Explanation of Solution
Usage of cloud by Falcon Security Company:
Falcon Security is an advanced startup enterprise that includes a small IT sector. It takes advantage of cloud instead of developing a larger server infrastructure to store their resources. The cloud services are provided by cloud vendors.
SaaS Products used by Falcon:
SaaS (Software as a Service):
The SaaS provides the organization the service of hardware infrastructure as well as the
- The SaaS dealers govern the cloud servers and make the software available as a thin client.
- However, Falcon Company could use the following SaaS products:
- Google Mail
- Office 365
- Google Drive
- Microsoft CRM Online
- Salesforce.com
Methods of using PaaS contributions by Falcon:
PaaS (Platform As A Service):
In PaaS the vendors are able to provide the hosted computer system, the Operating Systems and the
Want to see the full answer?
Check out a sample textbook solutionChapter 6 Solutions
Using MIS (10th Edition)
- QUESTION 15 What is one of the major difficulties with ROI? O investment decisions not based on ROI O difficulties in quantifying for network security devices O reliance on standardized, objective ROI calculations O too many relevant statistics to analyzearrow_forwardSubmit a feasibility analysis report on the selected case study : Secure Network (case study) Network security . Through network security we may build a secured connection for the transfer of data or transaction of money through online.High level requirements for network security are cloud assets, configured firewall protection, regularly updated antivirus software, network segmentation,data loss prevention.The goal here is to transfer the data without middle/third parties. For example like jcc but for a small company.arrow_forwardYouth Without Borders Ghana (YWB-Gh) is a Non-Governmental Organisation. YWB-Gh is planning to move to offices in East-Legon. As part of the move, they are planning to implement a better security architecture and network design. This is in comparison to their current arrangement which has evolved haphazardly over the last three decades.YWB-Gh currently has a workforce of 35 individuals. Some of these will work remotely. Most however will work from the East Legon office. A very large proportion of these workers are unsalaried volunteers.The system administration will be operated by salaried in-house specialists.YWB-Gh works closely with international collaborator organisations on a range of projects.YWB-Gh has all its online assets within the domain ywbgh.network.testYWB-Gh needs the proposed security architecture and network design to accommodate significant expansion over the next three years.The YWB-Gh rules and regulations requires them to utilise open-source solutions where these…arrow_forward
- What's the best method to approach cloud migration risk management?arrow_forwardWho is responsible for the security breach at Equifax? What could Equifax have done better to minimize the damage?arrow_forwardNorth Ridge Security provides security consulting and assurance services. You have recently been hired as an intern to assist them. A new North Ridge client wants to provide encryption for any data that leaves their premises. You are asked to provide an overview of the different ways in which encryption can be used. encryption through software (third-party software and OS), FDE, SED, HSM, and TPM. Include the advantages and disadvantages of each. the client asks for your recommendation regarding meeting their needs for encryption when taking data off-site. Create a memo communicating the actions you believe would be best for the company to takearrow_forward
- In terms of cloud migration risk management, what is the most effective approach?arrow_forwardManagement of the XYZ Group attended a seminar and came back with a list of threat agents who could possibly harm the network. These are: The inept user The malicious hacker The corporate spy Management is wondering if any of these might have played a role in the previous information leakage incident that has so far cost the company $500,000 in lost sales annually. Answer the following questions as part of your analysis: Note: You need to provide full detail of your analysis of the case study. Which of the three threat agents might have played a role in the information leakage incident? What possible threat agent actions occurred during the information leakage incident? How do you think the product plans were stolen? What do you think were the possible avenues of attack? What recommendations would you make to mitigate this risk for the upcoming product?arrow_forwardWhat are the best techniques for risk management during cloud migration?arrow_forward
- Explain TWO (2) security features that MGMT Mobile Company can implement to enhance the competitive nature of mobile phones at their various locations. Provide adequate justification for your choices.arrow_forwardZumaJay International's Board worries that building access control may not match the present terrorist danger. Several attempts at unlawful entry have resulted in violent assaults on personnel.The facility has had thefts of laptops and computer gear, however it is unclear whether these are worker or guest thefts. The parking is poorly illuminated and readily accessible from the street, making some personnel feel unsafe at night. The Board worries about terrorism, robbery, assault, server vulnerability, subterranean car park security, and intellectual property theft. Access Management • The underground parking lot has no access control or CCTV, and staff don't need passes to access all building sections.• Visitors and contractors get passes at reception and are led by their host.• The security guard at reception monitors the CCTV camera at the building's entrance, where passes are granted.• The building has 4 security guards during working hours and 2 at other times.• There is no CCTV…arrow_forwardWhat role does cloud security play in the operations of your company? What are some ways that cloud security might be improved? Please provide an answer that addresses all of these points.arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education