How well does the proposed solution mitigate the risks

Assignment Help Computer Engineering
Reference no: EM131986092

Assignment

Part 1: MidCorp is a mid-sized corporation that sells music and movie downloads over the Internet. They're in the same building as Acme and have the same electric power conditions. MidCorp's CFO that each hour of web server downtime costs the company $2,000 in profit from sales. Describe what MidCorp should do with respect to electric power protection. If your recommendation is different from Acme's, explain why. Explicitly state any assumptions you have made.

Part 2: Acme Corporation operates a small server room. They work 9:00 AM to 5:00 PM, five days a week, and can operate for several hours without IT services. However, part of their IT application includes a database system that is sensitive to interruption; it must be shut down properly to avoid corruption. They're based in Tampa; frequent thunderstorms cause brief power "blips." Complete power failures are rare, but do happen two or three times a year and last for several hours. Describe what Acme should do with respect to electric power protection.

Part 3: Using the cost-benefit analysis method described in the lecture, estimate how much money MidCorp should spend on power protection. You will have to make several assumptions to do this. Your answer should contain an "assumptions" section in which you list them. Justify each assumption in one or two sentences.

Part 4: Bruce Schneier says one should consider the following things when considering implementing a security system:

What assets are you trying to protect?

What are the risks to those assets?

How well does the proposed solution mitigate those risks?

What other risks might the proposed solution cause?

What are the costs and trade-offs of the proposed solution?

Assume your cousin lives with a spouse, a pre-teen daughter and a teenage son. Your cousin has asked for advice on whether to install a monitored burglar alarm in their home. What advice do you give? You do not have to find out the cost of burglar alarm systems for this assignment, but address all the rest of Schneier's considerations.

Part 5: The president of Acme Corporation has just learned that the company can be held responsible for what employees write in electronic mail. He is very worried! Acme has a long-standing, but unwritten, practice that brief personal phone calls are permitted at work, so long as they do not interfere with performance. The company president would like to treat email the same way.

In a couple of paragraphs, explain how personal phone calls and personal email messages are alike.

In a couple of more paragraphs, explain how they are different.

Write a draft policy for personal use of Acme's email system. (You don't need the standards and practices for this one, just the policy. Remember, policies state what must happen, may happen, or must not happen. This can be as short as a couple of paragraphs, but a sentence or too will not do.)

Reference no: EM131986092

Questions Cloud

Calculate descriptive statistics : Calculate descriptive statistics on at least 5 data fields or records - analyse and calculate confidence intervals to compare galvanic skin response
Physician performs a digital rectal exam and reports : His physician performs a digital rectal exam and reports that it appears that John's prostate is enlarged.
Distinguish between a living will and durable power : Distinguish between a living will and durable power of attorney.
Hospital trauma center where you work : A young mother who was severely injured in a car accident is brought into the hospital trauma center where you work.
How well does the proposed solution mitigate the risks : How well does the proposed solution mitigate those risks? What other risks might the proposed solution cause? What are the costs and trade-offs of the solution?
Describe the right-to-die movement in the united states : Name TWO significant cases or events that occured in the United States that furthered the right-to-die cause.
Perform k-means clustering on the dataset : Assignment Task - Clustering, Perform k-means clustering on the dataset. Are there any anomalies (unusual data/missing values) in the given dataset
What is the yield to call if they are called in five years : Kempton Enterprises has bonds outstanding with a $1,000 face value and 10 years left until maturity. What is the yield to call if they are called in 5 years?
Why stem cells are valued for certain types of scientific : Why stem cells are valued for certain types of scientific research. List one reason for and one reason against xenotransplantation.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Disadvantages of using unix versus microsoft windows server

Prepare a critique that addresses the benefits and disadvantages of using UNIX or Linux versus Microsoft Windows Server within the organization.

  Develop rwd for your microsite and use bootstrap framework

Develop RWD for your microsite and use the bootstrap framework to implement it. Explain the message that you want to communicate through your microsite.

  Conduct a comparison between latest intel and amd chips

Conduct a comparison between latest Intel and AMD chips and hard drives, compare three of them for comparison and analysis

  What hash function should be used if it is known in advance

What hash function should be used if it is known in advance that the key values fall into a relatively small range?

  Discuss idea that applications have to visually consistent

From the e-Activity, discuss the idea that all applications have to be visually consistent. Argue whether you agree or disagree with the idea and why.

  Discuss about the largest law firms in the southeast

With approximately 450 lawyers, C.H.E.A.T is one of the largest law firms in the Southeast, as well as one of the most technologically

  What is the ip address of the web server

You ran Wireshark during one of the logins to the site and got the following capture, webadmin.pcap.  Download the pcap file in Kali and open it in Wireshark. Use the information in it to fill in the blanks of the following: What is the IP address..

  Demonstrate a significant application of technical elements

Your final project in this class is required to be more extensive than the weekly lab projects. Your project should demonstrate a significant application of technical elements and also demonstrate originality and creativity.

  Prove that the fifth root of 2 is irrational

Use contraposition to prove that if n^5 is even so is n where n is an integer. The contra positive would be if n is odd, then n^5 is odd.

  Write a function that given a data frame returns

Write a function that given a data frame returns the type of each column (numeric, factor, logical, etc.) and prints the type to the console

  How to ensure no hackers or intruders can enter lan

firewalls and intrusion detection systems should be employed to ensure no hackers or intruders can enter LAN

  Explain the term cacheable versus noncacheable data

Explain the terms Cacheable versus noncacheable data, Private caches versus shared caches and Cache flushing policies.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd