Premium Essay

Cis 502 Week 3 Case Study

In: Computers and Technology

Submitted By quin
Words 1313
Pages 6
RUNNING HEAD: Advanced Persistent Threats Against RSA Tokens 1

Advanced Persistent Threats Against RSA Tokens
McQuinda Johnson
Dr. Al Oluyomi
CIS 502
January 27, 2014

Advanced Persistent Threats Against RSA Tokens 2 An evolution in the goals and sophistication of computer network intrusions has rendered these approaches insufficient for the threats facing many modern networked organizations. A new class of adversaries, appropriately dubbed the “Advanced Persistent Threat” (APT), represents well-resourced and trained adversaries that conduct multi-year intrusion campaigns targeting highly sensitive and valuable data in an attempt to gain a competitive edge, particularly in international business and law, or nation-state political and military affairs. These adversaries accomplish their goals using advanced tools and techniques designed to circumvent most conventional computer network defense mechanisms and remain undetected in their intrusion efforts or presence on networks over long periods of time. Network defense techniques which leverage knowledge about these adversaries can enable defenders to establish a state of information superiority which decreases the adversary’s likelihood of success with each subsequent intrusion attempt. Threat intelligence can be a force multiplier as organizations look to update their security programs and defenses to deal with increasingly sophisticated advanced persistent threats. Security managers need accurate, timely and detailed information to continuously monitor new and evolving attacks, and methods to exploit this information in furtherance of an improved defensive posture. Make no mistake about it: concurrent computer network defense contains a strong element of intelligence and counterintelligence that analysts and managers alike must understand and leverage. The tokens are the market leader…...

Similar Documents

Premium Essay

Case Study Week 3

...Case Study Week 3 Principles of Info System Security Professor Gross by Nick Post Concerning the research collaboration of ABC Institute of Research and XYZ Inc., there are two standard methods that shall be considered for the encryption of all sensitive data being transmitted over the Internet. There is symmetric encryption and asymmetric encryption. It is the intention of this paper to describe both methods and give an opinion on which method to use to secure the sensitive date. When a symmetric encrypted key is used, both parties share the same key to both encrypt and decrypt data. Since symmetric encryption's use-case is to share information between users, each has to posses a shared key. Although a symmetric key requires less computer resources, is simplistic and easy to understand, the utmost security measures should be set in place to ensure the safety and secrecy of the shared key by all collaborators. Should the key become compromised in some way, all sensitive data will be compromised. Also, exchanging the secret key over the Internet or over a large network is extremely risky because it can become intercepted by an attacker who could then use that key to decrypt the shared data. There is an alternative to this type of encryption, however, that could be more secure, though it poses its own disadvantages: asymmetric encryption. An asymmetric encrypted method relies on a public and private key. The public key is available to anyone who might......

Words: 451 - Pages: 2

Premium Essay

Week 3 Case Study

...Petrie’s Electronics Chapter 5 Case Questions 1. What do you think are the sources of the information Jim and his team collected? How do you think they collected all of that information? Conducted interviews with key stakeholders inside the company, He had also worked with the marketing group to put together some focus groups made up of loyal customers, to get some ideas about what they would value in a customer loyalty program. Jim had also spent some time studying customer loyalty programs at other big retail chains and those in other industries as well, such as the airlines, known for their extensive customer loyalty programs. 2. If you were looking for alternative approaches for Petrie’s customer loyalty program, where would you look for information? Where would you start? How would you know when you were done? An alternative approach would be by Business Process Reengineering. It is the search for, and implementation of, radical change in business processes to achieve breakthrough improvements in products and services. The first step would be to identify key business processes which are the structured set of measurable activities designed to produce a specific output for a particular customer or market. 3. Why shouldn’t Petrie’s staff build their own unique system in-house? From the list of requirements, it was clear that Petrie’s staff should seek outside IT consulting to build their system. It would be too expensive and time consuming, not to mention, building a......

Words: 486 - Pages: 2

Premium Essay

Week 3 Case Study

...Week 3 Case study BYOD has the potential for big cost savings because organizations that let employees bring their own devices to work don't waste money on corporate phones. Plus, when an employee can work from a device of his own choosing, it's more enjoyable than being forced to use a corporate-issued device. That means happier and more productive users. Another advantage of BYOD is that it supports a mobile and cloud-focused IT strategy. From their personal mobile devices, employees can access their work in the cloud, further improving productivity. The overall BYOD benefits are that they save the company money and they make workers happy. There are however four big BYOD risks. Think about how you'll pay for services. Users might pay for devices, but who's going to pay for the voice and data plans? There are a couple of ways you can handle cost-sharing, but it's important to pick one and get users to agree to it.  You're going to have to draft acceptable use and security policies that include the consequences of violation. Then you need to train users and help desk staff on best practices and support. You'll have to know how to handle the biggest  BYOD challenges, security. At a urban health plan inc their doctors travel a large hospital with their iThings, recording patient information, diagnostic data and preparing reports. The network travels with the doctor, following him or her throughthe building. When it’s time to print, the request is sent to the closest......

Words: 341 - Pages: 2

Free Essay

Week 7- Case Study #3

...What to do with Howard? Week 7- case study #3 Synopsis: Agrigreen, Inc. is a company that manufactures a verity of agricultural fertilizer. With plants located in the western United States and Canada, Agrigreen employees are certified surveyors to make sure the quality and safety of every project is correct. Tad Pierson position at one of Agrigreen plants is a project engineer which he enjoys being. As project engineer Tad is put over the operation of the plant surveying group. Since being there Tad Pierson is becoming more aware of some performance, safety, and conflict issues within the surveyor group. These issues are beginning to escalate in and is causing Tad to become worried and concern in regards to the safety of the employees, the issues are also interfering with the production schedules leaving Tad Pierson to consider possible actions that he may need to take to resolve the issue within the organization. After receiving his surveyor’s certificate from the local civil technologies college, Howard Lineberry had gone to work for the State Highway Department as a chainman but the job hadn’t paid him very well So, when a job for a lead surveyor had opened up at Agrigreen eighteen years ago, Lineberry had been glad to get it. Howard Lineberry became a lead surveyor and has been employed with Agrigreen for eighteen years. Over the years working at Agrigreen he has been supervised by five different managers, and a total of three surveyor helpers. Over the years of...

Words: 288 - Pages: 2

Free Essay

Case Study Week 3

...influence a public servant. Some of these charges are felonies and carry a maximum sentences of six years in prison. Richard Heen pled guilty to the felony charge of attempting to influence a public servant and received four years probation, was prohibited from receiving and financial benefit from the case during the period of the probation; and received 90 days of jail time with 60 days being work release time. Richard pled to more serve felony charge so that his wife could be charged with misdemeanor, a lesser charge. She, thereby, could avoid deportation back to Japan. Mayumi pled guilty to false reporting to authorities. She was sentenced to 20 days in jail, which she can serve on weekends after her husband’s release Sheriff Aderman was seeking full restitution of approximately 50,000 USD for the cost of investing the hoax. The FAA planned to seek a fine of 11,000 Question 2: What stage of moral reasoning is exhibited by Richard Heene's actions? Do you believe the punishment fit the crime? Why or why not? Richard Heene was reasoning at stage 2 in the pleading guilty to a felony charge, Richard was reasoning at stage 3 (fairness to others) and showing loyalty to his wife. Question 3 :Explain how the cognitive-developmental approach influences one's ability to make ethical judgments? Cognitive development approach assumes that individuals construct a system of moral reasoning. Moral development proceeds through successive stages, each stage involves more complex......

Words: 949 - Pages: 4

Free Essay

Cis 554 Case Study 1 Week 3 Solution – a Graded Work

...CIS 554 Case Study 1 Week 3 Solution – A Graded Work Follow www.hwmojo.com link below to purchase solution http://www.hwmojo.com/products/cis554-case-study-1 Email us if you need help with anything else. Support@hwmojo.com CIS 554 Case Study 1: Reaching Success through Best Project Management Practices Due Week 3 and worth 80 points Read the following articles: 1. •“OPM3® Case Study: OPM3 in Action: Pinellas County IT Turns Around Performance and Customer Confidence”. Note: The article in PDF format can be found in the online course shell. 2. •“IT project management and virtual teams”. SIGMIS CPR '04 Proceedings of the 2004 SIGMIS conference on Computer personnel research: Careers, culture, and ethics in a networked environment, pages 129-133. Note: This article can be found in the ACM Digital Library 
Please follow the steps below to access ACM Digital Library: Login to iCampus at https://icampus.strayer.edu/login: From iCampus: Click STUDENT SERVICES>> Learning Resources Center >> Databases Scroll down to "Information Systems/Computing" The ACM Digital Library is below the heading. 3. Write a two to three (2-3) page paper in which you: Identify the common challenges that exist within IT projects based on the first article. Highlight the best practices that could be linked to the successful performance of IT project teams. Determine at least three (3) challenges that exist when working with virtual teams based on the...

Words: 536 - Pages: 3

Free Essay

Cis 505 Case Study 3

...CIS 505 Case study 3 week 7 Carlson Companies Prof Name Matthew Anyanwu Student name Sajid Mehmood Date 08/16/2015 Carlson Companies * Assess how the Carlson SAN approach would be implemented in today’s environment. In the same way as other IT staff confronted with exponential stockpiling development, Norman Owens understood a couple of years back that his organization was set out toward a test on the off chance that it didn't begin uniting its stockpiling assets onto a stockpiling territory system (SAN). Owens, a stockpiling system designer and expert with Carlson Companies, addresses a crowd of people of his associates at Storage Decisions 2003 as of late about his organization's merging endeavors. (While not so much a commonly recognized name, Carlson Companies is a global vicinity behind such understood retail and lodging networks as TGI Friday's and Radisson inns and resorts. Before solidifying onto a SAN, Owens' imparted administrations gathering upheld an arrangement to one centralized computer and 26 servers, where the greater part of the servers were working diligently supporting the organization's Oracle Financials database under HP/UX. This course of action took care of 14TB of information, more than 54 SCSI and 8 ESCON associations. "It resembled a point-to-point SCSI arrangement," Owens said, noticing, "There were a ton of links." When they required more stockpiling, "We'd simply go purchase another casing. After the organization requested that his......

Words: 1555 - Pages: 7

Premium Essay

Cis 524 Week 2 Case Study 1

...A++PAPER;http://www.homeworkproviders.com/shop/cis-524-week-2-case-study-1/ CIS 524 WEEK 2 CASE STUDY 1 CIS 524 Week 2 Case Study 1, Case Study 1: User Interfaces Due Week 2 and worth 90 points Early user interfaces were designed with little or no consideration for the end user. This was largely due to technical and hardware limitations. The poor interface design required a specific skill set for users and limited the mass appeal of computers. Modern interfaces are much more user friendly. Theo Mandel wrote about the five (5) golden rules of interface design. Read Mandel’s article located at http://www.theomandel.com/docs/Mandel-GoldenRules.pdf. Write a four to five (4-5) page paper in which you: 1. Describe three (3) interfaces you interact with on a daily basis. 2. Analyze each interface you identified in Question one (1) and assess how it adheres to Mandel’s five (5) golden rules. 3. Suggest two (2) changes for each interface to achieve a more user-friendly design and justify your suggestion. 4. Provide three (3) screen shots for each interface. Note: These screen shots should be labeled and appear in the appendix of the case study. These pages are not included in the page requirement for the assignment. 5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using......

Words: 362 - Pages: 2

Premium Essay

Cis 524 Week 4 Case Study 2

...A++PAPER;http://www.homeworkproviders.com/shop/cis-524-week-4-case-study-2/ CIS 524 WEEK 4 CASE STUDY 2 CIS 524 Week 4 Case Study 2, CIS 524 Week 4 Case Study 2 Case Study 2: Design Process Due Week 4 and worth 90 points You have recently started your own software design company. You discover that your local DMV is looking to build a system that will allow receptionists to check customers in quickly. They would like for the system to allow customers to self-check-in during busy times, but have receptionists check customers in the rest of the time. Your company puts a bid in for the project and wins. Read the article located at http://www.bcs.org/upload/pdf/ewic_hc07_lppaper18.pdf. Write a four to five (4-5) page paper in which you: 1. Suggest the prototyping technique you would use for this system and support your rationale. 2. Create a management plan containing eight to ten (8-10) stages for proper design of such a system. 3. Explain each stage of the management plan and justify your rationale. 4. Estimate the length of time it will take to complete each stage of the management plan. 5. Compare and contrast the self-check-in interface with the interface a receptionist would use. 6. Use Microsoft Visio or an open source alternative, Dia, to create a total of two (2) graphical representations of your proposed interfaces, one (1) for the self-check-in and one (1) for the receptionist. Note: The graphically depicted solution is not......

Words: 466 - Pages: 2

Premium Essay

Cis 524 Week 7 Case Study 3

...A++PAPER;http://www.homeworkproviders.com/shop/cis-524-week-7-case-study-3/ CIS 524 WEEK 7 CASE STUDY 3 CIS 524 Week 7 Case Study 3, Case Study 3: Security Due Week 7 and worth 100 points A large, fast-food chain unveiled a new touch screen register for its franchises. Each cashier was assigned a user id and password combination to log in to the register. The system allowed the incorrect password to be entered four (4) times before the register would lock and require a manager to unlock it with a key card. To prevent unauthorized access, the registers would lock after three (3) minutes if the screen was not touched. When the register locked, only the cashier who was logged in prior to it locking could unlock it without a system restart. After a few days in operation, restaurant managers started complaining about the amount of time they were spending unlocking the registers. Some cashiers were forgetting their user Id and password, so other cashiers would log in for them. It also seemed that the button layout made it easy for the cashiers to key in the incorrect password. The managers also complained that cashiers would leave for a break or end their shift and forget to log out of the locked register. The managers would have to reboot the system, a three to five (3-5) minute process in order for the next cashier to log in. Additionally, managers noticed that grease was building up on the touch screens, making them less responsive. Write a five to eight......

Words: 638 - Pages: 3

Premium Essay

Cis 331 Week 4 Case Study Assignment

...CIS 331 Week 4 Case Study Assignment https://hwguiders.com/downloads/cis-331-week-4-case-study-assignment CIS 331 Week 4 Case Study Assignment There are many possibilities you can take when dealing with an SS. A SRS is basically an organization understands of the customer or potential client’s system requirements and dependencies at a particular point in time prior to any actual design or even change development work. This is known as a two-way insurance policy that makes sure that both the client and the organization understand the other’s requirements from a certain perspective at a given point in time. In this essay I will create a SRS of a hotel managements system. I will also give you examples of an SRS and explain things such as the description, the function, and the specifications. User & System Requirements With this system come user requirements. These are certain requirements that will help gain access to the SRS for the hotel. It will also be broken down into specific categories. For example; the software that will most likely be used is the oracle. While some of the user requirements will be login credentials, reservations, check ins, payments and room service. The external requirements will include things such as a computer or laptop, keyboard, mouse, and a printer. As for the hardware requirements, this system will most likely be running on windows by Microsoft. Functional and Nonfunctional Requirements Most of the functional requirements...

Words: 267 - Pages: 2

Premium Essay

Cis 331 Week 8 Case Study 2

...CIS 331 week 8 case study 2 https://hwguiders.com/downloads/cis-331-week-8-case-study-2 CIS 331 week 8 case study 2 After reading “A Patient Information System for Mental Health Care”, I found it necessary that I explain how this system works for the best. In this essay I will explain things such as, the overall architecture for a kind of system. I will explain why this pattern and architecture is important. There will also be key features explained such as architecture patterns, how these patterns can be applied ad implemented and even the shortcomings associated with the architecture. I will also present a UML diagram explaining how the process will work. Patient Information System We use the patient information system to support mental health care. This is a medical information system that maintains information about patients suffering from mentalhealth problems and the treatments that they have received while in recovery. Most mental healthpatients do not require dedicated hospital treatment but need to attend specialistclinics regularly where they can meet a doctor who has detailed knowledge oftheir problems. To make it easier for patients to attend, these clinics are not justrun in hospitals. They may also be held in local medical practices or communitycenters. Mental Health Care-Patient Management System The MHC-PMS (Mental Health Care-Patient Management System) is an informal system that is intended for use in clinics. It makes use of a centralized......

Words: 283 - Pages: 2

Premium Essay

Cis 525 Week 8 Case Study 2

...CIS 525 WEEK 8 CASE STUDY 2 A+ Graded Tutorial Available At: http://hwsoloutions.com/?product=cis-525-week-8-case-study-2 Visit Our website: http://hwsoloutions.com/ Product Description CIS 525 Week 8 Case Study 2, CIS 525 Week 8 Case Study 2 http://www.homeworkproviders.com/shop/cis-525-week-8-case-study-2/ Case Study 2: Primavera Gets Agile Due Week 8 and worth 100 points Read the case study on Primavera Gets Agile located athttp://www.objectmentor.com/resources/articles/Primavera.pdf. This is one of the classic case studies on how an organization adopts agile project management and makes itself more competitive and successful. It highlights the best practice and critical success factors of how to turn the organization’s entire development organization around in an amazing way. Write a five to six (5-6) page paper in which you: Identify the problems with Primavera’s development organization prior to its adoption of agile strategies. Analyze if agile techniques should be considered in solving Primavera’s problems. Support your response. Identify and evaluate Primavera’s strategies and steps on adopting agile methodologies. Identify the challenges and obstacles Primavera was facing at its first attempt with agile project management and analyze how Primavera removed those obstacles. Analyze why agile methodology that Primavera used produced better and bigger business values than traditional project management methodologies. Explain Primavera’s business...

Words: 332 - Pages: 2

Premium Essay

Cis 417 Week 5 Case Study 2

...CIS 417 WEEK 5 CASE STUDY 2 To purchase this visit here: http://www.activitymode.com/product/cis-417-week-5-case-study-2/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 5 CASE STUDY 2 – EXTERNAL INTRUSION OF THE PLAYSTATION NETWORK On April 20, 2011, the Sony PlayStation Network was taken offline after an external intrusion was discovered. Further research this incident using quality and reputable resources. Write a two to three (2-3) page paper in which you: 1. Briefly summarize the details of the attack on the PlayStation Network, including the dates of when the attack started and was eventually uncovered. 2. Indicate what explanation Sony officials gave for the length of time that had passed from the start of the attack to when the general public was made aware of the details. 3. Analyze and explain what you believe the correct forensic investigative action would have been once the attack was uncovered. More Details hidden… Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 WK 5 Case Study 2 – External Intrusion of the PlayStation Network in order to ace their studies. CIS 417 WEEK 5 CASE STUDY 2 To purchase this visit here: http://www.activitymode.com/product/cis-417-week-5-case-study-2/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 5 CASE STUDY 2 – EXTERNAL INTRUSION OF THE PLAYSTATION NETWORK On April 20, 2011, the Sony PlayStation Network was taken offline after an external intrusion......

Words: 580 - Pages: 3

Premium Essay

Cis 417 Week 7 Case Study 3 Casey Anthony Trial

...CIS 417 WEEK 7 CASE STUDY 3 CASEY ANTHONY TRIAL To purchase this visit here: http://www.activitymode.com/product/cis-417-week-7-case-study-3-casey-anthony-trial/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 7 CASE STUDY 3 – CASEY ANTHONY TRIAL On July 5, 2011, Casey Anthony was found not guilty of first-degree murder in the 2008 death of her daughter, Caylee. Further research this incident using quality and reputable resources. Write a two to three (2-3) page paper in which you: 1. Provide a brief summary of the background, charges, and trial of this high-profile court case. 2. Explain, from a forensics perspective, the digital evidence found on the Anthony family computer that helped the prosecutors build a case against Anthony. 3. Describe what the prosecution was unable to prove based on the digital evidence found. Indicate whether or not you think this is a common problem with digital evidence and provide a rationale for your response. 4. Explain the software issue that was found to have caused inaccurate evidence to be admitted into the trial. More Details hidden… Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 Week 7 Case Study 3 Casey Anthony Trial in order to ace their studies. CIS 417 WEEK 7 CASE STUDY 3 CASEY ANTHONY TRIAL To purchase this visit here: http://www.activitymode.com/product/cis-417-week-7-case-study-3-casey-anthony-trial/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417......

Words: 655 - Pages: 3