The future of the tootsie pop strategy

Assignment Help Management Information Sys
Reference no: EM131986402

The Future of the Tootsie Pop Strategy

The most common architecture for organizations when the Tootsie Pop strategy was developed and widely implemented was static data that largely remained behind the firewall. The line of demarcation was very clear.

The ability to protect the firewall by opening very narrow point-to-point connections and opening a small number of commonly used ports and services made the firewall a relatively powerful tool that unfortunately was soon perceived as the be-all and end-all of security.

Some network administrators who employed firewalls became a little too complacent. The idea that Port 80 would be used for the degree of malware and maliciousness that is now possible was not even on the horizon.

Today, we have ubiquitous access to data using bring your own device (BYOD) policies and Internet cafe users on the negative side and the widespread use of virtual hosts and mobile device management solutions on the controls side.

Use the study materials and engage in any additional research needed to fill in knowledge gaps. Discuss the following:

o Make a case for why the Tootsie Pop strategy is still important and useful.

o Make a case for why the Tootsie Pop strategy is outdated and no longer a viable way to think about network security.

o Suggest what the next strategy might be that would be a good replacement for the Tootsie Pop strategy.

Reference no: EM131986402

Questions Cloud

How many direct-mapped cache organizations are possible : How many direct-mapped cache organizations are possible given 32-bit byte addressing for programmers, word-addressed physical memory and 4-byte words.
Pronounce the terms learning : Can incorrectly doing so pose a danger? Why do you think it is important to correctly spell and pronounce the terms you are learning?
How do organizations that would like to leverage ipsec : In the early days of networking when protocols were being developed by academics and government agencies, there was little thought to security.
Change for better health and wellness : What could be some initial goals? How could a person identify areas that they may want to change for better health and wellness?
The future of the tootsie pop strategy : The most common architecture for organizations when the Tootsie Pop strategy was developed and widely implemented was static data.
Swot analysis vs focused competitor analysis : Discuss the differences between a traditional SWOT analysis and a focused competitor analysis.
Draw a graph with no parallel edges for each degree sequence : How many edges are in a 6-regular graph with 21 vertices? Draw a graph with no parallel edges for each degree sequence. b. (5, 4, 1, 1, 1).
Examine the issue of potentially outsourcing legal services : What are some of the variables associated with outsourcing legal services? Which major, or key, variable constitutes the driving force behind this practice
Physician for performing the unnecessary test : The patient sues the physician for performing the unnecessary test. What would be the best defense? Why?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Global supply chain managementcan someone help me with this

global supply chain managementcan someone help me with this assignment? i need information on all of the following

  What you have learned about using cloud-based office product

create a presentation to the department head or CEO to convince him or her that using a cloud-based office productivity suite would benefit the company.

  How it helps influence walmart and amazons strategies

Explain how IT helps influence Walmart and Amazon's organizational strategies, and Summarize your findings in a two- to three-page paper.

  Describe seth goldmans leadership performance

Describe Seth Goldman's leadership performance on concept of "Triple Bottom Line" using at least two examples from both resources to support your evaluation.

  Analyze according to the industry and management

Analyze situation: Necessary and relevant analysis. Analyze according to the industry, management, competition, and consumer.

  Discuss the use of current technology and systems

Discuss the use of current technology and systems to ensure the integrity of the medical record .

  Create a wbs for one of introducing self-checkout registers

Create a WBS for one of the Introducing self-checkout registers at your school's bookstore and Updating 50 laptops from Project 2003 to Project 2007.

  Discuss iterative design as it relates to databases overall

Imagine that you are a consultant to a large transaction-oriented Web-based company. Establish the key benefits of the IMDB to the company's CEO. Suggest the type of infrastructure changes that would be required.

  Analyze how computer systems facilitate communication

Assignment: Analyze how computer systems facilitate communication and collaboration in business. How would data, text, and Web mining have been possible without telecommunication and networks

  Provides a critical analysis of operational risk management

Prepare a 4 page (double spaced) point paper that provides a critical analysis of Operational Risk Management (ORM).

  The vulnerability of transmitted information

The personnel manager has read an article about the vulnerability of transmitted information/data over a company network operating system. She is now somewhat concerned over the safeguarding of organizational data.

  Identify which sdlc step is associated with project

Select a System/Software Development Life Cycle (SDLC) model and methodology then apply this model and methodology to a project .

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd