Using MIS (10th Edition)
Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 6.8, Problem 6.6ARQ

Explanation of Solution

Usage of cloud by Falcon Security Company:

Falcon Security is an advanced startup enterprise that includes a small IT sector. It takes advantage of cloud instead of developing a larger server infrastructure to store their resources. The cloud services are provided by cloud vendors.

SaaS Products used by Falcon:

SaaS (Software as a Service):

The SaaS provides the organization the service of hardware infrastructure as well as the operating system and the various application programs that are positioned on top of the hardware.

  • The SaaS dealers govern the cloud servers and make the software available as a thin client.
  • However, Falcon Company could use the following SaaS products:
    • Google Mail
    • Office 365
    • Google Drive
    • Microsoft CRM Online
    • Salesforce.com

Methods of using PaaS contributions by Falcon:

PaaS (Platform As A Service):

In PaaS the vendors are able to provide the hosted computer system, the Operating Systems and the Database management System (DBMS) that include own application of the top of the hosted computer system...

Blurred answer
Students have asked these similar questions
Visit Cisco, Oracle, and Microsoft's websites (and two more of your choosing; see Resources for a full list). Make sure all necessary safety measures are in place before setting out. Where does one go to get such wisdom?
In 2018, the credit rating agency Equifax disclosed a major data breach involving the personal information of nearly 150 million people. Although Equifax's internal policy required patching critical vulnerabilities within 48 hours, a vulnerability was left unpatched for about 2 months. This was the vulnerability that was exploited by hackers to gain access to the system and obtain the personal information. In this exercise, you will analyze the Equifax incident and consider how the RMF could have helped Equifax prevent the incident. Carefully review this report and identify two vulnerabilities from different organizational levels, such as one vulnerability from Level 3 and one vulnerability from Level 1 or 2. Now think about the seven steps of the RMF. Summarize how these steps could have helped Equifax prevent or mitigate the vulnerabilities you identified. Identify at least one step for each vulnerability.
Question 9   NAG Describe what a secure score is for in a company using Azure services. How is the score obtained? If a network has a theoretical 100 percent score, does that mean it is fully protected from failures or threats? Full explain this question and text typing work only     We should answer our question within 2 hours takes more time then we will reduce Rating Dont ignore this line
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning