cis 512 - a

10
CIS 512 Case Study 1 Advanced Persistent Threats Against RSA Tokens Case Study 1: Advanced Persistent Threats Against RSA Tokens Due Week 3 and worth 100 points Authentication breach by impersonation or password crack has been popular for attackers to breach our assets. The latest RSA APT attack to breach one of the most secure RSA tokens alerted the industry and reminded all of us that there is no security that can last forever. We must remain vigilant and stay ahead of the game. Read the following document titled, “APT Summit Findings”, as well as the document titled “RSA Security Brief”. Write a five to eight (5-8) page paper in which you: Analyze the Advanced Persistent Threats (APT) Summit Findings article as well as the RSA Security Brief article and identify the vulnerabilities that existed in the system. Analyze the attack methods carried out in pursuit of the authentication breach and explain which methods were successful and why. Suggest three (3) techniques or methods to protect against APT attacks in the future as the CSO for a large organization. Determine what types of technologies would help alleviate the problems identified in the articles assuming you are the CSO or CTO in an organization. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Upload: chun-yu-poon

Post on 22-Nov-2015

26 views

Category:

Documents


6 download

DESCRIPTION

strayer university cis 512

TRANSCRIPT

CIS 512 Case Study 1 Advanced Persistent Threats Against RSA TokensCase Study 1: Advanced Persistent Threats Against RSA TokensDue Week 3 and worth 100 pointsAuthentication breach by impersonation or password crack has been popular for attackers to breach our assets. The latest RSA APT attack to breach one of the most secure RSA tokens alerted the industry and reminded all of us that there is no security that can last forever. We must remain vigilant and stay ahead of the game. Read the following document titled, APT Summit Findings, as well as the document titled RSA Security Brief.Write a five to eight (5-8) page paper in which you:Analyze the Advanced Persistent Threats (APT) Summit Findings article as well as the RSA Security Brief article and identify the vulnerabilities that existed in the system. Analyze the attack methods carried out in pursuit of the authentication breach and explain which methods were successful and why. Suggest three (3) techniques or methods to protect against APT attacks in the future as the CSO for a large organization. Determine what types of technologies would help alleviate the problems identified in the articles assuming you are the CSO or CTO in an organization. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.Your assignment must follow these formatting requirements:Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.The specific course learning outcomes associated with this assignment are:Describe the industry requirements and organizational challenges of forming a sound information security workforce from a management perspective. Define common and emerging security issues and management responsibilities. Analyze the methods of managing, controlling, and mitigating security risks and vulnerabilities. Explain access control methods and attacks. Use technology and information resources to research issues in security management. Write clearly and concisely about the theories of security management using proper writing mechanics and technical style conventions.CIS 512 Week 10 Term Paper HypervisorsTerm Paper: HypervisorsDue Week 10 and worth 170 pointsA hypervisor is computer hardware platform virtualization software that allows multiple different operating systems (O/S) to share a single hardware host. The configuration is such that each O/S thinks that it has the hosts processors, memory, and other resources all to itself. The hypervisor actually controls the host processors and resources distributing the resources to each O/S depending on need, and ensures that no O/S can disrupt any other O/S.Write an eight to ten (8-10) page paper in which you:Examine the technical advantages and disadvantages of using a hypervisor in an enterprise. Compare and contrast the hypervisors from Microsoft (Hyper-V), VMware (ESXi), and Hitachis (Virtage). Evaluate the effect of hypervisors on the TCO (Total Cost of Ownership) in an enterprise. Determine whether the implementation of hypervisors has an impact on system administration. (i.e., Would system administrators need re-training?) Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.Your assignment must follow these formatting requirements:Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.The specific course learning outcomes associated with this assignment are:Analyze the main classes of hardware and system software components in an enterprise context. Use technology and information resources to research issues in enterprise architecture. Write clearly and concisely about Advanced Computer Architecture topics using proper writing mechanics and technical style conventions.CIS 512 Week 3 Assignment 1 Numerical PrecisionAssignment 1: Numerical PrecisionThe storage and representation of numbers in a computer can lead to costly mistakes because of precision errors. When using floating point numbers, one must make sure that the correct number of digits is used in a calculation because rounding errors can produce values that lead to errors. Consider the floating point format, exponential format, and binary coded decimal (BCD).Write a four to five (4-5) page paper in which you:1. Analyze the floating point format in order to:a. Determine how floating point numbers are stored in memory.b. Discuss the ease or difficulty of manipulating and using floating point numbers in arithmetic calculations.2. Determine whether or not you believe that the floating point format is memory efficient. Provide a rationale to support your answer.3. Analyze the format used to store numbers using the binary coded decimal format. Determine whether the BCD format is more or less memory efficient than the floating point format.4. Compare and contrast the BCD format to the floating point format in terms of:a. precisionb. performance in calculationsc. memory usage5. Select the format (floating point format, binary coded decimal (BCD), or exponential format) that you would recommend for processing efficiency and explain why.6. Floating point numbers can introduce rounding errors in the banking industry, which may lead to financial benefit for the bank but not for the customer. Analyze the ethics of knowingly benefitting from rounding errors. Propose a plan on how the rounding error should be handled.7. Differentiate between the exponential format and the floating point format in terms of:a. formatb. processing speedc. accuracy8. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.Your assignment must follow these formatting requirements:Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Assignment must be written in APA style and include in-text citations.Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.CIS 512 Week 4 Assignment 2 MultiprocessingIncreasing the number of CPUs in a computer system tends to increase system performance. There are different types of multiprocessor architectures available today. These include the master-slave multiprocessing (MSMP) architecture and symmetrical multiprocessing (SMP) architecture.Write a four to five (4-5) page paper in which you:Compare and contrast the MSMP and SMP architectures in terms of: memory access I/O resources access instruction execution throughput Hyperthreading refers to the parallel execution two (2) or more threads simultaneously. Determine if hyperthreading is possible with MSMP and SMP. Support your answer. Evaluate the type of applications that the MSMP architecture is well suited for. Explain why these applications are well suited for this architecture. Evaluate the type of applications the SMP architecture is well suited for. Explain why these applications are well suited for this architecture. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.Your assignment must follow these formatting requirements:Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.The specific course learning outcomes associated with this assignment are:Compare and contrast the types and role of distributed software architecture. Use technology and information resources to research issues in enterprise architecture. Write clearly and concisely about Advanced Computer Architecture topics using proper writing mechanics and technical style conventions. CIS 512 Week 6 Case Study 2 How Will Astronomy Archives Survive the Data TsunamiCase Study 2: How Will Astronomy Archives Survive the Data Tsunami?Due Week 6 and worth 100 pointsAstronomers collect and generate petabytes of data. The volume of data is currently growing at a rate of 0.5 PB per year. The projections indicate that by 2020, more than 60 PB of archived data will be available to astronomers. Read the paper, How Will Astronomy Archives Survive the Data Tsunami?, located in Week 6 of the online course shell.Write a four to five (4-5) page paper in which you:Analyze and assess the performance degradation issues highlighted in the case study. Evaluate the archival techniques that are outlined in the study, such as cloud storage. Determine why they are not able to handle the growth of the archived data. Evaluate the emerging technologies, such as clustering, discussed in the case study, which could be applied to the data archival problem. Evaluate the proposed methods, such as GPUs (Graphics Processing Units), of reducing the potentially huge computational and financial costs resulting from archiving data. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.Your assignment must follow these formatting requirements:Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.The specific course learning outcomes associated with this assignment are:Summarize the different types of data storage technology. Use technology and information resources to research issues in enterprise architecture. Write clearly and concisely about Advanced Computer Architecture topics using proper writing mechanics and technical style conventions.CIS 512 Week 7 Assignment 3 Virtualization Across the BoardVirtualization is generally defined as the creation of a virtual version of a computer object. The computer objects may be hardware objects such as virtual machines (VMs), virtual storage disks (vdisks), or network resources such as virtual networks, virtual Central Processing Units (CPUs or VCPUs), virtual keyboards, virtual mice, and so on. The computer objects may also be software objects such as virtual operating systems (VOS), virtual desktops interfaces (VDIs), virtual memory (VMEM), virtual device drivers (VDDs), and so on. The virtualization market has seen tremendous growth as businesses embark on strategies to virtualize hardware and / or software. Companies such as VMware, Microsoft, and Citrix have invested heavily in virtualization-based solutions for these businesses.Write a four to five (4-5) page paper in which you:Determine whether hardware virtualization helps businesses and organizations in terms of: cost management systems performance and scalability systems management and administration Determine whether software virtualization helps businesses and organizations in terms of: cost management systems performance and scalability systems management and administration Compare and contrast VMware, Microsoft, and Citrix in terms of: market adoption technical architecture technical support Determine which vendor you would recommend for a virtualization strategy and explain why. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.Your assignment must follow these formatting requirements:Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.The specific course learning outcomes associated with this assignment are:Compare and contrast the types and role of distributed software architecture Analyze the main classes of hardware and system software components in an enterprise context. Discuss network hardware devices to include switches and routers. Use technology and information resources to research issues in enterprise architecture. Write clearly and concisely about Advanced Computer Architecture topics using proper writing mechanics and technical style conventions. CIS 512 Week 8 Case Study 3 Managing Contention for Shared ResourcesComputer systems with multicore processors can increase performance by running applications in parallel, thus increasing the throughput that the computer system is able to attain. However, contention for caches, memory controllers, and interconnections may hinder performance and create deadlocks for resources. Read the paper Managing Contention for Shared Resources on Multicore Processors, located in Week 8 of the online course shell. This case study proposes using contention-aware scheduling algorithms to alleviate the contention problems.Write a four to five (4-5) page paper in which you:Examine the authors findings. (The authors ran three (3) applications (Soplex, Sphinx, and Namd) to test memory contention problems when different pairings of these applications were used.) The current and future trend is to increase processing performance by using multicore systems. Analyze the schedule that the authors used to test the applications using a distributed architecture. Identify which schedule they believed was the best. Evaluate the authors findings with regard to cache contention. Explain what causes contention for the cache. Analyze the contention avoidance methods proposed by the authors for the cache, memory controller, front-side bus (FSB), and prefetching hardware in the distributed architecture. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.Your assignment must follow these formatting requirements:Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.The specific course learning outcomes associated with this assignment are:Analyze the main classes of hardware and system software components in an enterprise context. Compare and contrast the types and role of distributed software architecture. Describe computing technology, architecture, and future trends in processing Use technology and information resources to research issues in enterprise architecture. Write clearly and concisely about Advanced Computer Architecture topics using proper writing mechanics and technical style conventions.CIS 512 Week 9 Assignment 4 The Virtual Memory Manager (VMM)Most operating systems use a virtual memory manager (VMM) whose responsibility is to manage the relationship between the virtual organization of memory as seen by an application with the physical organization of memory from the operating systems point of view. Virtual memory addresses must be mapped to physical address and vice versa. Write a four to five (4-5) page paper in which you:Differentiate between virtual memory and physical memory. Evaluate the benefits gained by running applications when the operating system uses a virtual memory manager. Analyze how virtual memory addresses get translated into physical addresses. Analyze how a modern operating system translates 32-bit and 64-bit virtual addresses to physical addresses on the same machine. Create a relationship diagram, using MS Visio or Dia, depicting the relationship between virtual addresses to physical addresses. Note: The graphically depicted solution is not included in the required page length.