System and Network Asministration Mid Term

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 14

Mid-Semester Assignment Instructions: course name: System and Network Administration

• The midterm exam is conducted online via CMS and is Assignment based
• The assignment will contribute 25% to the overall grade and will comprise of two components, a written part
worth 20 marks and viva voce worth 05 marks.
• Students are advised to follow the plagiarism criteria set out as:
o for BS/MIT allowed similarity index is <50%
• Viva Voce shall be conducted on Zoom
• Each student assignment will be evaluated by keeping in view the above similarity index, responses of the
written part and viva voce.
• The written part of the assignments shall only be submitted via CMS, should be typed on MS word or excel.
Submitted either in PDF or MS Office format.
• Handwritten submission will not be accepted.
• As it’s a research-based individual assignment, student should be given two days at max to submit the
assignment.

This is a research based individual midterm assignment, try to follow the given format:

1. Assign a suitable title of topic


2. Abstract
3. Introduction
4. Answer to the question/Analysis
5. Conclusion

For BSIT Students, each topic is assigned against your registration number and name, carefully see your assigned
topics which are given below:

Sr Student Registration Student Name Assignment Topic


No
1 2018F-mulbsit-049 Muhammad See Topic from given below 1
Sajawal Khan

2 2018F-mulbsit-021 Aqib Rasheed See Topic from given below 2


3 2018F-mulbsit-020 Muhammad Qasim See Topic from given below 3
Hammad

4 2018F-mulbsit-052 Syed Muhammad See Topic from given below 4


Zaigham Ali

5 2018F-mulbsit-048 Ameer Hamza See Topic from given below 5


6 2018F-mulbsit-047 Muhammad See Topic from given below 6
Azeem
Akbar

7 2018F-mulbsit-018 Ahmad Raza See Topic from given below 7


Khan Niazi

8 2018F-mulbsit-013 Ayesha Shafiq See Topic from given below 8

9 2018F-mulbsit-009 Gulshan Masih See Topic from given below 9

10 2018F-mulbsit-011 Muhamma See Topic from given below 10


d
Shahnawaz

11 2018F-mulbsit-012 Muhamma See Topic from given below 11


d Nabeel

12 2018F-mulbsit-008 Salman Sajid See Topic from given below 12

13 2018F-mulbsit-006 Faiqa Rasheed See Topic from given below 13


14 2018F-mulbsit-051 Yusra Ashraf See Topic from given below 14

15 2018F-mulbsit-014 Muhammad See Topic from given below 15


Haider Ali

16 2018F-mulbsit-003 Usama Zafar See Topic from given below 16

17 2018F-mulbsit-023 Ayesha Munir See Topic from given below 17

18 2018F-mulbsit-016 Muhammad See Topic from given below 18


Zeeshan Chaudary

19 2018F-mulbsit-005 Ahsan Shahbaz See Topic from given below 19

20 2018F-mulbsit-015 Muhammad See Topic from given below 20


Noman Chaudary

21 2018F-mulbsit-017 Muhammad See Topic from given below 21


Hammad Javed
22 2018F-mulbsit-026 Taseer See Topic from given below 22
Ahmad Qadri

23 2018F-mulbsit-004 Danish Habib See Topic from given below 23

24 2018F-mulbsit-002 Zain Asghar See Topic from given below 24

25 2018F-mulbsit-001 Tanweer Ahmad See Topic from given below 25

26 2018F-mulbsit-046 Muhamma See Topic from given below 26


d Junaid
Iqbal

27 2018F-mulbsit-032 Syed See Topic from given below 27


Mazhar
Qayyum

28 2018F-mulbsit-044 Ahsan Latif See Topic from given below 28


29 2018F-mulbsit-045 Arooj Nawaz See Topic from given below 29

30 2018F-mulbsit-053 Nimra Shafiq See Topic from given below 30

31 2018F-mulbsit-050 Aftab Ahmad See Topic from given below 31

32 2018F-mulbsit-038 Muhammad See Topic from given below 32


Dabeer Ul Hassan

33 2018F-mulbsit-035 Muhammad Amir See Topic from given below 33


Khan

34 2018F-mulbsit-034 Muhammad See Topic from given below 34


Hassan Anwar

35 2018F-mulbsit-041 Muhammad Bilal See Topic from given below 35


36 2018F-mulbsit-040 Amna Asghar See Topic from given below 36

37 2018F-mulbsit-033 Muhammad See Topic from given below 37


Mujtaba

38 2018F-mulbsit-036 Tariq Manzoor See Topic from given below 38

39 2018F-mulbsit-031 Usama Ahtasham See Topic from given below 39

40 2018F-mulbsit-027 Muhammad See Topic from given below 40


Haseeb Athar

41 2018F-mulbsit-022 Muhammad See Topic from given below 41


Noman Bashir

42 2018F-mulbsit-030 Areefa Waqar See Topic from given below 42

43 2018F-mulbsit-028 Ayesha Ashraf See Topic from given below 43

44 2018F-mulbsit-054 Muhammad Atif See Topic from given below 44


Arif
45 2018F-mulbsit-042 Laiba Sohail See Topic from given below 45

46 2018F-mulbsit-024 Usman Ishtiaq See Topic from given below 46

Topics

Question 1.
Explain Packet Loss and Recover in Networking. Describe any suggested solution to solve the
problem of packet dropping in network. What is Business continuity plan BCP and does packet
loss affect in BC of one’s organization.

Question 2.
Explain the Proxy Server. Do you think proxy server can decrease bandwidth of network? If yes justify
your answer.
Question 3:
Explain Processing Crime (PC) and Incident Scenes (IS). How it is happened in Pakistan and
what are the measures taken in to consideration for PC and IS.
Question 4:
Explain the Internet Architecture. How internet network can be secured. Describe the
techniques and analyze the internet architecture and provide solution to protect
internet traffic.
Question 5:
Explain the Protection Mechanisms in Linux and Windows operating system OS. Discuss
the flaws in both mentioned OS and provide solutions to address those issues.
Question 6: Discuss in details the Centralization and Decentralization Systems. Discuss
their pros and cons and which system do you prefer and why. Do you have in your mind
any other system that is much better than above mentioned systems.
Question 7: Discuss the shell in both window / apple MAC and linux operating system. Give
example to control hardware components via shell. Explain the working of shell and
recommended shell architecture.
Question 8: Discuss in details the broad categories that phishing is split into. Criminal
activity facilitated by identity theft/fraud is largely a four-phase process. Discuss and
give examples of each. How theft can be dealt with digital equipment. ?

Question 9: What are anonymizers, and what is their relevance to computer crime and
investigations? What events precipitated the development of enhanced data security
measures taken by the federal government?

Question 10: What are some of the methods of data destruction employed by malicious
users? How are they spread, and what are the implications for the future?

Question 11: Why are individual victims reluctant to report computer crime? What about
private corporations?

Question 12:
Disucss in details the the use of Virtual Machine/PC software in Computer Forensics. Does it
have important in IT industry to counter measure the network attacks .
Question 13
Explain how network forensic is performed. What are the ways to deal with network
attacks? How network forensics can be improved to trace out the attacker who
launched latest/new attack on the network of target.
Question 14:
Disucss the Cyber security and security of data in Internet of Things (IoT). What security measures
are taken in to consideration for the IOT ‘s data. Give any your own solution to solve the problem of
security in IoT.

Question 15:
How to Collect and Analyze Data in Computer Forensics and discuss in details the strategy and
procedure to investigate the data. How security agencies use labs to forensic data. Discuss in
details: Is there any standard to follow to do forensic data. ?
Question 16:
What should be the components and pre-requisites for a Diploma/ Post Graduate programs
in Cyber Forensics? Do you think those courses contribute to make better understanding
and working of cyber forensics? What extra work needs to be done to evaluate and analyze
cyber forensic and how.?
Question 17:
Discuss in details what are the current common issues in mobile phone forensics? How we can
solve those problems with the latest IT security solutions and trends.
Question 18
Explain the adaptive security AS architecture. what are the challenges in AS and which devices
and software can be used for security? Describe one technique to mitigate the DDOS attacks.
Question 19
Explain what are the existing Cloud frameworks? Give example and distinguish between on-
premises IT infrastructure and cloud IT infrastructure. Discuss pros and cons and give solution
for the betterment of both frameworks. Which is more preferable method and why? Discuss at
least one suggested your own model for cloud computing.
Question 20
Discuss in details what is the latest real time issues of privacy in Data publishing and Data
mining? What is recommended solution to solve the issue of privacy in data publishing and data
mining.
Question 21
What parameter measures the robustness of system like CDMA against the attack?
Question 22

Discuss in details how can we find the upload path of an attachment at email client?
Question 23
Discuss in details with scenario example: Is there any computer forensic tool or software to
check the modification or overwrite the file details of the website?
Question 24
Discuss in details the comparison of Virtualization and Cloud Computing. How virtualization
technology is linked with cloud computing.
Question 25
What is disaster and recovery DR plan. Suppose you have been hired company ABC to conduct
DR plan. How will you perform DR plan and what measure you will take in to considerations and
why?
Question 26
Compare and contrast the administration of different operating system window / Apple MAC
and Linux. What do you think which is more preferable OS platform to deploy various
application servers and why?
Question 27
Explain Server Management and server management strategies. What are the challenges for
system administrator to manage the server? What are roles of system administration to setup,
administer, and secure window server and Linux server.

Question 28
What are the current and future challenges to Smartphone investigation? Give a suggested and
recommended solution to deal with the challenges.
Question 29
Do you have any good idea for the most recent hot area of research in the field of cyber
security? What is that and how it can contribute the well beings of IT security field.
Question 30
What are the current challenges in the field of security of digital marketing? Can each of these
challenges in isolation hamper the discovery of pertinent information for digital marketing and
detectives involved in a multitude of different cases requiring digital marketing investigation
analysis.?
Question 31
How to protect the data on system? Which security model is used and what are the strategies
to secure your information/data in one’s organization. Discuss the scenario of on-premises data
of one’s organization and on cloud service provider. After critical thinking, which platform is
more secured and why.
Question 32
How has computer crime been characterized in past? DO these perceptions hinder
investigations? How?
Question 33
What is VDI infrastructure. Discuss SWOT analysis and compare and contrast various vendors’
VDI solutions. Which is preferred solution for offering VDI services to meet maximum
requirement of VDI customer and why?
Question 34
Explain Computer Forensics and its Procedures? Also find flaws and weakness in standard
procedure of forensics and recommend your findings.

Question 35
What is Remote desktop RDS in window server OS. Discuss in details why RDS is used in
production environment.
Question 36
Explain computer Crime, Computer Related Crime, Digital Crime and cybercrime with
examples? Discuss a scenario how digital crime can be mitigated with the help of latest IT
forensic tool and equipment.
Question 37
What is the difference between an index and a discrete logarithm? What is a primitive root of a
number? What is Euler’s totient function? What is the difference between modular arithmetic
and ordinary arithmetic? Describe any solution which involves index/discrete algorithm to deal
with any cybercrime for investigation purpose and collection of evidence.
Question 38
Consider a company whose operations are housed in two buildings on the same property; one
building is headquarters, the other building contains network and computer services. The
property is physically protected by a fence around the perimeter, and the only entrance to the
property is through this fenced perimeter. In addition to the perimeter fence, physical security
consists of a guarded front gate. The local networks are split between the Headquarters’ LAN
and the Network Services’ LAN. Internet users connect to the Web server through a firewall.
Dial-up users get access to a particular server on the Network Services’ LAN. Develop an attack
tree in which the root node represents disclosure of proprietary secrets. Include physical, social
engineering, and technical attacks. The tree may contain both AND and OR nodes Develop a
tree that has at least 15 leaf nodes.

Question 39
For each of the following assets, assign a low, moderate, or high impact level for the loss of
confidentiality, availability, and integrity, respectively. Justify your answers.
a) A student maintaining a blog to post public information.
b) An examination section of a university that is managing sensitive information about exam
papers.
c) An information system in a pathological laboratory maintaining the patient’s data.
d) A student information system used for maintaining student data in a university that contains
both personal, academic information and routine administrative information (not privacy
related). Assess the impact for the two data sets separately and the information system as a
whole.
e) A University library contains a library management system which controls the distribution of
books amongst the students of various departments. The library management system contains
both the student data and the book data. Assess the impact for the two data sets separately and
the information system as a whole.

Question 40
Compare and contrast cloud computing, grid computing and client/ server models. Why cloud
computing is having preference over other two mentioned models. Discuss the details of
working of cloud computing architecture and compare and analyze administration of cloud
computing and client/server architecture.
Question 41
For each of the following assets, assign a low, moderate, or high impact level for the loss of
confidentiality, availability, and integrity, respectively. Justify your answers.
a) An organization managing public information on its Web server.
b) A law enforcement organization managing extremely sensitive investigative information.
c) A financial organization managing routine administrative information (not privacy-related
information).
d) An information system used for large acquisitions in a contracting organization contains both
sensitive, pre-solicitation phase contract information and routine administrative information.
Assess the impact for the two data sets separately and the information system as a whole.
e) A power plant contains a SCADA (supervisory control and data acquisition) system controlling
the distribution of electric power for a large military installation. The SCADA system contains
both real-time sensor data and routine administrative information. Assess the impact for the
two data sets separately and the information system as a whole.

Question 42
A telephone switching system that routes calls through a switching network based on the
telephone number requested by the caller. Discuss the pros and cons in the forensic
perspective and how VOIP traffic can be investigated and what are your recommended
solutions for collection evidences and mitigation of Voice based attacks.
Question 3: Consider a desktop publishing system used to produce documents for various
organizations.
a) Give an example of a type of publication for which confidentiality of the stored data is
the most important requirement.
b) Give an example of a type of publication in which data integrity is the most important
requirement.
c) Give an example in which system availability is the most important requirement.
Question 43
Consider an automated teller machine (ATM) in which users provide a personal identification
number (PIN) and a card for account access. Give examples of confidentiality, integrity, and
availability requirements associated with the system and, in each case, indicate the degree of
importance of the requirement.

Question 44
Compare and contrast technical aspects of window server administration. What do you think
managing window based server is easier than managing Linux based server and why? What
techniques do you suggest for system administrator to acquire in administering Linux based
server such as apche, maria db server, squid and samba.

Question 45
How to monitor network traffic? What are the responsibilities of network and security
administrator to secure the network and system of one’s organization? Which security
architecture do you recommend based on your knowledge and skills to secure IT infrastructure.
If company asks you to provide Solutions which optimum solutions will you recommend to
detect attacks and afterwards prevention of attacks.

Question 46

What are the roles of firewall in the network of company ABC? Do you think next generation firewall
NGFW such as Palo Alto is recommended solution to secure internal network from external threats. Will
it be cost effective solution despite of having short budget of company ABC? What will be your
recommendations for company ABC?

You might also like