Which of these environments is more secure and why

Assignment Help Basic Computer Science
Reference no: EM132637251

The salespeople you deal with from each vendor believe the current mainframe environment costs about $500K a year to maintain from a security standpoint, while a client/server environment would cost about $325K a year. But cost is not the only consideration. No PII or SPII data is contained in this manufacturing platform. It is strictly a final product for sale application.

Outline and review a typical mainframe enterprise security footprint. Do the same for a possible client/server environment. This could include the use of the cloud for distributed computing, but that would also include unique security concerns.

Discuss the following:

Based on your outline, which of these environments is more secure and why?

Does your outline show commonalities that could permit both the mainframe and the client/server environment to coexist from an enterprise security perspective? If so, what are they?

Reference no: EM132637251

Questions Cloud

Find which product or services are likely to use job costing : Find which products or services are likely to use job costing except? the costing by a solicitor of a dry cleaner's bankruptcy case
Find underapplied and overapplied overhead arise because : Find Underapplied and overapplied overhead arise because? the overhead rate and the amount of the allocation base used by the product are both estimates
Data elements fit into overall document life cycle : The business requirements document for Hollywood Organic Co-op is to examine how the data elements fit into the overall document life cycle.
Find under fifo equivalent units for beginning wip are : If direct materials are added, the process and beginning inventory is 5,000 units that are 25% complete, under FIFO equivalent units (EU) for beginning WIP are
Which of these environments is more secure and why : Based on your outline, which of these environments is more secure and why?
Find most appropriate cost driver for the payroll processing : The managers of Financial Burden Ltd are analysing, What the most appropriate cost driver for the payroll processing cost pool is the?
Understanding workplace skills : Understanding Workplace Skills, explain what work skills are essential for your professional success?
Explain your ethical responsibilities in adherence : Explain your ethical responsibilities in adherence with the professional ethical standards applicable to the clinical situation. Be sure to justify your.
Memory forensics is important form of cyber investigation : Memory forensics is important form of cyber investigation that allows digital investigator to identify unauthorized and unusual activity on computer or server

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Chooses to commit more resources to increase profits

2. If AppleBerry chooses to commit more resources to increase profits, should it purchase more fabrication time, assembly time, machining time, or raw materials?

  Suggest two challenges you foresee in using ms project

Suggest two challenges you foresee in using MS Project in course. Give your opinion on how easy or difficult MS Project seems to be from a user experience.

  Complete java program named textfileshoppinglist

1. Build a complete Java program named TextFileShoppingLIst. From its main method, call a method named writeShoppingList. This method takes an ArrayList of five strings provided by the user at the command line. Use a loop for repeated prompting..

  Group of nine equally qualified people

Suppose that an employer plans to hire four people from a group of nine equally qualified people, of whom three are minority candidates.

  How can we specify a class whose objects are students

1. (i) How can we specify a class whose objects are Students? (ii) How can we draw a uml diagram of the class above

  Online search for a good or service offered

Online search for a good or service offered in another country

  Can this issue be settled by reference to a dictionary

He argues that carpenters, barbers, porters, and other groups who organize their work around a shared code of ethics should be recognized as professionals. Do you agree or disagree, and why? Can this issue be settled by reference to a dictionary?

  Problem for csm tech publishing

You've been called in to solve a problem for CSM Tech Publishing, which is running Windows Server 2016 servers in a domain environment.

  Actual reality is when you look around

To me it seems like this is a matter of what the numbers say verses what the actual reality is when you look around.

  Evaluate our models before model deployment

Then, using the contingency table, find the overall anticipated cost.

  How selinux uses domain and type enforcement to control

Explain why it is difficult to retrofit security in ordinary/commercial operating systems. Explain how SELinux uses Domain and type enforcement

  Literature review of technology adoption models

THE LITERATURE REVIEW OF TECHNOLOGY ADOPTION MODELS AND THEORIES FOR THE NOVELTY TECHNOLOGY before completing the assignment.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd