How well does the proposed solution mitigate the risks

Assignment Help Computer Engineering
Reference no: EM131986092

Assignment

Part 1: MidCorp is a mid-sized corporation that sells music and movie downloads over the Internet. They're in the same building as Acme and have the same electric power conditions. MidCorp's CFO that each hour of web server downtime costs the company $2,000 in profit from sales. Describe what MidCorp should do with respect to electric power protection. If your recommendation is different from Acme's, explain why. Explicitly state any assumptions you have made.

Part 2: Acme Corporation operates a small server room. They work 9:00 AM to 5:00 PM, five days a week, and can operate for several hours without IT services. However, part of their IT application includes a database system that is sensitive to interruption; it must be shut down properly to avoid corruption. They're based in Tampa; frequent thunderstorms cause brief power "blips." Complete power failures are rare, but do happen two or three times a year and last for several hours. Describe what Acme should do with respect to electric power protection.

Part 3: Using the cost-benefit analysis method described in the lecture, estimate how much money MidCorp should spend on power protection. You will have to make several assumptions to do this. Your answer should contain an "assumptions" section in which you list them. Justify each assumption in one or two sentences.

Part 4: Bruce Schneier says one should consider the following things when considering implementing a security system:

What assets are you trying to protect?

What are the risks to those assets?

How well does the proposed solution mitigate those risks?

What other risks might the proposed solution cause?

What are the costs and trade-offs of the proposed solution?

Assume your cousin lives with a spouse, a pre-teen daughter and a teenage son. Your cousin has asked for advice on whether to install a monitored burglar alarm in their home. What advice do you give? You do not have to find out the cost of burglar alarm systems for this assignment, but address all the rest of Schneier's considerations.

Part 5: The president of Acme Corporation has just learned that the company can be held responsible for what employees write in electronic mail. He is very worried! Acme has a long-standing, but unwritten, practice that brief personal phone calls are permitted at work, so long as they do not interfere with performance. The company president would like to treat email the same way.

In a couple of paragraphs, explain how personal phone calls and personal email messages are alike.

In a couple of more paragraphs, explain how they are different.

Write a draft policy for personal use of Acme's email system. (You don't need the standards and practices for this one, just the policy. Remember, policies state what must happen, may happen, or must not happen. This can be as short as a couple of paragraphs, but a sentence or too will not do.)

Reference no: EM131986092

Questions Cloud

Calculate descriptive statistics : Calculate descriptive statistics on at least 5 data fields or records - analyse and calculate confidence intervals to compare galvanic skin response
Physician performs a digital rectal exam and reports : His physician performs a digital rectal exam and reports that it appears that John's prostate is enlarged.
Distinguish between a living will and durable power : Distinguish between a living will and durable power of attorney.
Hospital trauma center where you work : A young mother who was severely injured in a car accident is brought into the hospital trauma center where you work.
How well does the proposed solution mitigate the risks : How well does the proposed solution mitigate those risks? What other risks might the proposed solution cause? What are the costs and trade-offs of the solution?
Describe the right-to-die movement in the united states : Name TWO significant cases or events that occured in the United States that furthered the right-to-die cause.
Perform k-means clustering on the dataset : Assignment Task - Clustering, Perform k-means clustering on the dataset. Are there any anomalies (unusual data/missing values) in the given dataset
What is the yield to call if they are called in five years : Kempton Enterprises has bonds outstanding with a $1,000 face value and 10 years left until maturity. What is the yield to call if they are called in 5 years?
Why stem cells are valued for certain types of scientific : Why stem cells are valued for certain types of scientific research. List one reason for and one reason against xenotransplantation.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd