You are on page 1of 7

CIS 512 Case Study 1 Advanced Persistent Threats Against RSA Tokens

Case Study 1: Advanced Persistent Threats Against RSA Tokens


Due Week 3 and worth 100 points
Authentication breach by impersonation or password crack has been popular for attackers to
breach our assets. The latest RSA APT attack to breach one of the most secure RSA tokens
alerted the industry and reminded all of us that there is no security that can last forever. We must
remain vigilant and stay ahead of the game. Read the following document titled, APT Summit
Findings, as well as the document titled RSA Security Brief.
Write a five to eight (5-8) page paper in which you:
Analyze the Advanced Persistent Threats (APT) Summit Findings article as well as the RSA
Security Brief article and identify the vulnerabilities that existed in the system. Analyze the
attack methods carried out in pursuit of the authentication breach and explain which methods
were successful and why. Suggest three (3) techniques or methods to protect against APT attacks
in the future as the CSO for a large organization. Determine what types of technologies would
help alleviate the problems identified in the articles assuming you are the CSO or CTO in an
organization. Use at least three (3) quality resources in this assignment. Note: Wikipedia and
similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; citations and references must follow APA or school-specific format. Check with your
professor for any additional instructions. Include a cover page containing the title of the
assignment, the students name, the professors name, the course title, and the date. The cover
page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Describe the industry requirements and organizational challenges of forming a sound
information security workforce from a management perspective. Define common and emerging
security issues and management responsibilities. Analyze the methods of managing, controlling,
and mitigating security risks and vulnerabilities. Explain access control methods and attacks. Use
technology and information resources to research issues in security management. Write clearly
and concisely about the theories of security management using proper writing mechanics and
technical style conventions.
CIS 512 Week 10 Term Paper Hypervisors
Term Paper: Hypervisors
Due Week 10 and worth 170 points
A hypervisor is computer hardware platform virtualization software that allows multiple
different operating systems (O/S) to share a single hardware host. The configuration is such that
each O/S thinks that it has the hosts processors, memory, and other resources all to itself. The
hypervisor actually controls the host processors and resources distributing the resources to each
O/S depending on need, and ensures that no O/S can disrupt any other O/S.
Write an eight to ten (8-10) page paper in which you:
Examine the technical advantages and disadvantages of using a hypervisor in an enterprise.
Compare and contrast the hypervisors from Microsoft (Hyper-V), VMware (ESXi), and
Hitachis (Virtage). Evaluate the effect of hypervisors on the TCO (Total Cost of Ownership) in
an enterprise. Determine whether the implementation of hypervisors has an impact on system
administration. (i.e., Would system administrators need re-training?) Use at least three (3) quality
resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; citations and references must follow APA or school-specific format. Check with your
professor for any additional instructions. Include a cover page containing the title of the
assignment, the students name, the professors name, the course title, and the date. The cover
page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Analyze the main classes of hardware and system software components in an enterprise context.
Use technology and information resources to research issues in enterprise architecture. Write
clearly and concisely about Advanced Computer Architecture topics using proper writing
mechanics and technical style conventions.
CIS 512 Week 3 Assignment 1 Numerical Precision
Assignment 1: Numerical Precision
The storage and representation of numbers in a computer can lead to costly mistakes because of
precision errors. When using floating point numbers, one must make sure that the correct number
of digits is used in a calculation because rounding errors can produce values that lead to errors.
Consider the floating point format, exponential format, and binary coded decimal (BCD).
Write a four to five (4-5) page paper in which you:
1. Analyze the floating point format in order to:
a. Determine how floating point numbers are stored in memory.
b. Discuss the ease or difficulty of manipulating and using floating point numbers in arithmetic
calculations.
2. Determine whether or not you believe that the floating point format is memory efficient.
Provide a rationale to support your answer.
3. Analyze the format used to store numbers using the binary coded decimal format. Determine
whether the BCD format is more or less memory efficient than the floating point format.
4. Compare and contrast the BCD format to the floating point format in terms of:
a. precision
b. performance in calculations
c. memory usage
5. Select the format (floating point format, binary coded decimal (BCD), or exponential format)
that you would recommend for processing efficiency and explain why.
6. Floating point numbers can introduce rounding errors in the banking industry, which may lead
to financial benefit for the bank but not for the customer. Analyze the ethics of knowingly
benefitting from rounding errors. Propose a plan on how the rounding error should be handled.
7. Differentiate between the exponential format and the floating point format in terms of:
a. format
b. processing speed
c. accuracy
8. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar
Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; citations and references must follow APA or school-specific format. Check with your
professor for any additional instructions. Assignment must be written in APA style and include
in-text citations.
Include a cover page containing the title of the assignment, the students name, the professors
name, the course title, and the date. The cover page and the reference page are not included in
the required assignment page length.
CIS 512 Week 4 Assignment 2 Multiprocessing
Increasing the number of CPUs in a computer system tends to increase system performance.
There are different types of multiprocessor architectures available today. These include the
master-slave multiprocessing (MSMP) architecture and symmetrical multiprocessing (SMP)
architecture.
Write a four to five (4-5) page paper in which you:
Compare and contrast the MSMP and SMP architectures in terms of: memory access I/O
resources access instruction execution throughput Hyperthreading refers to the parallel execution
two (2) or more threads simultaneously. Determine if hyperthreading is possible with MSMP and
SMP. Support your answer. Evaluate the type of applications that the MSMP architecture is well
suited for. Explain why these applications are well suited for this architecture. Evaluate the type
of applications the SMP architecture is well suited for. Explain why these applications are well
suited for this architecture. Use at least three (3) quality resources in this assignment. Note:
Wikipedia and similar Websites do not qualify as quality resources.Your assignment must follow
these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; citations and references must follow APA or school-specific format. Check with your
professor for any additional instructions. Include a cover page containing the title of the
assignment, the students name, the professors name, the course title, and the date. The cover
page and the reference page are not included in the required assignment page length.The specific
course learning outcomes associated with this assignment are:
Compare and contrast the types and role of distributed software architecture. Use technology and
information resources to research issues in enterprise architecture. Write clearly and concisely
about Advanced Computer Architecture topics using proper writing mechanics and technical
style conventions.
CIS 512 Week 6 Case Study 2 How Will Astronomy Archives Survive the Data Tsunami
Case Study 2: How Will Astronomy Archives Survive the Data Tsunami?
Due Week 6 and worth 100 points
Astronomers collect and generate petabytes of data. The volume of data is currently growing at a
rate of 0.5 PB per year. The projections indicate that by 2020, more than 60 PB of archived data
will be available to astronomers. Read the paper, How Will Astronomy Archives Survive the
Data Tsunami?, located in Week 6 of the online course shell.
Write a four to five (4-5) page paper in which you:
Analyze and assess the performance degradation issues highlighted in the case study. Evaluate
the archival techniques that are outlined in the study, such as cloud storage. Determine why they
are not able to handle the growth of the archived data. Evaluate the emerging technologies, such
as clustering, discussed in the case study, which could be applied to the data archival problem.
Evaluate the proposed methods, such as GPUs (Graphics Processing Units), of reducing the
potentially huge computational and financial costs resulting from archiving data. Use at least
three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not
qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; citations and references must follow APA or school-specific format. Check with your
professor for any additional instructions. Include a cover page containing the title of the
assignment, the students name, the professors name, the course title, and the date. The cover
page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Summarize the different types of data storage technology. Use technology and information
resources to research issues in enterprise architecture. Write clearly and concisely about
Advanced Computer Architecture topics using proper writing mechanics and technical style
conventions.
CIS 512 Week 7 Assignment 3 Virtualization Across the Board
Virtualization is generally defined as the creation of a virtual version of a computer object. The
computer objects may be hardware objects such as virtual machines (VMs), virtual storage disks
(vdisks), or network resources such as virtual networks, virtual Central Processing Units (CPUs
or VCPUs), virtual keyboards, virtual mice, and so on. The computer objects may also be
software objects such as virtual operating systems (VOS), virtual desktops interfaces (VDIs),
virtual memory (VMEM), virtual device drivers (VDDs), and so on. The virtualization market
has seen tremendous growth as businesses embark on strategies to virtualize hardware and / or
software. Companies such as VMware, Microsoft, and Citrix have invested heavily in
virtualization-based solutions for these businesses.
Write a four to five (4-5) page paper in which you:
Determine whether hardware virtualization helps businesses and organizations in terms of: cost
management systems performance and scalability systems management and administration
Determine whether software virtualization helps businesses and organizations in terms of: cost
management systems performance and scalability systems management and administration
Compare and contrast VMware, Microsoft, and Citrix in terms of: market adoption technical
architecture technical support Determine which vendor you would recommend for a
virtualization strategy and explain why. Use at least three (3) quality resources in this
assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.Your
assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; citations and references must follow APA or school-specific format. Check with your
professor for any additional instructions. Include a cover page containing the title of the
assignment, the students name, the professors name, the course title, and the date. The cover
page and the reference page are not included in the required assignment page length.The specific
course learning outcomes associated with this assignment are:
Compare and contrast the types and role of distributed software architecture Analyze the main
classes of hardware and system software components in an enterprise context. Discuss network
hardware devices to include switches and routers. Use technology and information resources to
research issues in enterprise architecture. Write clearly and concisely about Advanced Computer
Architecture topics using proper writing mechanics and technical style conventions.
CIS 512 Week 8 Case Study 3 Managing Contention for Shared Resources
Computer systems with multicore processors can increase performance by running applications
in parallel, thus increasing the throughput that the computer system is able to attain. However,
contention for caches, memory controllers, and interconnections may hinder performance and
create deadlocks for resources. Read the paper Managing Contention for Shared Resources on
Multicore Processors, located in Week 8 of the online course shell. This case study proposes
using contention-aware scheduling algorithms to alleviate the contention problems.
Write a four to five (4-5) page paper in which you:
Examine the authors findings. (The authors ran three (3) applications (Soplex, Sphinx, and
Namd) to test memory contention problems when different pairings of these applications were
used.) The current and future trend is to increase processing performance by using multicore
systems. Analyze the schedule that the authors used to test the applications using a distributed
architecture. Identify which schedule they believed was the best. Evaluate the authors findings
with regard to cache contention. Explain what causes contention for the cache. Analyze the
contention avoidance methods proposed by the authors for the cache, memory controller, front-
side bus (FSB), and prefetching hardware in the distributed architecture. Use at least three (3)
quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as
quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; citations and references must follow APA or school-specific format. Check with your
professor for any additional instructions. Include a cover page containing the title of the
assignment, the students name, the professors name, the course title, and the date. The cover
page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Analyze the main classes of hardware and system software components in an enterprise context.
Compare and contrast the types and role of distributed software architecture. Describe computing
technology, architecture, and future trends in processing Use technology and information
resources to research issues in enterprise architecture. Write clearly and concisely about
Advanced Computer Architecture topics using proper writing mechanics and technical style
conventions.
CIS 512 Week 9 Assignment 4 The Virtual Memory Manager (VMM)
Most operating systems use a virtual memory manager (VMM) whose responsibility is to
manage the relationship between the virtual organization of memory as seen by an application
with the physical organization of memory from the operating systems point of view. Virtual
memory addresses must be mapped to physical address and vice versa.
Write a four to five (4-5) page paper in which you:
Differentiate between virtual memory and physical memory. Evaluate the benefits gained by
running applications when the operating system uses a virtual memory manager. Analyze how
virtual memory addresses get translated into physical addresses. Analyze how a modern
operating system translates 32-bit and 64-bit virtual addresses to physical addresses on the same
machine. Create a relationship diagram, using MS Visio or Dia, depicting the relationship
between virtual addresses to physical addresses. Note: The graphically depicted solution is not
included in the required page length.

You might also like