Strayer University
301 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by CrystalJames932
Scoop.it!

CIS 502 Basic Web Server Application Attacks Pape

http://www.thestudentsoffortune.com/cis-502-basic-web-server-application-attacks-paper/

CrystalJames932's insight:

http://www.thestudentsoffortune.com/cis-502-basic-web-server-application-attacks-paper/

Assignment 1: Web Server Application Attacks
Due Week 2 and worth 50 points

Web server application attacks are common in today’s digital information sharing age. Understanding their implications, vulnerabilities, and safeguards is paramount as our demands on e-Commerce and the Internet use have increased exponentially. The following document titled “Guidelines on Securing Public Web Servers”, may be used to complete the assignment. Analyze the Justice Department Website article titled “How was the Justice Department Web site attacked?”.

Write a three to five (3-5) page paper in which you:
1. Examine three (3) common Web application vulnerabilities and attacks, and recommend mitigation strategies for each.
2. Describe an architectural design to protect Web servers from a commonly known Denial of Service (DOS) attack.
3. Based on your research from the Justice Department Website:

a. Examine the motivations of this type of attack.b. Identify the tools and techniques that you would have used in this attack and why.
c. Determine if Web server application attacks are as easy to carry out as they seem.

4. Suggest the best mitigation or defense mechanisms against Web server application attacks on federal government Websites in the future.
5. Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.The specific course learning outcomes associated with this assignment are:

Define common and emerging security issues and management responsibilities. Evaluate an organization’s security policies and risk management procedures, and its ability to provide security countermeasures. Use technology and information resources to research issues in security management. Write clearly and concisely about the theories of security management using proper writing mechanics and technical style conventions.Click here to view the grading rubric for this assignment. 

  
more...
No comment yet.
Scooped by CrystalJames932
Scoop.it!

CIS 500 Week 8 Case Study 2 Cloud Computin

http://www.thestudentsoffortune.com/cis-500-week-8-case-study-2-cloud-computing/

CrystalJames932's insight:

http://www.thestudentsoffortune.com/cis-500-week-8-case-study-2-cloud-computing/

 

Cloud computing is defined by Cearly and Phifer in their case study titled “Case Studies in Cloud Computing” as “a style of computing in which scalable and elastic IT-related capabilities are provided ‘ as a service’ to customers using Internet technologies”. Cloud computing services had been provided by major vendors such as Google, Amazon, Microsoft, IBM, Hewlett-Packard, and others for business computing until recently when Apple Corporation announced iCloud for consumers. Therefore, cloud computing is now available for businesses as well as consumers. Read the case study titled, “ Ericsson”, located here, about Ericsson cloud computing. Write a two to four (2-4) page paper in which you: Assess how Ericsson benefitted from Amazon Web Services (AWS) in terms of cost reduction, automated software updates, remote access, and on-demand availability. Evaluate the scalability, dependability, manageability, and adaptability of Amazon Elastic Compute Cloud (Amazon EC2), Amazon Simple Storage Services (Amazon S3), and RightScale. Examine the security concerns for cloud-based services and make suggestions to cope with these concerns. Assess possible scalability, reliability, and cost issues associated with cloud computing, and make suggestions to overcome each of these issues. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Compare and contrast the strategic and operational use of data management systems. Outline the strategic implications of information assurance and security in an information technology environment. Use technology and information resources to research issues in information systems and technology. Write clearly and concisely about topics related to information systems for decision making using proper writing mechanics and technical style conventions.


 
more...
No comment yet.
Scooped by CrystalJames932
Scoop.it!

CIS 500 Week 5 Midterm Exa

http://www.thestudentsoffortune.com/cis-500-week-5-midterm-exam/

CrystalJames932's insight:

http://www.thestudentsoffortune.com/cis-500-week-5-midterm-exam/

 

Question 1

Why would organizations use cloud computing during tough economic times?

Question 2

List and explain the four major steps in business performance management (BPM).

Step 1 – Decide on desired performance levels – Whats our company goals or objectives.

Step 2 – Determine how to attain the performance levels – How we are gonna achieve those goals.

Step 3 – Periodically assess where the organization stands with respect to its goals, objectives, and measures – Whats our company status in achieving our goals.

Step 4 – Adjust performance and/or goals – How are we doing is there any issues, if so, apply corrective actions.

Question 3

Which of the following statements about data warehousing is false?

Question 4

Database management systems range in size and capabilities from the simple __________ to full-featured __________ solutions.

Question 5

Which of the following is not a reason why managers and information workers may be constrained by data?

Question 6

Being a smart company involves each of the following except:

Question 7

Data warehouses are designed as __________ systems, meaning that the data can be queried and analyzed much more efficiently than online databases.

Question 8

Which of the following is not one of the essential defenses against botnets and malware?

Question 9

Fingerprints, retinal scans, and voice scans for user identification are examples of __________ controls.

Question 10

Prior to 2002, what was the common perspective on infosec?

Question 11

What is the most cost-effective approach to managing fraud?

Question 12

The Sarbanes-Oxley Act (SOX):

Question 13

Wal-Mart’s global sourcing strategy is designed:

Question 14

Which of the following is an advantage of batch processing over online transaction processing?

Question 15

A transaction processing system (TPS):

Question 16

Which of the following statements about virtualization is false?

Question 17

Processing of transactions is done in one of two modes:

Question 18

What are three of the major data functions performed by a DBMS? Briefly explain the functions.

Question 19

Why do social networks and cloud computing increase IT security risks? How can those risks be reduced?

Response Feedback:

Please check the correc t answer.

Question 20

Networks transmit __________, which carry voice or data between a sender and a receiver.

Question 21

What is significant about 4G networks is that they do not have a __________, which both 2G and 3G networks do have.

Question 22

Why had various information services—namely documents, voice, and video—functioned independently of each other?

Question 23

When you send a file or e-mail message over a network, it is broken into smaller blocks called __________ that follow different paths from the source to the destination.

Question 24

Multiple networks were needed to transmit documents, voice, and video because:

Question 25

IS capabilities support all of the following business objectives except:

Question 26

Which of the following is not a component of an information system?

Question 27

Which of the following is not an impact of the mass migration of users from PCs to mobile devices?

Question 28

Which of the following is a characteristic of competitive advantage?

Question 29

While of the following statements about mobile market opportunities is false?

Question 30

List and explain the four factors to consider when evaluating a mobile network.

  
more...
No comment yet.
Scooped by CrystalJames932
Scoop.it!

CIS 500 Week 2 Assignment

http://www.thestudentsoffortune.com/cis-500-week-2-assignment-1/

CrystalJames932's insight:

http://www.thestudentsoffortune.com/cis-500-week-2-assignment-1/

 

Due Week 2 and worth 75 points The following resources may be helpful in completing this assignment: Goode, E. (2011, August 15). Sending the police before there’s a crime. Retrievable here. Pearsall, B. (2010, May). Predictive policing: The future of law enforcement? National Institute of Justice Journal, 266. Retrievable here. Predictive Policing Symposium (2010). Retrievable here.  Shurkin, J. N. (2011, September 13). Santa Cruz cops experiment with ‘predictive policing’. Retrievable here. Willis, J. J., Mastrofski, S. D., & Weisburd, D. (2003). Compstat in practice: An in-depth analysis of three cities. Police Foundation. Retrievable here. In 1994, the New York City Police Department adopted a law enforcement crime fighting strategy known as COMPSTAT (COMPuter STATistics). COMPSTAT uses Geographic Information Systems (GIS) to map the locations of where crimes occur, identify “ hotspots”, and map problem areas. COMPSTAT has amassed a wealth of historical crime data. Mathematicians have designed and developed algorithms that run against the historical data to predict future crimes for police departments. This is known as predictive policing. Predictive policing has led to a drop in burglaries, automobile thefts, and other crimes in some cities. Write a four to five (4-5) page paper in which you: Compare and contrast the application of information technology (IT) to optimize police departments’ performance to reduce crime versus random patrols of the streets. Describe how COMPSTAT, as an information system (IS), implements the four (4) basic IS functions: Input Processing Output Feedback Determine how information systems have allowed police departments that implement tools such as COMPSTAT to respond to crime faster. Apply the strengths, weaknesses, opportunities, and threats analysis (SWOT analysis) on behalf of police departments that intend to implement predictive policing. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. You may use the resources above or others of your choosing.


 
more...
No comment yet.
Scooped by CrystalJames932
Scoop.it!

CIS 502 Assignment 3 Cybersecurity NIC

http://www.thestudentsoffortune.com/cis-502-assignment-3-cybersecurity-nice/

CrystalJames932's insight:

http://www.thestudentsoffortune.com/cis-502-assignment-3-cybersecurity-nice/

 

Cybersecurity is such an important topic today and understanding its implications is paramount in the security profession. Compliance, certification, accreditation, and assessment are critical in understanding the legal and ethical procedures to follow as a security professional. In support of cybersecurity initiatives, the National Initiative for Cyber Security Education (NICE) has published several initiatives in regard to protecting national security. The following document titled, “National Initiative for Cybersecurity Education”, located at http://csrc.nist.gov/nice/framework/documents/NICE-Cybersecurity-Workforce- Framework-Summary-Booklet.pdf, will be used to help you complete the assignment.

 

Write a three to five (3-5) page paper in which you:

 

1. Examine the National Initiative for Cyber Security Education and describe the initiative.

 

2. Assess the value of the NICE framework. Discuss the importance of this framework in regard to the security profession and individual organizations.

 

3. Suggest three (3) examples that illustrate the importance of the National Initiative for Cyber Security Education initiative.

 

4. Describe the expected outcomes of this initiative.

 

5. Evaluate how organizations can implement the NICE framework to prevent internal and external attacks.

 

6. Determine how the NICE framework addresses the legal and ethical issues in the field of information security.

 

7. Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

 

Your assignment must follow these formatting requirements:

 

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

  
more...
No comment yet.
Scooped by CrystalJames932
Scoop.it!

CIS 500 Week 7 Assignment

http://www.thestudentsoffortune.com/cis-500-week-7-assignment-3/

CrystalJames932's insight:

http://www.thestudentsoffortune.com/cis-500-week-7-assignment-3/

 

Assignment 3: Mobile Computing and Social Networking

Mobile computing has dramatically changed how information is accessed and shared. Wireless networking has been an enabler of mobile computing. One profession that mobile computing has had a big impact on is health care management. Patients are now able to monitor their vital signs such as blood pressure, glucose levels, etc. without having to periodically visit a doctor’s office or hospital. There are devices such as the Withings Blood Pressure Monitor that works with an iPhone, iPod Touch, or iPad to record, track, and graph a patient’s blood pressure. There are other devices that can measure blood glucose levels, oxygen levels, heart rate, etc. and use an iPhone to send the results to a clinical server. Doctors and caregivers are then able to access the data on the clinical server. According to the American College of Gastroenterology, social networking sites like Facebook, Twitter, and YouTube are used as powerful platforms to deliver and receive health care information. Patients and caregivers are increasingly going online to connect and share experiences with others with similar medical issues or concerns Patients are able to take advantage of social networks to do more than just share pictures and tweets. Write a four to five (4-5) page paper in which you: Compare and contrast monitoring of patient vital signs using mobile computing technology to in-patient visits to the doctor’s office or hospital. Analyze the advantages and disadvantages of using mobile computing technology to monitor patients. Assess the security concerns with regard to the transmission of personal medical information over wireless networks. Assess the use of social networking for group support for patients with similar medical concerns.   Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Describe the use of network management, Web, wireless, and mobility technologies. Outline the strategic implications of information assurance and security in an information technology environment. Use technology and information resources to research issues in information systems and technology. Write clearly and concisely about topics related to information systems for decision making using proper writing mechanics and technical style conventions.

  
more...
No comment yet.
Scooped by CrystalJames932
Scoop.it!

CIS 500 Week 4 Assignment

http://www.thestudentsoffortune.com/cis-500-week-4-assignment-2/

CrystalJames932's insight:

http://www.thestudentsoffortune.com/cis-500-week-4-assignment-2/

 

The 3rd Generation Partnership Project (3GPP) developed the 3GPP Long-Term Evolution (LTE) standard for wireless communications technology. It is regarded as an evolution of the Global System for Mobile Communication (GSM), the Universal Mobile Telecommunications Systems (UMTS), and other standards. It is also known as the 4G LTE. The competition among the carriers to support 4G LTE networks has been very fierce as evidenced by TV commercials targeting smartphone users. Many smartphones run on 3G networks.

Write a four to five (4-5) page paper in which you: Compare and contrast 3G wireless networks to 4G networks in terms of: Services and application Network architecture Data throughput User perceptions Distinguish between the 4G LTE, 4G WiMax, and 4G WiBro networks based on: Upload and download speeds User perceptions Backward compatibility Service availability Identify why the competition between the 4G LTE carriers has been so fierce and describe the benefits of this competition to the subscribers. In January 2012, Verizon stated that 4G LTE is available in 190 cities covering 200 million American subscribers. According to AT&T’s Website, they had plans for covering 20 million Americans in 15 markets by end of 2011. Conclude why Verizon is able to cover more markets than AT&T. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. You may use the resources above or others of your choosing.

  
more...
No comment yet.
Scooped by CrystalJames932
Scoop.it!

CIS 500 Week 10 Assignment

http://www.thestudentsoffortune.com/cis-500-week-10-assignment-5/

CrystalJames932's insight:

http://www.thestudentsoffortune.com/cis-500-week-10-assignment-5/

 

There are thousands of iPhone Apps, iPad Apps, and Android Apps that have been developed to perform a myriad of tasks and processes. Initially, most of these applications were games intended to be played on mobile devices. The popularity of these applications led businesses to ponder whether some of their business process applications that run on desktop platforms and the Web could be redesigned to run on mobile devices. The answer was a resounding yes! For example, Nationwide developed the Nationwide® Mobile, a free iPhone App that allows its insurance policyholders to file a claim on the spot when an accident occurs. The application can snap pictures of the accident and attach them to the claim data and upload the claim information to a server. This reduces the length of time to process a claim filed this way. Nationwide competitors have followed suit and developed iPhone, iPad, and Android applications of their own. Policyholders can receive messages via Facebook or Twitter. Other business processes that have been reengineered as a result of mobile computing include Quick Response (QR) codes which have replaced one-dimensional bar codes. They are read using mobile devices, accepting credit card payments from an iPhone, iPad or Android device, depositing checks using an iPhone without visiting a bank, and many more. Write a ten to fifteen (10-15) page term paper in which you:

Assess the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to a processing server without users having to use a desktop system. Evaluate benefits realized by consumers because of the ability to gain access to their own data via mobile applications. Examine the challenges of developing applications that run on mobile devices because of the small screen size. Describe the methods that can be used to decide which platform to support, i.e., iPhone, iPad, Windows Phone, or Android. Mobile applications require high availability because end users need to have continuous access to IT and IS systems. Discuss ways of providing high availability. Mobile devices are subjected to hacking at a higher rate than non-mobile devices. Discuss methods of making mobile devices more secure. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

  
more...
No comment yet.