Premium Essay

Cis 417 Week 5 Case Study 2

In: Business and Management

Submitted By activitymode
Words 580
Pages 3
CIS 417 WEEK 5 CASE STUDY 2
To purchase this visit here: http://www.activitymode.com/product/cis-417-week-5-case-study-2/ Contact us at:
SUPPORT@ACTIVITYMODE.COM
CIS 417 WEEK 5 CASE STUDY 2 – EXTERNAL INTRUSION OF THE PLAYSTATION NETWORK
On April 20, 2011, the Sony PlayStation Network was taken offline after an external intrusion was discovered. Further research this incident using quality and reputable resources.
Write a two to three (2-3) page paper in which you:
1. Briefly summarize the details of the attack on the PlayStation Network, including the dates of when the attack started and was eventually uncovered.
2. Indicate what explanation Sony officials gave for the length of time that had passed from the start of the attack to when the general public was made aware of the details.
3. Analyze and explain what you believe the correct forensic investigative action would have been once the attack was uncovered.
More Details hidden…
Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 WK 5 Case Study 2 – External Intrusion of the PlayStation Network in order to ace their studies.
CIS 417 WEEK 5 CASE STUDY 2
To purchase this visit here: http://www.activitymode.com/product/cis-417-week-5-case-study-2/ Contact us at:
SUPPORT@ACTIVITYMODE.COM
CIS 417 WEEK 5 CASE STUDY 2 – EXTERNAL INTRUSION OF THE PLAYSTATION NETWORK
On April 20, 2011, the Sony PlayStation Network was taken offline after an external intrusion was discovered. Further research this incident using quality and reputable resources.
Write a two to three (2-3) page paper in which you:
1. Briefly summarize the details of the attack on the PlayStation Network, including the dates of when the attack started and was eventually uncovered.
2. Indicate what explanation Sony officials gave for the length of time that had passed from the start
of…...

Similar Documents

Premium Essay

Week 2 Case Study

...Week 2 Case Study #1 Define the problem – Problems getting real artifacts and the demand for them. Enumerate the decision factors – alternative courses of action, using high quality look alike products to fulfill demand. Uncertainties – political turmoil in supply countries. Consider relevant information – determine what is relevant and then use it to decide the course of action. Will there be a market for look-alike products and will it be profitable? Identify the best alternative – use a decision tree or flow chart to plot/graph outcomes. Hire more craftsmen to craft similar or invest more in a volatile supply countries environment in an attempt to get more products? Develop a plan – Make happen the course you have decided on. Hire more skilled craftsmen to make products in countries that were not feasible to operate in. Evaluate – A decision was made and it was appropriate for the case. #2 Nature of the industry – How do buyers buy in this industry? In countries with serious turmoil and regulations on the export of artifacts, “knock offs” must be considered and offered for sale. The organization – What is it offering for the market? In this case both real artifacts and high quality, high end replicas to consumers. The factors that led to using replicas have driven up demand. A plan of action – What actions are available to the organization? Trying harder to work with supply countries to secure a dependable supply or offering high quality......

Words: 543 - Pages: 3

Premium Essay

Case Study Week 5

...Case Study Week 5 Eric A Brock DeVry University Case Study Week 5 Before I explain how you can apply risk management to our corporate security policy, I want to take a look at the basics of risk management. The risk management process involves answering three simple questions, what assets do you have that are worth protecting, what are the known threats to those assets, what can you do to keep those threats from actually occurring. When it comes to the assets that are worth protecting, your mind probably immediately jumps to your company's hardware inventory. First, it should educate the company's employees as to what is expected of them regarding cybersecurity (prevention). Second, it should be a guide that dictates the appropriate response to a variety of security incidents. To accomplish these two goals, you need to limit your policy to a manageable size. If you're trying to educate users on security strategies, keep the documentation short and simple. Users will usually ignore anything that's over a couple of pages long or that's overly complex. If you want to get technical, the real asset is your data. Since authentication credentials are the gateway to your data, they should also be treated as an asset that needs protecting. Clearly, passwords can be disclosed by users with no malicious intent. The resulting damage, however, can be just as serious as if the security breach were malicious. Therefore, when making your list of known...

Words: 614 - Pages: 3

Free Essay

Case Study Week 5

...QUESTIONS 1. What does this case imply about the supply of and demand for employers and the implications for businesses? The case implies that there is a high demand for employees especially in the high tech industry but the supply is low and has not been met by the volume of the demand making the implications critical for businesses. These organizations are having to step out of the box and go the extra length to ensure they are able to acquire the savvy tech from an early stage. Using tools outside of the normal resume check alongside the educational background, these Companies are able to now “catch them young” by scouting for qualified candidates with needed skills, and recruiting them from colleges instead of waiting till they have completely finished their degree. For instance IBM has made use of its famous Watson computer in certain top schools giving students a chance to challenge the computer. The outcome of these approach will help IBM to narrow down which students to consider and they will work towards luring such students to consider a career at IBM (Robins 2013). As the competition is quite high in this industry, business always have to be creative in their search for talents, be on their toes and pull out all stops in trying to convince potential candidates to choose them instead of their competitors. While some are still struggling to come up with various approach to help them acquire more qualified candidate, the race is still on for the rest in trying to......

Words: 694 - Pages: 3

Free Essay

Cis 532 Case Study 2

...Genome4U – Case Study 2 Dhruvang kansara Strayer University Dr. Edwin Otto October 16, 2014 Introduction Genome4U is research project at a large university that plans to sequence the genomes of 100,000 volunteers. A multi-storey lab is built for the research project, which is being interconnected to the existing infrastructure i.e. Biology lab, Fund-raising office and University Campus network. The Biology Lab is running RIP protocol, whereas the Fund-raising office is running OSPF routing protocol. The new Genome4U Lab network is decided to run on EIGRP routing protocol. The edge router of this network is used to redistribute the RIP, OSPF and EIGRP routes. It will also be used to provide internet access to the Genome4U Lab network through the University Campus Network. Network Design As shown in the figure below, the Biology lab network, fund-raising office network and the University Campus network would be connected to the edge router of Genome4U lab network. The Genome4U edge router would be running multiple routing protocols i.e. EIGRP for internal network, RIP for redistribution with Biology Lab network, OSPF for redistribution with Fund-raising office network. The interface facing the Biology lab network would be configured with RIP protocol, whereas the interface connected to the Fund-raising office network would be configured with OSPF protocol. The interface connected to the Genome4U lab network would be running EIGRP routing protocol...

Words: 981 - Pages: 4

Premium Essay

Cis 524 Week 2 Case Study 1

...A++PAPER;http://www.homeworkproviders.com/shop/cis-524-week-2-case-study-1/ CIS 524 WEEK 2 CASE STUDY 1 CIS 524 Week 2 Case Study 1, Case Study 1: User Interfaces Due Week 2 and worth 90 points Early user interfaces were designed with little or no consideration for the end user. This was largely due to technical and hardware limitations. The poor interface design required a specific skill set for users and limited the mass appeal of computers. Modern interfaces are much more user friendly. Theo Mandel wrote about the five (5) golden rules of interface design. Read Mandel’s article located at http://www.theomandel.com/docs/Mandel-GoldenRules.pdf. Write a four to five (4-5) page paper in which you: 1. Describe three (3) interfaces you interact with on a daily basis. 2. Analyze each interface you identified in Question one (1) and assess how it adheres to Mandel’s five (5) golden rules. 3. Suggest two (2) changes for each interface to achieve a more user-friendly design and justify your suggestion. 4. Provide three (3) screen shots for each interface. Note: These screen shots should be labeled and appear in the appendix of the case study. These pages are not included in the page requirement for the assignment. 5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using......

Words: 362 - Pages: 2

Premium Essay

Cis 524 Week 4 Case Study 2

...A++PAPER;http://www.homeworkproviders.com/shop/cis-524-week-4-case-study-2/ CIS 524 WEEK 4 CASE STUDY 2 CIS 524 Week 4 Case Study 2, CIS 524 Week 4 Case Study 2 Case Study 2: Design Process Due Week 4 and worth 90 points You have recently started your own software design company. You discover that your local DMV is looking to build a system that will allow receptionists to check customers in quickly. They would like for the system to allow customers to self-check-in during busy times, but have receptionists check customers in the rest of the time. Your company puts a bid in for the project and wins. Read the article located at http://www.bcs.org/upload/pdf/ewic_hc07_lppaper18.pdf. Write a four to five (4-5) page paper in which you: 1. Suggest the prototyping technique you would use for this system and support your rationale. 2. Create a management plan containing eight to ten (8-10) stages for proper design of such a system. 3. Explain each stage of the management plan and justify your rationale. 4. Estimate the length of time it will take to complete each stage of the management plan. 5. Compare and contrast the self-check-in interface with the interface a receptionist would use. 6. Use Microsoft Visio or an open source alternative, Dia, to create a total of two (2) graphical representations of your proposed interfaces, one (1) for the self-check-in and one (1) for the receptionist. Note: The graphically depicted solution is not......

Words: 466 - Pages: 2

Premium Essay

Cis 331 Week 8 Case Study 2

...CIS 331 week 8 case study 2 https://hwguiders.com/downloads/cis-331-week-8-case-study-2 CIS 331 week 8 case study 2 After reading “A Patient Information System for Mental Health Care”, I found it necessary that I explain how this system works for the best. In this essay I will explain things such as, the overall architecture for a kind of system. I will explain why this pattern and architecture is important. There will also be key features explained such as architecture patterns, how these patterns can be applied ad implemented and even the shortcomings associated with the architecture. I will also present a UML diagram explaining how the process will work. Patient Information System We use the patient information system to support mental health care. This is a medical information system that maintains information about patients suffering from mentalhealth problems and the treatments that they have received while in recovery. Most mental healthpatients do not require dedicated hospital treatment but need to attend specialistclinics regularly where they can meet a doctor who has detailed knowledge oftheir problems. To make it easier for patients to attend, these clinics are not justrun in hospitals. They may also be held in local medical practices or communitycenters. Mental Health Care-Patient Management System The MHC-PMS (Mental Health Care-Patient Management System) is an informal system that is intended for use in clinics. It makes use of a centralized......

Words: 283 - Pages: 2

Premium Essay

Cis 525 Week 8 Case Study 2

...CIS 525 WEEK 8 CASE STUDY 2 A+ Graded Tutorial Available At: http://hwsoloutions.com/?product=cis-525-week-8-case-study-2 Visit Our website: http://hwsoloutions.com/ Product Description CIS 525 Week 8 Case Study 2, CIS 525 Week 8 Case Study 2 http://www.homeworkproviders.com/shop/cis-525-week-8-case-study-2/ Case Study 2: Primavera Gets Agile Due Week 8 and worth 100 points Read the case study on Primavera Gets Agile located athttp://www.objectmentor.com/resources/articles/Primavera.pdf. This is one of the classic case studies on how an organization adopts agile project management and makes itself more competitive and successful. It highlights the best practice and critical success factors of how to turn the organization’s entire development organization around in an amazing way. Write a five to six (5-6) page paper in which you: Identify the problems with Primavera’s development organization prior to its adoption of agile strategies. Analyze if agile techniques should be considered in solving Primavera’s problems. Support your response. Identify and evaluate Primavera’s strategies and steps on adopting agile methodologies. Identify the challenges and obstacles Primavera was facing at its first attempt with agile project management and analyze how Primavera removed those obstacles. Analyze why agile methodology that Primavera used produced better and bigger business values than traditional project management methodologies. Explain Primavera’s business...

Words: 332 - Pages: 2

Free Essay

Cis 417 Week 2 Assignment 1

...CIS 417 WEEK 2 ASSIGNMENT 1 To purchase this visit here: http://www.activitymode.com/product/cis-417-week-2-assignment-1/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 2 ASSIGNMENT 1 – COMPUTER FORENSIC OVERVIEW Suppose you were recently hired for a new position as the computer forensics specialist at a mediumsized communications company. You have been asked to prepare a presentation to the Board of Directors on your main duties for the company and how your position could help achieve business goals based on security and confidentiality. You are also aware that the company has just had some issues with employee complaints of ongoing sexual harassment over email and instant messaging systems but has been unable to obtain adequate evidence of any kind. Write a two to three (2-3) page paper in which you: 1. Explain the basic primary tasks, high-level investigation processes, and challenges of a computer forensics specialist. 2. Provide an overview of how computing devices are used in crimes of today and how these crimes can affect a company’s data and information. 3. Discuss how computer forensics investigations pertain to the law and trying of cases. More Details hidden… Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 Week 2 Assignment 1 – Computer Forensic Overview in order to ace their studies. CIS 417 WEEK 2 ASSIGNMENT 1 To purchase this visit......

Words: 679 - Pages: 3

Premium Essay

Cis 417 Week 4 Assignment 2 Forensic Lab Design

...CIS 417 WEEK 4 ASSIGNMENT 2 FORENSIC LAB DESIGN To purchase this visit here: http://www.activitymode.com/product/cis-417-week-4-assignment-2-forensic-lab-design/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 4 ASSIGNMENT 2 FORENSIC LAB DESIGN Imagine the university that employs you as an information security professional has recently identified the need to design and build a digital forensic laboratory. You have been tasked with designing the lab for the organization. Write a four to five (4-5) page paper in which you: 1. Explicate the steps you would take to plan a budget for the lab, keeping in mind the general business objective to avoid unneeded costs. 2. Recommend the physical requirements and controls that you would consider implementing in order to keep the lab safe and secure. 3. Identify at least three (3) hardware and software tools that you would include in the design of the lab and explain your reasons behind your choices. 4. Identify the high-level criteria that would be considered when selecting the forensic workstations to be utilized. More Details hidden… Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 Week 4 Assignment 2 Forensic Lab Design in order to ace their studies. CIS 417 WEEK 4 ASSIGNMENT 2 FORENSIC LAB DESIGN To purchase this visit here: http://www.activitymode.com/product/cis-417-week-4-assignment-2-forensic-lab-design/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417......

Words: 640 - Pages: 3

Premium Essay

Cis 417 Complete Class All Assignments and Case Studies

...CIS 417 COMPLETE CLASS ALL ASSIGNMENTS AND CASE STUDIES To purchase this, Click here http://www.activitymode.com/product/cis-417-complete-class-all-assignments-and-case-studies/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 COMPLETE CLASS ALL ASSIGNMENTS AND CASE STUDIES CIS 417 WK 2 Assignment 1 - Computer Forensic Overview, CIS 417 WK 3 Case Study 1 - BTK, CIS 417 WK 4 Assignment 2 - Forensic Lab Design, CIS 417 WK 5 Case Study 2 - External Intrusion of the PlayStation Network, CIS 417 WK 6 Assignment 3 - Securing the Scene, CIS 417 WK 7 Case Study 3 - Casey Anthony Trial, CIS 417 WK 8 Assignment 4 - Data-Hiding Techniques, CIS 417 WK 10 Term Paper - Investigating Data Theft, Click Here to Buy this; http://www.activitymode.com/product/cis-417-complete-class-all-assignments-and-case-studies Activity modeaims to provide quality study notes and tutorials to the students of CIS 417 Complete Class all assignment in order to ace their studies. CIS 417 COMPLETE CLASS ALL ASSIGNMENTS AND CASE STUDIES To purchase this, Click here http://www.activitymode.com/product/cis-417-complete-class-all-assignments-and-case-studies/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 COMPLETE CLASS ALL ASSIGNMENTS AND CASE STUDIES CIS 417 WK 2 Assignment 1 - Computer Forensic Overview, CIS 417 WK 3 Case Study 1 - BTK, CIS 417 WK 4 Assignment 2 - Forensic Lab Design, CIS 417 WK 5 Case Study 2 - External Intrusion of the PlayStation Network, CIS 417 WK 6 Assignment......

Words: 490 - Pages: 2

Premium Essay

Cis 417 Week 7 Case Study 3 Casey Anthony Trial

...CIS 417 WEEK 7 CASE STUDY 3 CASEY ANTHONY TRIAL To purchase this visit here: http://www.activitymode.com/product/cis-417-week-7-case-study-3-casey-anthony-trial/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 7 CASE STUDY 3 – CASEY ANTHONY TRIAL On July 5, 2011, Casey Anthony was found not guilty of first-degree murder in the 2008 death of her daughter, Caylee. Further research this incident using quality and reputable resources. Write a two to three (2-3) page paper in which you: 1. Provide a brief summary of the background, charges, and trial of this high-profile court case. 2. Explain, from a forensics perspective, the digital evidence found on the Anthony family computer that helped the prosecutors build a case against Anthony. 3. Describe what the prosecution was unable to prove based on the digital evidence found. Indicate whether or not you think this is a common problem with digital evidence and provide a rationale for your response. 4. Explain the software issue that was found to have caused inaccurate evidence to be admitted into the trial. More Details hidden… Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 Week 7 Case Study 3 Casey Anthony Trial in order to ace their studies. CIS 417 WEEK 7 CASE STUDY 3 CASEY ANTHONY TRIAL To purchase this visit here: http://www.activitymode.com/product/cis-417-week-7-case-study-3-casey-anthony-trial/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417......

Words: 655 - Pages: 3

Free Essay

Cis 210 Case Study 2

...Case Study 2 CIS 210 Professor: Gerry Waldrop Strayer University Eric Bracken 2/25/2016 Our client has requested a payroll management system for the entire organization. This organization has several branch offices spread across the U.S. that are connected through a Wide Area Network. The preceding information is an explanation of the architecture for the new payroll application. In addition to a diagram illustrating the new application, the types of technology for our architecture and the ethical concerns presented by it are also included. The client currently has a large data center and several branch offices in place. The new system is designed to utilize the existing infrastructure and platform for an easier integration. Using the existing infrastructure will help reduce the initial costs of implementation and administrative overhead. Both of these factors will reflect on the final TCO. The users will simply be able to log into the web portal and interact with the system. All of the processing power used will be that inside the datacenter managed by the same individuals as all other services. A client/server model will be utilized with the clients on a thin-client design for the new payroll application. The client/server model divides the processing between the client and server. Using the thin-client design places most of the processing on the server side. In this case the user interface and data input will be the only processing done on the client......

Words: 731 - Pages: 3

Free Essay

Week 5 Case Study

...Week 5 Case Study Risk Management Policy By Jovan Kirby SEC 280 Professor T. Campbell DeVry University Risk management is the process of making and carrying out decisions that will minimize the adverse effect of accidental losses upon our company. The risk management process is vital to the personal health and safety of employees and the safety of the public. In financial terms, it is vital to our ability to pursue our goals, commence and operate programs, and to perform duties in an efficient and professional manner. We will implement a plan to cover credit card theft and as well as internal breach of personal company information. Some ways to protect against credit card information being compromised is this. We have implemented some ways such as firewalls, restricted policies, and proxy servers. We will go through each one and explain why and how they will make this company stronger and better. First firewalls using a firewall will help build a strong defense. A firewall is a software program or piece of hardware that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet. For example, if a firewall is configured with a rule to block Telnet access, then the firewall will drop packets destined for TCP port number 23, the port where a Telnet server application would be listening. The role of a firewall is to prevent malicious traffic reaching the resources that it is protecting. Some security experts feel this is an......

Words: 765 - Pages: 4

Premium Essay

Cis 462 Case Study 2: Scada Worm

...CIS 462 Case Study 2: SCADA Worm Follow Below Link to Download Tutorial https://homeworklance.com/downloads/cis-462-case-study-2-scada-worm/ For More Information Visit Our Website ( https://homeworklance.com/ ) Email us At: Support@homeworklance.com or lancehomework@gmail.com Case Study 2: SCADA Worm Due Week 6 and worth 100 points Protecting the nation’s critical infrastructure is a major security challenge within the U.S. Likewise, the responsibility for protecting the nation’s critical infrastructure encompasses all sectors of government, including private sector cooperation. Search on the Internet for information on the SCADA Worm, such as the article located at http://www.theregister.co.uk/2010/09/22/stuxnet_worm_weapon/. Write a three to five (3-5) page paper in which you: 1. Describe the impact and the vulnerability of the SCADA / Stuxnet Worm on the critical infrastructure of the United States. 2. Describe the methods to mitigate the vulnerabilities, as they relate to the seven (7) domains. 3. Assess the levels of responsibility between government agencies and the private sector for mitigating threats and vulnerabilities to our critical infrastructure. 4. Assess the elements of an effective IT Security Policy Framework, and how these elements, if properly implemented, could prevent or mitigate and attack similar to the SCADA / Stuxnet Worm. 5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites......

Words: 425 - Pages: 2