cloud computing

 

Part 1: Hypervisors

Review case 8-3 and 8-4. Select one of the two cases from chapter 8 and complete the written exercise.

Case 8-3 Hyper-V (Jamsa page 115)

Review case 8-3 and complete the exercise. Provide a minimum of 2 references to support your writing.

 or

Case 8-4 VmWare (Jamsa page 115)

Review case 8-3 and complete the exercise. Provide a minimum of 2 references to support your writing.

Part 2: Cloud Security

Chapter 9 lists several common security threats to cloud-based environments. Analyze 3 types of cloud security threats and describe methods to mitigate the risks. Compare and contrast the difference between these security threats in a data center/on site versus from the cloud. Provide a minimum of 3 references to support your findings.

Requirements:

Total page count should be a minimum of 3 pages.

Make sure to cite any content provided from your sources.

Minimum number of references for the assignment is 5.

Discussion

There are four types of VPN. Name them and give an example of when I should use that type. Do you think there will be the need for more types of VPN? Why?

How does software defined networking affect the management of a VPN in comparison to traditional VPN management? Does it improve or does it not improve the management of a VPN?

As threats and attacks are a continuing issue, what new technologies/methods do you think should be implemented to protect a VPN?

Discussion 2.0

 

  • Distinguish among character, block, and stream ciphers.
     
  • Specify when to use each.
  • 5 pages.

Note: Remember to cite any sources you use,  including your textbook, using the Strayer Writing Standards format. For  assistance and information, please refer to the Strayer Writing  Standards link in the left-hand menu of your course.

Paper on SQLMap

Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

Write in essay format.  

Use the five paragraph format. Each paragraph must have at least five sentences. 

Include an interesting meaningful title.

linux proposal

 

You’ve won the business! Faster Computing has agreed to the project. As the final stage of pre-implementation, you have been asked to produce a training guide that will demonstrate how to install Linux and provide an overview of several common commands, as follows:

(11.1.3: Install the software.) 

  • Use a hypervisor of your choice to install Linux. Many hypervisors are available, such as Oracle’s VirtualBox, which is a free download. In addition, as part of UMGC’s agreement with VMware, you can download VMware Workstation for free. See below for specific screenshot requirements. You should include at least 3 screenshots (e.g., disk partitioning, timezone selection, creating the default account). Each screenshot should be accompanied by a brief explanation of what you did.
    NOTE: It is not necessary to include screenshots of installing the hypervisor software.

(1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.)

  • Demonstrate command-line operations that will provide the following information:
    • A listing of files in a directory and common file attributes
    • The current directory (hint: also known as the present working directory)
    • Create a file, then copy it to a different directory
    • Create a second file and move it to a different directory
    • Remove the first file, as well as the copy you created
    • The manual page for a given command
    • Create a text file, then use an editor to modify the content. Then display the content of the modified file

(1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.)

In the above section (demonstrate CLI operations) show the commands with options/arguments (e.g., ls, cp, mv, rm) in your documentation as well as in your screenshots. 

(11.2.1: Configure technology according to stakeholder specifications and requirements.)

  • Show running processes on the system. Demonstrate how to search for a specific process
  • Forcibly stop a running process

In the above section (demonstrate CLI operations) show the commands with options/arguments (e.g., top, kill, -9, ps) in your documentation as well as in your screenshots. 

(13.1.1: Create documentation appropriate to the stakeholder.)

The deliverable for the final phase of the project is a written paper with screenshots. There is no minimum or maximum page requirement, but all of the requirements must be met.  Use the Training Guide Template to record your work. This section will be graded upon the overall usefulness of the training guide to the organization.

(11.3.1: Add and update systems as required.) 

This portion of the training guide helps determine your submission is unique.

Important Requirement

On the final screenshot, you need to open a command line and type in the following commands (without the quotes):

“date”

“echo CMIT391”

“echo ” (Replace your name here with your name)

The recommended format is to provide screenshots incorporated within the written narrative. The screenshots must all be your own. Screenshots from external sources are not permitted. You must include the specific screenshot listed above or your project will not be accepted.

(1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension.)

The training guide must have a cover page, an introduction, summary, and at least 3-5 references.

(1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.)

Employ proper spelling and grammar. All Linux commands must be lower case.

(2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.)

In your conclusion of at least a paragraph, summarize why using Linux is beneficial for employees, management, and the organization as a whole.

Tailored vs. Ready-made Software

  

Overview:

In your position as the IT manager at your local hospital, the medical staff of the cardiac ward would like to build an expert system for diagnosis. Your preliminary review shows that the financial investment would be considerable. Your IT Director asked you to write a 2-3 page white paper that he will review and submit to the executive team.

Instructions:

In this paper, you will need to develop the following points:

• Explain the differences among the alternatives to tailored system development,

which include:

o outsourcing

o licensing ready-made software

o using SaaS

o encouraging users to develop their applications.

• List the business trade-offs inherent in the various methods of acquiring systems.

• Describe which systems acquisition approach is appropriate for the medical staff

of the cardiac ward at your hospital.

Requirements:

• This assignment is a paper consisting of 2-3 pages, using APA formatting and

citations.

• Include two references.

Control Objectives for Information and Related Technologies(COBIT)

Research the specific domains and components of the COBIT Framework.  Discuss the levels of security architecture as they relate to the principles of the COBIT Framework.  COBIT faced a variety of criticism.  Explain one criticism of COBIT and discuss if and how the criticism was addressed (if it was)

and assessment of how COBIT criticism was addressed and offer an opposite view of the criticism

3 pages

Industry selection

Please check the attached doc and answer to the questions in it.

Industry to focus: commercial banking industry ( NAICS code – 522110)

 

Note that this code is for the Commercial Banking Industry. Is this what you intended? There doesn’t appear to be an industry called the Finance Industry. So you may want to really get specific on the industry that you are going to focus upon.)

Note: in-text references and cite references are needed. 

maximum words 400

4s week 15 assignment EH

In 300 words

Do you feel the benefits of cloud computing are worth the threats and vulnerabilities? Have we arrived at a point where we can trust external agencies to secure our most precious data? Please explain your answer.

Include references, no copy-paste strictly.