Strayer University
107 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by KaylaShoffner22
Scoop.it!

CIS 512 Week 3 Assignment 1 Numerical Precisio

http://www.thestudentsoffortune.com/cis-512-week-3-assignment-1-numerical-precision/

KaylaShoffner22's insight:

http://www.thestudentsoffortune.com/cis-512-week-3-assignment-1-numerical-precision/

 

Assignment 1: Numerical Precision

The storage and representation of numbers in a computer can lead to costly mistakes because of precision errors. When using floating point numbers, one must make sure that the correct number of digits is used in a calculation because rounding errors can produce values that lead to errors. Consider the floating point format, exponential format, and binary coded decimal (BCD).

Write a four to five (4-5) page paper in which you:

1. Analyze the floating point format in order to:

a. Determine how floating point numbers are stored in memory.

b. Discuss the ease or difficulty of manipulating and using floating point numbers in arithmetic calculations.

2. Determine whether or not you believe that the floating point format is memory efficient. Provide a rationale to support your answer.

3. Analyze the format used to store numbers using the binary coded decimal format. Determine whether the BCD format is more or less memory efficient than the floating point format.

4. Compare and contrast the BCD format to the floating point format in terms of:

a. precision

b. performance in calculations

c. memory usage

5. Select the format (floating point format, binary coded decimal (BCD), or exponential format) that you would recommend for processing efficiency and explain why.

6. Floating point numbers can introduce rounding errors in the banking industry, which may lead to financial benefit for the bank but not for the customer. Analyze the ethics of knowingly benefitting from rounding errors. Propose a plan on how the rounding error should be handled.

7. Differentiate between the exponential format and the floating point format in terms of:

a. format

b. processing speed

c. accuracy

8. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Assignment must be written in APA style and include in-text citations.

Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

  
more...
No comment yet.
Scooped by KaylaShoffner22
Scoop.it!

CIS 512 Case Study 1 Advanced Persistent Threats Against RSA Token

http://www.thestudentsoffortune.com/cis-512-case-study-1-advanced-persistent-threats-against-rsa-tokens/

KaylaShoffner22's insight:

http://www.thestudentsoffortune.com/cis-512-case-study-1-advanced-persistent-threats-against-rsa-tokens/

 

Case Study 1: Advanced Persistent Threats Against RSA Tokens
Due Week 3 and worth 100 points

Authentication breach by impersonation or password crack has been popular for attackers to breach our assets. The latest RSA APT attack to breach one of the most secure RSA tokens alerted the industry and reminded all of us that there is no security that can last forever. We must remain vigilant and stay ahead of the game. Read the following document titled, “APT Summit Findings”, as well as the document titled “RSA Security Brief”.

Write a five to eight (5-8) page paper in which you:

Analyze the Advanced Persistent Threats (APT) Summit Findings article as well as the RSA Security Brief article and identify the vulnerabilities that existed in the system. Analyze the attack methods carried out in pursuit of the authentication breach and explain which methods were successful and why. Suggest three (3) techniques or methods to protect against APT attacks in the future as the CSO for a large organization. Determine what types of technologies would help alleviate the problems identified in the articles assuming you are the CSO or CTO in an organization. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Describe the industry requirements and organizational challenges of forming a sound information security workforce from a management perspective. Define common and emerging security issues and management responsibilities. Analyze the methods of managing, controlling, and mitigating security risks and vulnerabilities. Explain access control methods and attacks. Use technology and information resources to research issues in security management. Write clearly and concisely about the theories of security management using proper writing mechanics and technical style conventions.

  
more...
No comment yet.
Scooped by KaylaShoffner22
Scoop.it!

CIS 502 Case Study 4 Remote Access Attacks Quick Finance Inc

http://www.thestudentsoffortune.com/cis-502-case-study-4-remote-access-attacks-quick-finance-inc/

KaylaShoffner22's insight:

http://www.thestudentsoffortune.com/cis-502-case-study-4-remote-access-attacks-quick-finance-inc/

 

Case Study 4: Remote Access Attacks
Due Week 8 and worth 100 points 

Above is the Quick Finance Company network diagram. The company is a small business and does not invest much in security protection. System 1000 hosts a customer database as well as employee payroll systems. The company Web server has been defaced twice this month and the VPN server has suffered from session hijacking and Denial-of-Service (DOS) attacks twice last year. The company does not enforce a password policy and does not have a dedicated security professional.

Write a five to eight (5-8) page paper in which you:

Analyze the Quick Finance Company Network Diagram and describe the assumptions you will need to make in order to identify vulnerabilities and recommend mitigation techniques as there is no further information from this company. The company does not wish to release any security related information per company policy. Analyze the above case and network diagram, and describe how each access point is protected or unprotected. Evaluate and describe the vulnerabilities of the Quick Finance Company’s network based on the network design. Rank the top three (3) most likely network-based attacks in the order they are likely to occur and suggest countermeasures for each. Recommend mitigation procedures to reduce or eliminate business interruptions. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Describe the details and the importance of application security models and their implementation from a management perspective. Explain access control methods and attacks. Compare and contrast network-based attacks and countermeasures. Evaluate potential situations of business interruption and the planning necessary to mitigate the threats involved. Use technology and information resources to research issues in security management. Write clearly and concisely about the theories of security management using proper writing mechanics and technical style conventions.

  
more...
No comment yet.
Scooped by KaylaShoffner22
Scoop.it!

CIS 502 Case Study 2 Social Engineering Attacks and Counterintelligenc

http://www.thestudentsoffortune.com/cis-502-case-study-2-social-engineering-attacks-and-counterintelligence/

KaylaShoffner22's insight:

http://www.thestudentsoffortune.com/cis-502-case-study-2-social-engineering-attacks-and-counterintelligence/

 

Case Study 2: Social Engineering Attacks and Counterintelligence

Social engineering attacks and counterintelligence have major impacts to our national security. In July 2010, the Afghan War Diary was released in WikiLeaks. In October 2010, WikiLeaks also released the largest military leak in history – the Iraq War Logs revealing the war occupation in Iraq. This type of information is considered as classified data by the Department of Defense.

Read the article titled, “WikiLeaks Releases 400,000 Classified US Military Files”, and then read the article titled, “WikiLeaks: At Least 109,000 Killed During Iraq War”.

Write a five to eight (5-8) page paper in which you:

Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs. Examine the importance of forming a sound information security workforce and describe the challenges faced by organizations in doing this as evidenced by the articles about the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks. Predict how the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks could influence organizations in regard to their security policies and risk management procedures. Propose two (2) methods to thwart this type of intelligence leak in the future and explain why each would be effective. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Evaluate an organization’s security policies and risk management procedures, and its ability to provide security countermeasures. Analyze the methods of managing, controlling, and mitigating security risks and vulnerabilities. Define common and emerging security issues and management responsibilities. Use technology and information resources to research issues in security management. Write clearly and concisely about the theories of security management using proper writing mechanics and technical style conventions

  
more...
No comment yet.
Scooped by KaylaShoffner22
Scoop.it!

CIS 512 Week 10 Term Paper Hypervisor

http://www.thestudentsoffortune.com/cis-512-week-10-term-paper-hypervisors/

KaylaShoffner22's insight:

http://www.thestudentsoffortune.com/cis-512-week-10-term-paper-hypervisors/

 

Term Paper: Hypervisors
Due Week 10 and worth 170 points

A hypervisor is computer hardware platform virtualization software that allows multiple different operating systems (O/S) to share a single hardware host. The configuration is such that each O/S thinks that it has the host’s processors, memory, and other resources all to itself. The hypervisor actually controls the host processors and resources distributing the resources to each O/S depending on need, and ensures that no O/S can disrupt any other O/S.

Write an eight to ten (8-10) page paper in which you:

Examine the technical advantages and disadvantages of using a hypervisor in an enterprise. Compare and contrast the hypervisors from Microsoft (Hyper-V), VMware (ESXi), and Hitachi’s (Virtage). Evaluate the effect of hypervisors on the TCO (Total Cost of Ownership) in an enterprise. Determine whether the implementation of hypervisors has an impact on system administration. (i.e., Would system administrators need re-training?) Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Analyze the main classes of hardware and system software components in an enterprise context. Use technology and information resources to research issues in enterprise architecture. Write clearly and concisely about Advanced Computer Architecture topics using proper writing mechanics and technical style conventions.

  
more...
No comment yet.
Scooped by KaylaShoffner22
Scoop.it!

CIS 502 Critical Infrastructure Protectio

http://www.thestudentsoffortune.com/cis-502-critical-infrastructure-protection/

KaylaShoffner22's insight:

http://www.thestudentsoffortune.com/cis-502-critical-infrastructure-protection/

 

Assignment 2: Critical Infrastructure Protection
Due Week 6 and worth 50 points

Critical Infrastructure Protection (CIP) is an important cybersecurity initiative that requires careful planning and coordination in protecting our infrastructure.

The following documents titled, “National Infrastructure Protection Plan”, and “Critical Infrastructure Protection”, may be used to complete the assignment.

Write a three to five (3-5) page paper in which you:
1.  Examine the Department of Homeland Security’s :

a.  mission
b.  operations
c.  responsibilities

2.  Explain what Critical Infrastructure Protection (CIP) initiatives are, what are protected, and the methods used to protect our assets.
3.  Describe the vulnerabilities IS professionals need to be concerned with when protecting the U.S.’s critical infrastructure.
4.  Evaluate the effectiveness of IS professionals in regard to protecting the U.S.’s critical infrastructure.
5.  Suggest three (3) methods to improve the protection of our critical infrastructure and justify each suggestion.
6.  Use at least three (3) quality resources outside of the suggested resources in this assignment.  Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Evaluate potential situations of business interruption and the planning necessary to mitigate the threats involved. Analyze the methods of managing, controlling, and mitigating security risks and vulnerabilities. Compare and contrast business continuity and disaster recovery planning. Use technology and information resources to research issues in security management. Write clearly and concisely about the theories of security management using proper writing mechanics and technical style conventions.

  
more...
No comment yet.
Scooped by KaylaShoffner22
Scoop.it!

CIS 502 Case Study 3 Mobile Devices Securit

http://www.thestudentsoffortune.com/cis-502-case-study-3-mobile-devices-security/

KaylaShoffner22's insight:

http://www.thestudentsoffortune.com/cis-502-case-study-3-mobile-devices-security/

 

Case Study 3: Mobile Devices Security

The use of mobile devices is prevalent and growing rapidly as users heavily depend on them. Unfortunately, attackers follow the money and user population. In addition, mobile devices do not receive patches for their vulnerabilities. The Zeus-in-the-Mobile (ZitMo) attack against Android users is an example defeating the emerging technology to steal user’s credentials and ultimately money. Mobile devices can also spread malware.

Read the article titled, “Mobile device attacks surge” and FIPS 140-2 Security Policy. In addition, read the report titled, “Emerging Cyber Threats 2012”.

Write a five to eight (5-8) page paper in which you:

Describe the emerging cybersecurity issues and vulnerabilities presented in the “Emerging Cyber Threats 2012” report. Analyze vulnerabilities of mobile devices in regard to usability and scale based on your research and suggest methods to mitigate the vulnerabilities of mobile devices. Assess and describe the value of cryptography and encryption in regard to Equifax’s approach to implementing stronger security policies around mobile devices.  Justify Gunter Ollmann’s comments about Zeus-in-the-Mobile (ZitMo) and describe the implications of advanced security breaches such as this. Several challenges of controlling information online are set forth in the section of the article titled, “Controlling Information Online – A New Frontier in Information Security”. Determine what you believe is the greatest challenge in regard to controlling information online. Justify Dan Kuykendall’s statement about the biggest issue with mobile browsers and give two (2) examples illustrating his point. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Analyze the methods of managing, controlling, and mitigating security risks and vulnerabilities. Define common and emerging security issues and management responsibilities. Explain access control methods and attacks. Describe the applications and uses of cryptography and encryption. Use technology and information resources to research issues in security management. Write clearly and concisely about the theories of security management using proper writing mechanics and technical style conventions

  
more...
No comment yet.
Scooped by KaylaShoffner22
Scoop.it!

CIS 502 Case Study 2 Social Engineering Attacks and Counterintelligenc

http://www.thestudentsoffortune.com/cis-502-case-study-2-social-engineering-attacks-and-counterintelligence/

KaylaShoffner22's insight:

http://www.thestudentsoffortune.com/cis-502-case-study-2-social-engineering-attacks-and-counterintelligence/

 

Case Study 2: Social Engineering Attacks and Counterintelligence

Social engineering attacks and counterintelligence have major impacts to our national security. In July 2010, the Afghan War Diary was released in WikiLeaks. In October 2010, WikiLeaks also released the largest military leak in history – the Iraq War Logs revealing the war occupation in Iraq. This type of information is considered as classified data by the Department of Defense.

Read the article titled, “WikiLeaks Releases 400,000 Classified US Military Files”, and then read the article titled, “WikiLeaks: At Least 109,000 Killed During Iraq War”.

Write a five to eight (5-8) page paper in which you:

Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs. Examine the importance of forming a sound information security workforce and describe the challenges faced by organizations in doing this as evidenced by the articles about the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks. Predict how the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks could influence organizations in regard to their security policies and risk management procedures. Propose two (2) methods to thwart this type of intelligence leak in the future and explain why each would be effective. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Evaluate an organization’s security policies and risk management procedures, and its ability to provide security countermeasures. Analyze the methods of managing, controlling, and mitigating security risks and vulnerabilities. Define common and emerging security issues and management responsibilities. Use technology and information resources to research issues in security management. Write clearly and concisely about the theories of security management using proper writing mechanics and technical style conventions

  
more...
No comment yet.