Professional Documents
Culture Documents
QUESTION 1: What business and social problems does data center power consumption cause?
The business of data center cause is such as video on demand, maintaining web sites, analyzing large
pools of transactions or social media data that require more and more power-hungry machines
businesses. Besides that, the social problem that the data center power consumption cause is high
corporate operating costs.
QUESTION 2: What solutions are available for these problems? Are they people,
organizational, or technology solutions? Explain your answer.
QUESTION 3: What are the business benefits and costs of these solutions?
-Yes.
-It is very efficient to reduce their power requirements
-Reduce costs
-Reducing impacts on environmental and human health
-Helps to minimize the energy consumption by educating consumers on efficient ways to keep
power usage low.
Stuxnet and the Changing Face of Cyberwarfare: Case Study
Network warfare is a serious problem that should be solved. With the use of technology to control
missiles and wars worldwide, the threat of a network is not as serious as a threat to physical threats.
Network warfare can also play the role of catalyst, inducing the full blow of terror to other
countries.
QUESTION 2: Assess the management, organization, and technology factors that have
created this problem.
From a management point of view, there has been no increase in the focus until recently to ensure
that the policy is in place to prevent network warfare attacks in the organization. More emphasis
must be placed on the need to prevent this. The organization has been injured by the vulnerable
and potential body to the users and employees to be organized to solve a social problem.
Technology and easy access to public progress make cyber wars more likely to happen.
Technology makes the problem more relevant, only to make the situation worse based on the
technology that is leading us.
QUESTION 3: What makes Stuxnet different from other cyberwarfare attacks? How
serious a threat is this technology?
Most cyber warfare attacks attempt to steal information and espionage. Stuxnet virus is able to
infect the industry best practices and make it almost impossible, even though defending ensures
good computer system. The task of the Stuxnet worm is to activate the monitoring and data
acquisition computer only. Part of it was designed to sleep for a long time, and then let them spin
out of control to speed up the nuclear centrifuge in Iran. Another secretly recorded the normal
operation of nuclear power plants, etc., and then played these recordings back to factory operators,
so it would appear in centrifuges when working normally, they actually tear themselves apart. For
this type of cyber war attack, the whole country may be eliminated, not recognized, from inside to
outside.
QUESTION 4: What solutions have been proposed for this problem? Do you think they will
be effective? Why or why not?
The solutions have been proposed for this problem stated below:
(1) Congress is employing legislation that would require all critical infrastructure companies to meet
newer, tougher cybersecurity standards. As cyberwarfare technologies develop and become more
advanced, the standards imposed by this legislation will likely be insufficient to defend against
attacks.
(2) Several security agencies believe that US cyber security is not well-organized. Several different
agencies, including the Pentagon and the National Security Agency (NSA), have their sights on
being the leading agency in the on-going efforts to combat cyberwarfare. The first Headquarters
designed to coordinate government cyber security efforts, called Cybercom, was activated in May
2010 in the hope of resolving this organizational tangle. It will coordinate the operation and
protection of military and Pentagon computer networks. It will coordinate efforts to restrict access
to government computers. And protect systems that run the stock exchanges, clear global banking
transactions, and manage the air traffic control system. Its ultimate goal will be to prevent
catastrophic cyber-attacks against the US Some insiders suggest that it might not be able to
effectively organize the governmental Agencies without direct access to the President, which it
last lacks
How Secure Is your Smartphone? Case Study
QUESTION 1: It has been said that a smartphone is a computer in your hand. Discuss the
security implications of this statement.
When to keep a system secure, we have to consider how keep system secure, and answer of this
question is what kinds of threats can harm the system. In principle, the security of mobile devices
deals with the same issues conventional computer security deals with confidentiality, integrity
and availability.
2. Internal Vulnerabilities
Implementation error
Malfunction caused by implementation error malicious attacker can take advantages using
implementation error (e.g. type safety, arbitrary code execution)
Incompatibility
Disabling application caused by incompatibility between applications. Disabling application
caused by incompatibility between application and platform
User unawareness
Unawareness of a device owner to risks of installing applications from un-trusted sources.
Unawareness of the device owner to the risk of connecting to un-trusted Wi-Fi networks and
web-sites (e.g. Rogue AP, Phishing Site). Unawareness of the device owner to the risks posed by
improper configuration (e.g., Bluetooth settings, browser settings). Unawareness of the owner to
social engineering attacks. User can lose his/her smartphone.
QUESTION 4: What steps can individuals and businesses take to make their smartphones more
secure?
Individuals:
Individuals can use lock screen that requires a password to continue, don’t put easy password
like 1234. This can protect if someone try to use your phone without your promotion.
Only use install trusted Apps. Bad apps are loaded with malware that can infect your gadget with
viruses and steal your information. Good apps like tracking apps can tell you exactly where your
phone is. These apps also let you wipe sensitive information remotely.
Stay safe on public Wi-Fi networks. Don’t use public Wi-Fi to online shopping, your card
information may lost.
Business:
Backup your business data. Thieves and malicious software will threats to your business data.
There are plenty of secure ways to keep your data backed up to the cloud. And for more security
reason, you can set data encryption, two-step verification and password-protected file sharing.
Install an antivirus app. This is the base step you should do on your business smartphone.
Like individual, business smartphone also should set password on phone.
Allow the company to lock the business smartphone and SIM card remotely, wipe important
information from the smartphone and activate the internal GPS to locate the lost or stolen
smartphone.
QUESTION 1: Describe the kinds of big data collected by the organizations described in this
case.
There are mainly three kinds of big data collected by the organizations described in this case.
1. British Library
IBM Bigsheets help the British Library to handle with huge quantities of data and extract the useful
knowledge.
British Library responsible for preserving British Web sites that no longer exist but need to be
preserved for historical purpose.
Example, Web sites for past politicians.
IBM BigSheets helps the British Library to process large amounts of data quickly and efficiently.
3. Vestas
Turbine Location and wind data for organizations to go green.
Vesta’s wind library currently stores data on perspective turbine location and global weather
system.
Vestas implemented a solution consisting of IBM InfoSphere BigInsights software running on a
high-performance IBM System x iDataPlex server.
4. Hertz
Data of consumer sentiment
A car rental Hetrz using big data solution to analyze consumer sentiment from Web surveys,
emails, text message, Web site traffic patterns and data generated at all of Hertz’s 8300 locations
in 146 countries.
Hertz was able to reducing time spent processing data and improving company response time to
customer feedback and changes in sentiment.
QUESTION 2: List and describe the business intelligence technologies described in this case.
1. IBM BigSheets
IBM BigSheets is a cloud application used to perform ad hoc analytical at web scale on
unstructured and structured content.
IBM Bigsheets is an insight engine that helps extract, annotate, and visually analyze vast amounts
of unstructured Web data, delivering the results via a Web browser. For example, users can see
search results in a pie chart.
State and federal law enforcement agencies are analyzing big data to discover hidden patterns in
criminal activity such as correlations between time, opportunity, and organizations, or non-obvious
relationships between individuals and criminal organizations that would be difficult to uncover in
smaller data sets.
IBM BigSheets built atop the Hadoop framework, so it can process large amounts of data quickly
and efficiency.
QUESTION 5: What kinds of organizations are most likely to need big data management
and analytical tools? Why?
1. Organizations which responsible to store the huge information such as national library,
registration department, income tax and so on because these organizations typically be a sources
for government and the public.
2. Authorities Organization such a police department, custom, immigration because they need to
store a big data about criminals and also public to use for safety of the society.
3. Organization to go green need the big data about the weather and location because the weather
and location data are very useful for the companies to accurately make a decision.
In this case, Vestas needed the data about location and wind to locate their turbines.
CONCLUSION
Big Data it's varied; it's growing; it's moving fast, and it’s very much in need of smart
management. Data, cloud and engagement are energizing organizations across multiple industries
and present an enormous opportunity to make organizations more agile, more efficient and more
competitive. In order to capture that opportunity, organizations require a modern Information
Management architecture.
IBM’s big data platform is helping enterprises across all industries. IBM understands the
business challenges and dynamics of your industry and we can help you make the most of all your
information. When companies can analyze all of their available data, rather than a subset, they
gain a powerful advantage over their competition. IBM has the technology and the expertise to
apply big data solutions in a way that addresses your specific business problems and delivers rapid
return on investment.
Copy protected with Online-PDF-No-Copy.com