Explanation of Solution
Usage of cloud by Falcon Security Company:
Falcon Security is an advanced startup enterprise that includes a small IT sector. It takes advantage of cloud instead of developing a larger server infrastructure to store their resources. The cloud services are provided by cloud vendors.
SaaS Products used by Falcon:
SaaS (Software as a Service):
The SaaS provides the organization the service of hardware infrastructure as well as the
- The SaaS dealers govern the cloud servers and make the software available as a thin client.
- However, Falcon Company could use the following SaaS products:
- Google Mail
- Office 365
- Google Drive
- Microsoft CRM Online
- Salesforce.com
Methods of using PaaS contributions by Falcon:
PaaS (Platform As A Service):
In PaaS the vendors are able to provide the hosted computer system, the Operating Systems and the
Want to see the full answer?
Check out a sample textbook solutionChapter 6 Solutions
Using MIS (10th Edition)
- Discuss All 5 Key Security Elements of a SaaS-based Business Model.arrow_forwardIn a 10-line paragraph, briefly explain the overalll IT security and why it is important to always align IT/IS strategy and business strategyarrow_forwardThe BYOD movement has serious implications for IT professionals, such as managing applications on user devices and security implications. Do you think BYOD is a net positive or a net negative for the enterprise? Explain your answerarrow_forward
- Even though the employees in the Cisco systems have doubled, STs remains the same. Why? And how it helped to save costs?arrow_forwardWrite a report which, if implemented, will address all the issues identified in the case study. Thereport must have the following structures:Q.2.1 Your report must be structured in the following approach.Q.2.1.1 Executive summary. (5)Q.2.1.2 Background (case study’s IT security issues only). (5)Q.2.1.3 Development of the proposed solution. (5)Q.2.1.4 The role of the IT risk manager in addressing physical and networkrisk.(5)Q.2.1.5 The best methods of combating the network-based attack. (5)Q.2.1.6 The impact of social engineering when combating network security. (5)Q.2.1.7 The most appropriate mechanism in implementing network accessauthentication and authorisation without compromising networksecurity.(5)Q.2.1.8 The implementation of the best strategy to fight against hacking,hijacking and maintain the online presence.(5)Q.2.1.9 The most appropriate location and strategy for the DMZ and firewallimplementation.(5)Q.2.1.10 Conclusion.arrow_forwardWrite a brief report explaining how you would apply the Risk Management Framework to your chosen network. Feel free to use the following template for your response: Introduction Briefly describe your chosen network or system. How big is it? What assets are in it? Who uses it? Who manages it? What sort of cyber risks might each individual component face? RMF Process You can use subheadings for each task - Categorize, Select, Implement, Assess, Authorize, Monitor. For each task, briefly describe how you would identify, implement, and evaluate security controls to mitigate risks associated with it.arrow_forward
- How can employees of a corporation protect a tightly guarded secret? How can you ensure that your staff will always continue to study face-to-face if your company has already deployed KMS?arrow_forwardYour company has acquired Joggers PLC, a smaller company. The integration of the information systems can take up to 6 months, and until then Joggers PLC workers will continue following their policies. You have been tasked with ensuring that their IT practices will be safe and lead to a secure system. What advice would you give your manager regarding information security policies?arrow_forwardYou'll need a security model in order to protect your students' data. Analyze the CNSS model to see how you would deal with each of the three components found inside a cell.arrow_forward
- How xiamoi organization set up in terms of its IT infrastructure? Discuss the hardware , software , telecommunication , information security , networks , and other elementsarrow_forwardComputer Science Evergreening is an important focus for an organization in order of having up-to-date infrastructure. why is it important for small and medium sized companies? Should the initial budget accommodate for evergreening or an organization must wait and see? Prepare a sample SWOT (Strengths, Weaknesses, Opportunities, Threats) Analysis that analyzes the impact of having an evergreening policyarrow_forwardDigital Data Centre Sdn Bhd (DDC) is an IT outsourcing Service Provider (SP) which provide Data Recovery Centre (DRC) services and operate in a purpose build data centre building located at Bukit Jelutong, Selangor. The services include total IT outsourcing for supporting the Information Technology (IT) operation of processing, storage, networking and data management. Consider yourself as the Operational Risk Manager of DDC and provide your professional recommendations on how to manage the risk exposures. Draw a Risk Matrix Diagram (Probability vs. Impact) and plot any of the five (5) risks from the following listing. The plotting need to be logical. Loss of physical assets Loss of human capital Technology/ equipment failure Operational loss Loss of supply Public Liabilityarrow_forward
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning