Reference no: EM133574079
Problem
Read the Case Study 6-2 (pg. 155), The Case of the Extreme Scientists. Answer the following questions:
Question 1) How would you describe the architecture Dr. Schadt uses to do his research?
Question 2) What are the risks Dr. Schadt faces by using Amazon for his supercomputing? What are the benefits?
Question 3) If you were advising a company trying to make a decision about using cloud computing for key business applications, what would you advise and why?
Read the Case Study 7-2 (pg. 177), Sony Pictures: The Criminals Won. Answer the following questions:
Question 1) Setting aside the political issues between North Korea and the United States, is there a reasonable way to respond to an anonymous threat found on the Internet somewhere?
Question 2) What access Up and data protection controls would you recommend Sony use to provide better security for unreleased digital films and e-mails?
Question 3) If you were a hacker, what approach would you have used to break into Sony's system?
Question 4) What do you think the most important SETA elements would be to prevent future hacker attacks against Sony or other media firms?