Continuous Assessment Test
Continuous Assessment Test
21/00906
CAT
[8 Marks]
c) Highlight the ethical considerations that can ensure responsible use of information
systems
Privacy
Accessibility
• Universal Design: Creating systems that are usable by people with disabilities.
• Digital Divide: Addressing disparities in access to technology and information.
• Openness: Promoting open access to information and knowledge.
Property Rights
[5 Marks]
2. a) Justify the statement – ‘Operational systems are the core information systems without
which organizations cannot survive’
Core Functions of Operational Systems:
• Transaction Processing: These systems handle the core business activities, such as
sales. Without these, an organization cannot conduct its basic functions.
• Data Capture: Operational systems collect and store essential data about
customers, products, employees, and financial transactions. This data forms the
foundation for decision-making and planning.
• Process Automation: Many routine tasks are automated through operational
systems, increasing efficiency and reducing errors. This frees up human resources
to focus on more strategic activities.
• Real-Time Information: Operational systems provide up-to-date information about
the organization's status, enabling managers to make timely decisions.
[6 Marks]
b) What is a Decision Support System (DSS)? State and explain any three types of DSS
- is a computer-based information system that supports decision-making activities by
analyzing large volumes of data and presenting information in a way that helps
decision-makers identify and solve problems and make informed choices.
Data-Driven DSS:
Model-Driven DSS:
Knowledge-Driven DSS:
[9 Marks]
3. a) Outline possible information security risks that can compromise the effective use of
MIS in organisations.
Internal Threats
• Insider Threats: Employees, contractors, or partners with authorized access misuse
their privileges for personal gain or malicious intent.
• Human Error: Accidental mistakes or negligence can lead to data loss, system
failures, or security breaches.
External Threats
• Cyberattacks: Malicious activities targeting computer systems and networks,
including:
Natural Disasters: Fires, floods, earthquakes, and other natural events can damage
hardware, disrupt operations, and compromise data integrity.
Unauthorized Access: Gaining access to systems or data without proper authorization.
Data Loss or Corruption: Accidental or intentional deletion or modification of data.
[6 Marks]
b) Suggest appropriate controls that can help manage the risks stated in 3(a) above
Internal Threats
• Access Controls: Implement strong password policies, role-based access controls,
and regular access reviews.
• Employee Awareness Training: Educate employees about security best practices,
social engineering tactics, and the importance of data protection.
• Monitoring and Auditing: Monitor system and user activities for anomalies and
conduct regular audits to identify vulnerabilities.
External Threats
• Network Security: Employ firewalls, intrusion detection and prevention systems,
and secure network configurations.
• Data Encryption: Encrypt sensitive data both at rest and in transit to protect against
unauthorized access.
• Backup and Disaster Recovery: Regularly back up critical data and have a disaster
recovery plan in place.
• Patch Management: Keep software and operating systems up-to-date with the latest
patches to address vulnerabilities.
• Incident Response Plan: Develop and test an incident response plan to handle
security breaches effectively.
[9 Marks]