with IT security skills is a chronic problem that is unlikely to ever disappear. Enough engineers and computer scientists should be trained in computer security skills getting people with the right technical background to do the work has been the biggest need of all. What kind of thread impact results after the threat come to happen? Answer: Threat Impact It is difficult to assess the impact of the attacks described above, but in generic terms the following types of impact could occur: • Loss of income • Increased cost of recovery (correcting information and re-establishing services) • Increased cost of retrospectively securing systems • Loss of information (critical data, proprietary information, contracts) • Loss of trade secrets • Damage to reputation • Degraded performance in network systems • Legal and regulatory non-compliance • Failure to meet contractual commitments Shumaila Idrees on February 13, 2019 at 4:10 pm GDB SOLUTION 13-02-2019 Object Oriented Design Tool is more help full and Affective. OOP is very suitable because the advantages you get is reusability, readability, modularization, separation of concern and more easier to maintain code base. You can model your problem into set of objects and functions. In procedural which are huge is size can be very hard to debug code if there are errors. If you used procedural method programming in such applications where you have to do alot of stuff which is really hard to work. In my opinion OOP is best but for beginners students structural method is best and after that they can jump to the OOP. Because OOP technique is more reliable and modularization.