Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 6, Problem 6.8CE6
a.
Explanation of Solution
Prevent the encroachment of SaaS (Software as a Service) on the business:
- Maximum number of the people believe that the cloud is the future.
- Sometime security with the cloud is questionable, but the people believe that it will improve, making people more comfortable with it as time goes on.
- The economics are enormous in favor of the SaaS providers...
b.
Explanation of Solution
Alternative ways for people can respond:
The alternative ways to prevent the encroachment of SaaS on the business is as follows:
- Goal advertising towards objects most probably to have physical control of their data, li...
c.
Explanation of Solution
Justification:
- One can believe that it would be in our best interest to use all three points. By offering unlimited data that obviously puts the people ahead of the curve because other cloud services provide limited data.
- By focusing more on reliability as opposed to looks one can guarante...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Question 2: Mr. Alice is sending 1 GB of data to Mr. Wasim in California through internet. Mr. Alice’s internet connection/bandwidth is 1 MB. Answers to the following questions.i. Is it possible to transmit 1 GB data on 1 MB bandwidth of internet? ii. If part (i) is YES, then how can the OSI Model play vital role to facilitate Mr. Alice and transmit his data to Mr. Wasim? Explain in details with justification.
“Mr. Ahmad is a cloud computing professional, you asked him for a free advice about cloud providers for your new small company. He gave you full explanation and recommended some good providers. There is another provider which may be better but he did not recommend since he is in dispute after doing some work for them.”
Did Mr. Ahmad did anything wrong as an IT professional? Is his behavior not ethical or illegal and why? Are there any consequences of his action?
Analyze this case in depth and write your conclusion.
Hi there, Thaks inadvance. please answer all the questioons and no need to explation, just choose the correct answer, Best
What reason is responsible that an organization may want to consider cloud migration?
Reduce efficiency
Reduced operational expenses
Elimination of risks
Increased personnel costs
If a cloud customer cannot get access to the cloud provider, this affects what portion of the CIA triad?
Integrity
Availability
Confidentiality
Authentication
Chapter 6 Solutions
Using MIS (10th Edition)
Ch. 6.3 - Prob. 1EGDQCh. 6.3 - Prob. 2EGDQCh. 6.3 - Prob. 3EGDQCh. 6.3 - Prob. 4EGDQCh. 6.3 - Prob. 5EGDQCh. 6.3 - Prob. 6EGDQCh. 6.3 - Prob. 7EGDQCh. 6.3 - Prob. 8EGDQCh. 6.3 - Prob. 9EGDQCh. 6.7 - Prob. 1QLQ
Ch. 6.7 - Prob. 2QLQCh. 6.7 - Prob. 3QLQCh. 6.7 - The article mentions that quantum computers will...Ch. 6.8 - Prob. 1SGDQCh. 6.8 - Prob. 2SGDQCh. 6.8 - Prob. 3SGDQCh. 6.8 - Prob. 4SGDQCh. 6.8 - Prob. 5SGDQCh. 6.8 - Prob. 6.1ARQCh. 6.8 - Prob. 6.2ARQCh. 6.8 - Prob. 6.3ARQCh. 6.8 - Prob. 6.4ARQCh. 6.8 - Prob. 6.5ARQCh. 6.8 - Prob. 6.6ARQCh. 6.8 - Prob. 6.7ARQCh. 6.8 - Prob. 6.8ARQCh. 6 - Prob. 6.1UYKCh. 6 - Prob. 6.2UYKCh. 6 - Prob. 6.3UYKCh. 6 - Prob. 6.4UYKCh. 6 - Prob. 6.5UYKCh. 6 - Prob. 6.6UYKCh. 6 - Prob. 6.7CE6Ch. 6 - Prob. 6.8CE6Ch. 6 - Prob. 6.9CE6Ch. 6 - Prob. 6.1CE6Ch. 6 - Prob. 6.11CE6Ch. 6 - Prob. 6.12CE6Ch. 6 - Prob. 6.14CS6Ch. 6 - Prob. 6.15CS6Ch. 6 - Prob. 6.16CS6Ch. 6 - Prob. 6.17CS6Ch. 6 - Prob. 6.18CS6Ch. 6 - Prob. 6.19CS6Ch. 6 - Prob. 6.2CS6Ch. 6 - Prob. 6.21MMLCh. 6 - Prob. 6.22MML
Knowledge Booster
Similar questions
- Question 4 Answer the following questions regarding network security.Q.4.1 Read the statement below and then answer the question that follows.Statement:Using proxy servers has several advantages, including increased speed,reduced costs, improved management and stronger security.Evaluate the statement above by commenting critically on each claim made in thestatement.Q.4.2 Rewrite the SaaS, PaaS and IaaS acronyms in full. State at least one securityconcern associated with any one of these models.NB: Only one security concern required for any one model.arrow_forwardSecurity-wise, would you recommend the use of such cloud services in an organization? State your argument either if you recommend it or against it with clear justification and reasoning.arrow_forwardLet's pretend your business is thinking of building a fully hands-off data center. This kind of facility is sometimes referred to as a "lights-out server room." What kind(s) of physical security measures would you implement in that space?arrow_forward
- Part I: a) Explain the difference between managed devices and objects. b) List one object in each of the following areas: the system, IP, TCP, UDP, ICMP, and an interface. c) Why are firms often reluctant to use Set commands? d) Describe SNMPv1’s poor authentication method. e) Describe SNMPv3’s good authentication method. f) How can good security be an enabler with SNMP?arrow_forwardIn this discussion board post, you will analyze and list the advantages and disadvantages of Cloud Computing over on-premise computing. You will also analyze the advantages and disadvantages of each one of the Cloud Deployment models and what approach is best for protecting each. Finally, you will analyze the risks and threats associated with Cloud computing and the best practices to follow. Answer the following: What are the advantages and disadvantages of Cloud computing over on-premise computing? What are the advantages and disadvantages of each one of the Cloud Deployment models? What approach is best for protecting each? What are the types of risks and threats associated with Cloud computing? What are the best practices to follow to better protect your cloud implementations?arrow_forwardSubmit a feasibility analysis report on the selected case study : Secure Network (case study) Network security . Through network security we may build a secured connection for the transfer of data or transaction of money through online.High level requirements for network security are cloud assets, configured firewall protection, regularly updated antivirus software, network segmentation,data loss prevention.The goal here is to transfer the data without middle/third parties. For example like jcc but for a small company.arrow_forward
- a.What is the difference between VPN and MAN? Provide an example of both? Write the complete process of how FOB device is used in a VPN network? b.What is mean by data redundancy and Inconsistency? Provide an example from real lifearrow_forwardConsider your preferred method of wireless access, WPA2. Why is this selection better than the others? Does your solution address security and risk concerns? Explain your reasoning.arrow_forwardThe Managing Director of the business is worried that hardware failures would damage sales since his online shop and accounting software are housed on one of the firm's LANs. To ensure the shortest possible downtime, please provide a list of ten (10) steps he can take.arrow_forward
- Considering that Pitt Fitness is a small company, what type of backup site would be appropriate for their smaller budget?arrow_forwardConsider your preferred method of wireless access, WAN. Why is this selection better than the others? Does your solution address security and risk concerns? Explain your reasoning.arrow_forwardCreate a simple 6 step plan to harden network servers. Explain how the plan can beimplemented and managedarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningSystems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning