Monday 26 December 2011

Super Sites Links.

Saturday 10 December 2011

CISA DATABASE QUESTIONS FOR 2011.

1.                   Which of the following would BEST maintain the integrity of a firewall log?
A.     Granting access to log information only to administrators
B.      Capturing log events in the operating system layer
C.     Writing dual logs onto separate storage media
D.      Sending log information to a dedicated third-party log server

D Establishing a dedicated third-party log server and logging events in it is the best procedure for maintaining the integrity of a firewall log. When access control to the log server is adequately maintained, the risk of unauthorized log modification will be mitigated, therefore improving the integrity of log information. To enforce segregation of duties, administrators should not have access to log files. This primarily contributes to the assurance of confidentiality rather than integrity. There are many ways to capture log information: through the application layer, network layer, operating systems layer, etc.; however, there is no log integrity advantage in capturing events in the operating systems layer. If it is a highly mission-critical information system, it may he nice to run the system with a dual log mode. I laying logs in two different storage devices will primarily contribute to the assurance of the availability of log information, rather than to maintaining its integrity.

2.                   The PRIMARY benefit of implementing a security program as part of a security governance framework is the:
A.     alignment of the IT activities with IS audit recommendations.
B.      enforcement of the management of security risks.
C.     implementation of the chief information security officer’s (CISO) recommendations.
D.     reduction of the cost for IT security.

B The major benefit of implementing a security program is management’s assessment of risk and its mitigation to an appropriate level of risk, and the monitoring of the remaining residual risks. Recommendations, visions and objectives of the auditor and the chief information security officer (CISO) are usually included within a security program, but they would not be the major benefit. The cost of IT security may or may not be reduced.

3.                   When performing an audit of a client relationship management (CRM) system migration project, which of the following should he of GREATEST concern to an IS auditor?
A.     The technical migration is planned for a Friday preceding a long weekend, and the time window is too short for completing all tasks.
B.      Employees pilot-testing the system are concerned that the data representation in the new system is completely different from the old system.
C.     A single implementation is planned, immediately decommissioning the legacy system.
D.     Five weeks prior to the target date, there are still numerous defects in the printing functionality of the new system’s software.

C Major system migrations should include a phase of parallel operation or a phased cut-over to reduce implementation risks. Decommissioning or disposing of the old hardware would complicate any fallback strategy, should the new system not operate correctly. A weekend can be used as a time buffer so that the new system will have a better chance of being up and running after the weekend. A different data representation does not mean different data presentation at the front end. Even when this is the case, this issue can be solved by adequate training and user support. The printing functionality is commonly one of the last functions to be tested in a new system because it is usually the last step performed in any business event. Thus, meaningful testing and the respective error fixing are only possible after all other parts of the software have been successfully tested.

4.                   Which of tile following would effectively verify the originator of a transaction?
A.     Using a secret password between the originator and the receiver
B.      Encrypting tile transaction with the receiver’s public key
C.     Using a portable document format (PDF) to encapsulate transaction content
D.      Digitally Signing tile transaction with the source’s private key

D A digital signature is an electronic identification of a person, created by using a public key algorithm, to verify to a recipient the identity of the source of a transaction and tile integrity of its content. Since they are a ’shared secret’ between the user and tile system itself, passwords are considered a weaker means of authentication. Encrypting the transaction with the recipient’s public key will provide confidentiality for tile information, while using a portable document format (PDF) will probe the integrity of tile content but not necessarily authorship.
5.                   During a disaster recovery test, an IS auditor observes that the performance of the disaster recovery site’s server is slow. To find the root cause of this, the IS auditor should FIRST review the:
A.     event error log generated at the disaster recovery site.
B.      disaster recovery test plan.
C.     disaster recovery plan (DRP).
D.      configurations and alignment of the primary and disaster recovery sites.

D Since the configuration of the system is the most probable cause, the IS auditor should review that first. If the issue cannot be clarified, the IS auditor should then review the event error log. The disaster recovery test plan and the disaster recovery plan (DRP) would not contain information about the system configuration.

Wednesday 23 November 2011

SCIENCE AND TECHNOLOGY.

In the field of science and technology,computers are  use at every step.Computers are used to solve mathematical and scientific problems.Computers are also used in research and development works,

In engineering,computers are used,for designing cars,aircraft,trains and other kinds of machines.Now a days architects are widely using computers to design building and houses.

Another use of computers is found in the field of Physics,especially Nuclear Physics.Computers are widely used in Nuclear laboratories,atomic reactors weapons manufacturing factories etc.

INDUSTRY OF COMPUTER APPLICATIONS.

The use of computers in industry is rapidly increasing.Different kinds of computers are widely used in the car manufacturing and assembling industries,steel mills weapons assembling and manufacturing plants,textile industries and aircraft/ship assembling and manufacturing etc.

Along with ordinary computers,Robots are used in these industries.Robots are machines whose work is controlled by computers.

Robots are installed where it is difficult for human beings to work. 

Monday 5 September 2011

TRADE AND COMMERCE.

TRADE AND COMMERCE:

Computers are playing a vital role in the trade and commerce.The introduction of computers has brought about a revolution in this field and contributed greatly to the advancement and development of world business.

In business,computers are used to information processing like word processing filling and assembling numbers and facts associated with general office functions such as accounting, payroll processing,personnel record keeping etc.

In business,computers are provided different facilities in the form of a modern, telex, telefax, e-mail and internet.All the above devices help a businessman in getting his work done in a very short time.Suppose a businessmen has a network of business all over the world.

He exports sports goods to various parts of the world and imports electronic machines.Computers keep him informed about his current business position and the world business market.
   

CLASSIFICATION OF COMPUTERS BY SIZE.

MICRO COMPUTER:
It is the smallest of all the four classes of computers.Some micro computers are tiny special purpose devices dedicated to carrying out a special task,such as controlling the ignition and fuel system in an automobile.But their micro computers are general purpose systems that are used in countless ways.
A micro computer is a computer whose CPU is microprocessor.A microprocessor all of whose components are on a single integrated circuits chips.
A micro computer is also handy and light is weight.It is also called Personal Computer or PC.

MINI COMPUTER:
A mini computer is vary in size from a small desktop model to a unit about the size of a four drawer
 file cabinet.There's obviously an overlap between the more power Personal Computer Systems and the low-end minicomputers in terms of cost and processing capability.
Mini computer is a multi user or shared system.Mini may support dozens or even hundred of terminals,thus they are almost always found in organizations.And in additions to processing the tasks submitted from multiple work stations,mini's can also serve as a communications link between these stations and a central mainframe.

MACRO COMPUTER:
A macro computer or mainframe computer is more powerful than a typical mini.

In macro computer the speed of the CPU is fast,having a huge memory and many different kinds of peripherals can be attached.

Since the size of these computers is very large,they occupy a very large space,their cost is so high that only large companies can afford them.And a group of experts is required to operate them.

SUPER COMPUTER:
The most outstanding class of computers the super computer.
Super computers are more powerful then macro and mini.

The speed of the CPU is maximum.Super computers are the most powerful and most expensive computers made.Only a few of these computing monsters are produced each years because only a few organizations need (and can afford) their processing capabilities.
     
 

CLASSIFICATION.

Computer can be classified in two ways.
-By Purpose
-By Size

BY PURPOSE:
According to purpose computers are classified as under:
-General Purpose Computers.
-Special Purpose Computers.

-GENERAL PURPOSE COMPUTERS:
General purpose computers are those that can store different programs and can be used for countless applications.
The versatility of a general purpose computer is limited by human imagination.
  
-SPECIAL PURPOSE COMPUTERS:
Special purpose computers are those that are designated to perform only one specific task.
Program or instruction set is permanently stored in such a machine.
Although it lacks versatility.It does its single task quickly and efficiently.

BY SIZE:
According to the size computers are classified into the following four categories.
-MICRO COMPUTER.
-MINI COMPUTER.
-MACRO COMPUTER.
-SUPER COMPUTER.
  

 

HISTORY.

 Men from early ages,and throughout the years,have invented and continue to invent machines to help them count.
In the beginning of time,cavemen counted with their fingers and toes.

ABACUS:
About 3000 years age,the Chinese invented the ABACUS.It was the first machine used for counting and calculating.It was made of a wooden frame,metal rods and wooden beads.Each bead has a specific value reading from right to left.
The beads in the first column are worth 1,in the second column the beads are worth 10,in the thirds column the beads are worth 100,etc.addition,subtraction,multiplication and division are performed by moving the beads..

MECHANICAL CALCULATOR:
In 1642,at the age of 19 French mathematician,Blaise Pascal invented a mechanical calculator.Pascal Father's was a tax accountant and he invented a calculator to help his father's job.
This calculator known as "PASCALINE".
The machine consisted as a wooden box that could only add and subtract by means of a series of gears and wheels.
In 1673 a German mathematician G.W.Leibniz constructed a calculator called "LEIBNIZ CALCULATOR".It could do more than just add and subtract.The Leibniz calculator could also multiply,divide and find square roots of numbers.

DIFFERENCE ENGINE: 
In 1823,Charles Babbage design a computing machine based on predefined formula called the difference engine.It consist on ALU.Memory and Control Unit.Unfortunately neither of these machines were completed due to technology at that time was not advanced enough and lack of financial funding.But for his pioneering work on computer he is called the "Father Of Computer".

CARD PUNCHING MACHINE:
In 1890,Herman Holerith develop a machine called card punching and reading machine.It is also called tabulating machine.The tabulating machine used punched cards to read and sort data or information.

Friday 2 September 2011

MORE INTERNET..

MORE INTERNET:

To connect to the internet following equipment are needed.

COMPUTER:

-Pentium I or Pentium II or above
-64mb RAM or above
-1gm hard disk or larger
-56.6 Kilo bits per second (kbps) modem or above.

PROGRAM:

We require following programs to use the internet.
-Windows
-Internet Software

MODEM:

A modem serves as a medium to exchange information between a computer and the internet.Modem speed is measured in bps (bit per second) speed is the major concern when we are choosing a modem.If the modem is quicker,it will save time as well as money.

There are two types of modems.
-Internal Modem
-External Modem

TELEPHONE LINE:

All the internet travels over the telephone lines.

SPEAKERS:

Speakers allows us to hear music,voice and other sounds generated by the computer.

ISDN LINE:

ISDN or integrated services Digital Network is a line by which data is transmitted over digital telephone line.

ISDN is two to four modems.
Many telephone companies offers these ISDN lines.

 ISP: 

ISP or Internet Service Provider is a company to gain access to the internet against a fee.It can provide you internet access.

 

 

    
   

INTERNET

INTERNET:
 
The internet is a global collection of high-powered computers that are connected to each other with network cables,telephone cables,microwaves dishes,satellites and every kind of electronic equipment currently available.

The internet was launched by the U.S. Defence Department in the late 1960's.By the early 1990's the internet's popularity had grown considerably.
Each computer on the internet stores resources,including documents,sound and video clips,program files,electronic shopping centres,emanations,pictures and anything else that can be stored and presented electrically.When you get connected to the internet,all these resources are available to you.

The internet offers many exciting features.

E-MAIL:

The internet enables us to exchange messages throughout the world with people-friend,colleagues,relatives and even strangers.We happen to meet on the internet E-mail or electronic mail is on exciting feature of the internet as we can send and receives messages over long distance also.On top of that,it is quite fast,easy and inexpensive as well.

 INFORMATION:

Any information on any subject can be obtained easily on the internet.We can have a good browse at news papers, magazines, academic papers, government document, famous speeches, recipes, works by literary figures and what not.

PROGRAM:

The internet offers thousands of free programs.Some of these program are word processors,spreadsheets and games.

ENTERTAINMENT:

The internet offers hundred of simple games free on cost.Children as well as grown ups can enjoy hockey,chess,baseball,cricket and such other games.Internet also offers thousands of movies and dramas for entertainment.

ONLINE SHOPPING:

We can order desired goods and services on the internet.Just setting on comfortable chair at your's home.We need not go out shopping.Items like flowers book,cars,computer programs,CD,DVD and many other things can be bought.