Would you continue protecting data at cost

Assignment Help Basic Computer Science
Reference no: EM133049876

Assume you are the president of a small data brokerage company, which gathers information from consumers on the web and sells it to other companies for marketing purposes. The integrity of data is critical to your company's success. The company makes an average profit of $100,000 per year. It costs $50,000 per year to secure company data and systems.

1. Would you continue protecting the data at this cost? Why or why not?

2. You want to expand the company but doing so will cost $75,000. Would you reduce data security, and therefore the cost, in order to expand? Why or why not?

Reference no: EM133049876

Questions Cloud

Virtualization different from cloud computing : How is Cloud Computing different from a simple Client-Server architecture? How is Virtualization different from Cloud Computing? Which is the best to use and wh
Formulating your brief : According to Kirk (2016), The essence of "Formulating Your Brief" is to "identify the context in which your work will be undertaken and then define its aims:
Implementing new technology system : You are a member of an Information Technology team in a medium-sized organization that is implementing a new technology system
On-premise environment and cloud environment : Compare and contrast the difference of network security within an on-premise environment and a cloud environment.
Would you continue protecting data at cost : Would you continue protecting the data at this cost? Why or why not? You want to expand the company but doing so will cost $75,000. Would you reduce data securi
Business process as service and security : How business processes as services can improve efficiency. This discussion is about business process as a service and security.
Intentional and unintentional threats : Analyze and write the difference between intentional and unintentional threats.
Customer relationship management solution : Your organization has identified several projects for possible development: A customer relationship management solution;
Application security concerns policy : Your team will add to assignment and outline application security policies for the health insurance company. Defines application security policies.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Information systems research in the digital world

This journal article was focused on the Complexity of Information Systems Research in the Digital World.

  At most how high can the probability of a major security

At most how high can the probability of a major security breach be with the IDS in place for a risk-neutral rational decision maker to purchase the IDS?

  Six sigma principles and six sigma organizations

Review the information in this chapter about Six Sigma principles and Six Sigma organizations.

  Facilities maintaining a hybrid system

What are the drawbacks to facilities maintaining a hybrid system while trying to properly file documents in both digital and paper-based systems?

  What is the implication of global factory

What is the implication of global factory? How can a business benefit from it?

  Compare and contrast these three protocols

Compare and contrast these three protocols and explain which industries can benefit the most from each of these protocols.

  Identify five different it systems

Identify five different IT systems that have affected business in the past few years

  Discuss security and office of personnel management

Discuss security and the Office of Personnel Management's compromise is clearly illustrated in a case study that is offered up in your readings

  Write them and measure their speeds

Enumerate possibilities, assess their potential difficulty and benefits, then write them and measure their speeds.

  Why is it so difficult to prosecute cybercriminals

or every one successful prosecuted in a court of law, 100 get off without punishment or with a warning. Why is it so difficult to prosecute cybercriminals?

  How an os knows the type of file system on a flash drive

List steps involved in the OS since plug in of the flash drive until the display of the file system on screen?

  Physical productivity of construction workers

The function P = f(x) is called the physical productivity function. Suppose that the physical productivity of x construction workers is given by

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd