Aims at providing fast, up-to-date financial data

Assignment Help Basic Computer Science
Reference no: EM13992461

Your group has just been hired as a security advisor for a new startup company named Financial Info Quest (FIQ) that aims at providing fast, up-to-date financial data and news to investment companies in Canada and around the world. FIQ will compete in the same market than Bloomberg, but intends offer services at much lower prices and specialize in the gathering of news information related to Canadian markets.

FIQ just developed a Web platform to which clients can hook up in order to receive the offered services. The Web site has a public section, as well as a private (for members only) section, which is protected by a password. Each client will have a distinct password. The Web platform was recently developed by three graduate students who were hired as summer interns. The platform was written in Java and installed on Windows servers, with the back-end information being stored on Oracle databases. These servers have been placed in a private room, at the Montreal downtown office space of FIQ. They have rented a floor in a newly renovated building situated on Saint-Lawrence Boulevard, which is nicely located near the corner of Mount Royal Avenue where a high vacancy rate has led to low rental prices.

FIQ is about to sign a deal with an offshore company that will offer 24/7 monitoring of news events on the Internet. The owners of FIQ are really excited about this new deal since they are going to receive a great service at a very low and affordable price.

Finally, FIQ is about to hire 5 financial analysts that will coordinate the collection and sharing of information, and add valuable insight regarding Canadian financial information that will be provided to FIQ's clients. The hiring process is almost over and the new employees will begin working at FIQ in the next month. They will each be given a computer as well as a laptop and a smartphone. They are expected to be able to connect to the company's network and access work information systems at any given time of the day, any day of the week. For remote access, one of the summer interns has setup RDP (remote desktop protocol) so that every employee can remotely access their desktop and access any resource on FIQ's network, just as if the employee was physically present at the office.

One of the owners, Gino, is in charge of business development and sales. FIQ is fortunate to have more than 100 small investment boutiques in Montreal and Toronto who are already interested in FIQs services. Services will be offered as a yearly membership, with a monthly fee that will automatically be charged on client's credit card accounts. In order to get things up and running quickly, Gino is thinking of hiring the students once again to quickly develop software that will allow FIQ to manage the payments automatically and directly without needing to pay a fee to a third party payment processor.

The owners of FIQ request that you perform an information security threat and risk assessment on their business processes. They want you to present the top 5 risks that you will have identified, and recommend various risk mitigating controls that will enable FIQ to adequately manage their risks. You will need to present the risks in a convincing way since the owners of FIQ think they already have everything covered very well.

Reference no: EM13992461

Questions Cloud

Select an issue or problem of interest of social change : Select an issue or problem of interest, one that has to do with social change. Think about how you might be able to address this problem and bring about social change
Write a program to perform a topological sort on a graph : Write a program to perform a topological sort on a graph in the language of your choice from the following list C, C++. Run your program on a sample of inputs.
Write an essay about youth drug addiction causes : Write an essay about youth drug addiction causes and concerns and how that relates to sociology. I need to incorporate sociological theories
What is the x-component of the total electric field : What is the x-component of the total electric field at P? What is the y-component of the total electric field at P? What is the magnitude of the total electric field at P?
Aims at providing fast, up-to-date financial data : Finally, FIQ is about to hire 5 financial analysts that will coordinate the collection and sharing of information, and add valuable insight regarding Canadian financial information that will be provided to FIQ's clients. The hiring process is almo..
What are your thoughts and opinions about the roma : Article- Identity, Communication, Inclusion: The Roma and (New) Europe by Liliana Lubomirova Herakova. Based upon the article about Roma Identity, what are your thoughts and opinions about the Roma identities and the "gypsy" identities? Are there ..
Contribution margin ratio and the break-even point : Compute the contribution margin ratio and the break-even point in dollars. Suppose that revenues are $200,000 more than expected. What would the total profit be?
Construct the equity section : Assume that net income for the year was $150,000 (record the closing entry) and the board of directors appropriated $70,000 of retained earnings for plant expansion. Construct the equity section incorporating all the above information.
Describe the three major sections of the jewish bible : Describe the three major sections of the Jewish bible. Include its estimated date of being written and what is contained in each section. Describe the major similarities and differences between the four branches of Judaism

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the technique called

In the transport layer, data transmission is controlled to ensure data integrity and avoid data loss. What is the technique called?

  Determine the number of comparisons

Determine the number of comparisons (as a function of n and m) that are performed in merging two ordered files a and b of sizes n and m, respectively, by the merge method presented in the lecture.

  Let''s try to make inheritance

Let's try to make inheritance a little less abstract and a little bit more concrete. In order to do this, we will model a simple inheritance relationship

  Algorithms for finding possible winers-analysing complexity

Create algorithms for finding the possible winers and the Condorcet winner with analysing its complexity.

  Implementing the application in cloud environment

Application and present the challenges in implementing the application in cloud environment based on the referred research papers - Enterprise Resource Planning application

  Car sale data and try to apply there learning skills

Choose any topic of your interest and create a power point presentation, you should utilize all features were taken in all finished class works. The slide show should present your work in at least twenty slides using different animation techniques..

  Displays the total amount for each service category

?? P7.17Write a program that reads a text file as described in Exercise P7.16, and that writes a separate file for each service category, containing the entries for that category. Name the output files Dinner.txt, Conference.txt, and so on.

  Consult with line and senior managers to identify

It is essential that organisations monitor the externalenvironment and assess any impact they may have on the organisation. How would the following factors influence human resources requirement:

  Internet service addressing

Are there names or numbers used in Internet Service Addressing (websites, and other Internet applications)? Explain your answer.

  Function whose job is to output some sequence

Write a function whose job is to output some sequence of "interesting" #'s. The numbers should be separated from one another somehow so they don't all run together. This function may need to call another function, where the second function determines..

  Article related to cloud-enabling technology

Find 1 article related to Cloud-Enabling Technology and to turn in the following: (1) TheURL of the article, (2) A brief summary of the article, and (3) a brief statement of your thoughts on the article. These items should be no more than 1 page in l..

  Problem regarding the deletemin or findmin

In this strategy, removes cost one unit, but the cost of a deleteMin or findMin depends on the number of nodes that are marked deleted. Suppose that after a deleteMin or findMin there are k fewer marked nodes than before the operation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd