How well does the proposed solution mitigate the risks

Assignment Help Computer Engineering
Reference no: EM131986092

Assignment

Part 1: MidCorp is a mid-sized corporation that sells music and movie downloads over the Internet. They're in the same building as Acme and have the same electric power conditions. MidCorp's CFO that each hour of web server downtime costs the company $2,000 in profit from sales. Describe what MidCorp should do with respect to electric power protection. If your recommendation is different from Acme's, explain why. Explicitly state any assumptions you have made.

Part 2: Acme Corporation operates a small server room. They work 9:00 AM to 5:00 PM, five days a week, and can operate for several hours without IT services. However, part of their IT application includes a database system that is sensitive to interruption; it must be shut down properly to avoid corruption. They're based in Tampa; frequent thunderstorms cause brief power "blips." Complete power failures are rare, but do happen two or three times a year and last for several hours. Describe what Acme should do with respect to electric power protection.

Part 3: Using the cost-benefit analysis method described in the lecture, estimate how much money MidCorp should spend on power protection. You will have to make several assumptions to do this. Your answer should contain an "assumptions" section in which you list them. Justify each assumption in one or two sentences.

Part 4: Bruce Schneier says one should consider the following things when considering implementing a security system:

What assets are you trying to protect?

What are the risks to those assets?

How well does the proposed solution mitigate those risks?

What other risks might the proposed solution cause?

What are the costs and trade-offs of the proposed solution?

Assume your cousin lives with a spouse, a pre-teen daughter and a teenage son. Your cousin has asked for advice on whether to install a monitored burglar alarm in their home. What advice do you give? You do not have to find out the cost of burglar alarm systems for this assignment, but address all the rest of Schneier's considerations.

Part 5: The president of Acme Corporation has just learned that the company can be held responsible for what employees write in electronic mail. He is very worried! Acme has a long-standing, but unwritten, practice that brief personal phone calls are permitted at work, so long as they do not interfere with performance. The company president would like to treat email the same way.

In a couple of paragraphs, explain how personal phone calls and personal email messages are alike.

In a couple of more paragraphs, explain how they are different.

Write a draft policy for personal use of Acme's email system. (You don't need the standards and practices for this one, just the policy. Remember, policies state what must happen, may happen, or must not happen. This can be as short as a couple of paragraphs, but a sentence or too will not do.)

Reference no: EM131986092

Questions Cloud

Calculate descriptive statistics : Calculate descriptive statistics on at least 5 data fields or records - analyse and calculate confidence intervals to compare galvanic skin response
Physician performs a digital rectal exam and reports : His physician performs a digital rectal exam and reports that it appears that John's prostate is enlarged.
Distinguish between a living will and durable power : Distinguish between a living will and durable power of attorney.
Hospital trauma center where you work : A young mother who was severely injured in a car accident is brought into the hospital trauma center where you work.
How well does the proposed solution mitigate the risks : How well does the proposed solution mitigate those risks? What other risks might the proposed solution cause? What are the costs and trade-offs of the solution?
Describe the right-to-die movement in the united states : Name TWO significant cases or events that occured in the United States that furthered the right-to-die cause.
Perform k-means clustering on the dataset : Assignment Task - Clustering, Perform k-means clustering on the dataset. Are there any anomalies (unusual data/missing values) in the given dataset
What is the yield to call if they are called in five years : Kempton Enterprises has bonds outstanding with a $1,000 face value and 10 years left until maturity. What is the yield to call if they are called in 5 years?
Why stem cells are valued for certain types of scientific : Why stem cells are valued for certain types of scientific research. List one reason for and one reason against xenotransplantation.

Reviews

Write a Review

Computer Engineering Questions & Answers

  How many bits will you need to represent each character

You decide the best thing is to use BCZ, Binary-Coded Zebronian. How many bits will you need to represent each character if you want to use the minimum number of bits?

  Questiongiven a series of numbers that represent adding

questiongiven a series of numbers that represent adding fuel 2 and subtracting fuel 1 determine highest distance that

  What smallest number of stack frames required by superpowers

ACTIVITY: Questions for superpowers. What's the best case? I.e., for a given n, what's the smallest number of stack frames required by superpowers

  Write application that allows you to enter amount of money

Write a windows application that allows you to enter the amount of money in your savings account, the interest rate, and a number of years.

  Create a report subsystem for daily and weekly sales

Business requires two new screen reports to be generated from the ticketing system. Create a report subsystem for daily and weekly sales.

  How would condition codes improve the situation

What potential problems might there be with implementing the modified instruction? How would condition codes improve the situation?

  Determine which company the customer could buy each item

Design a polynomial time algorithm to determine which company the customer could buy each item from to minimize her total cost.

  Count the number of coins in the bag and record the value

Count the number of coins in the bag and record the value as P in Table II. (Note: an example of how Table II is supposed to look like has been provided to you at the bottom of the document.

  Pseudorandom numbers

In any use of the pseudorandom numbers, whether for the encryption, simulation or the statistical design.

  Write a class called bar chart

Write a class called BarChart that compares the data using a bar graph representation. Allow the parameters to the constructor to specify the bar's width.

  Transmitting the rtp stream

Consider that a sender transmits a silence suppressed the RTP stream of G.711 audio to the receiver (G.711 refers to the name of standard for 64Kbps PCM we discussed in class).

  Define reasons for these recommendations

You have been asked by Champions, a local charity retail organization, to install the network in its downtown office. It currently just received the donation of four PCs running Windows XP Home Edition.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd