Using MIS (10th Edition)
Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 6.8, Problem 6.6ARQ

Explanation of Solution

Usage of cloud by Falcon Security Company:

Falcon Security is an advanced startup enterprise that includes a small IT sector. It takes advantage of cloud instead of developing a larger server infrastructure to store their resources. The cloud services are provided by cloud vendors.

SaaS Products used by Falcon:

SaaS (Software as a Service):

The SaaS provides the organization the service of hardware infrastructure as well as the operating system and the various application programs that are positioned on top of the hardware.

  • The SaaS dealers govern the cloud servers and make the software available as a thin client.
  • However, Falcon Company could use the following SaaS products:
    • Google Mail
    • Office 365
    • Google Drive
    • Microsoft CRM Online
    • Salesforce.com

Methods of using PaaS contributions by Falcon:

PaaS (Platform As A Service):

In PaaS the vendors are able to provide the hosted computer system, the Operating Systems and the Database management System (DBMS) that include own application of the top of the hosted computer system...

Blurred answer
Students have asked these similar questions
What is the vulnerability they had exploited Shamoon? What is the impact of this cyberattack  Shamoon to Aramco?
How Can Falcon Security Use the Cloud?
Smart-Toys-Smart Kids is a toy manufacturing company with their own retail stores. They have been manufacturing and distributing toys to more than 150 retail stores in the region. The company has 500 employees in the Headquarters and conducts B2B transactions with their own retail stores. Consider the given the list of the IT assets and their risk factors, fill out the cybersecurity control table for Smart-Toys-Smart Kids company Headquarters. Use RED in your answers.    Fire Flood Power loss Virus External intruder Internal intruder (80) Office computers (PCs)             (90) Internal Business Application Server              (90) E-mail Server              (90) Web Server              (10) Printers              (90) Software Applications              (100) Data Storage/Memory              (100) Company Financial Database              (100) Customer Information Database              USE THE FOLLOWING CONTROL ITEMS 1. Disaster Recovery Plan (DRP) and Education /…
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education