Security risk analysis

Assignment Help Basic Computer Science
Reference no: EM133054567

O'Keefe State University located in New Mexico has recently started using Canvas for online course delivery. Canvas hosts all the data in its own cloud storage. Students may log in to the systems form any personal device (laptops, phones, etc.). On-campus students can also use library computers. Note that the browsers may store student credentials (IDs and passwords) in a browser.

Write a security risk analysis to identify all possible security risks associated with the usage of Canvas in the library or on home computers.

Specifically address whether Canvas cloud architecture increases or decreases the cybersecurity risks associated with it, when compared to an old learning system that stored all student data on a servers located on-campus and managed by the university IT personnel.

Reference no: EM133054567

Questions Cloud

About current technological trends : The current trend summary is comprised of individual thoughts about current technological trends.
Individual thoughts about current technological trends : The current trend summary is comprised of individual thoughts about current technological trends.
Access controls procedure : Changing access controls can have some undesirable effects. Create a guide that security personnel will use that includes procedures for implementing an access
Designation in for-profit and not-for profit corporation : What are the members of a board's designation in a for-profit and not-for profit corporation?
Security risk analysis : Write a security risk analysis to identify all possible security risks associated with the usage of Canvas in the library or on home computers.
Skepticism from the general public : While there are many benefits to the use of cryptocurrency, there is also much skepticism from the general public.
Attack and defeat cryptosystems : Malicious individuals have discovered several methods to attack and defeat cryptosystems.
Societal responses to address the issues : There have been many books and opinion pieces written about the impact of AI on jobs and ideas for societal responses to address the issues.
Describe how cloud-based data storage works : Describe how cloud-based data storage works. Define and describe cloud-based collaboration.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  High-end disruptive digital transformations

Create a timeline of low-end and high-end disruptive digital transformations over the past 20 years.

  Crypto security architecture exercise

Describe in detail what new cryptographic systems you are going to propose, how they work, and how they will enhance security.

  Correlation between privacy and confidentiality

What is the correlation between privacy and confidentiality? What are ethics and why are they important to a company?

  Receive the measurement for the diam-eter of a circle

Design an algorithm that will prompt for and receive the measurement for the diam-eter of a circle, and calculate and display the area and circumference of that circle. Your program is to continue processing until a sentinel of 999 is entered.

  Determine its global maximum and global minimum

Identify the regions over which the following function is convex and where it is concave

  What is the pmf px (x)

If p = 0.2, what is the probability that the child will throw the Frisbee more than four times?

  Write paper on smart phones and tablets

Imagine you are a System Architect at Panther Industries. You job is to submit a report to your manager about common technologies and the use of these technologies in your corporate Information Technology (IT). Smart phones/ Tablets/ netbook archit..

  Discuss it based risks associated with global e-commerce

Discuss the IT based risks associated with global e-commerce. Discuss how IT can leverage innovative technologies such as social media,

  Assume that the economy begins at full employment

the unemployment rate, the interest rate, consumption, investment, and the price level. Assume that the economy begins at full employment.

  Technologies employed by wireless devices

What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies?

  Diverse skills and mindset of ethical hacker

Given the rich and diverse skills and mindset of an ethical hacker (technical, administrative, and physical measures),

  Impact of rapid environmental changes on organizations

What is the impact of rapid environmental changes on organizations? Quebecor Printing is a commercial printing company that is expanding,

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd