Question: i need the answers for the case study question from 1 to 5 please 1 of 2) Chapter 121 INTERACTIVE SESSION: TECHNOLOGY HOW SECURE

i need the answers for the " case study question" from 1 to 5 please
i need the answers for the " case study question" from 1
to 5 please 1 of 2) Chapter 121 INTERACTIVE SESSION: TECHNOLOGY HOW

1 of 2) Chapter 121 INTERACTIVE SESSION: TECHNOLOGY HOW SECURE IS THE CLOUD? hee artilate hurles had the where pich Miami Dasal incroci pa alty torturi Chali are et demand serves the Een if you do we dood thathil Themes.com I l- The tra amai Sockare, care se le am femme wel . almanam Maran lity ram rains and para mtasir hai y The details Main SSL ( Med that were www.dows ly at all , a put heal petra ts , and hy - 1 Part has to eded to be with commen cine netral dhe dhe there htted to ta ettan Maa varles te Te teady there CASE STUDY QUESTIONS MIS IN ACTION 1 , ha lan 1. 2 kan dere what IS 102_Assignment 3.pdf 2 of 2 cloud provides cryption such as Secure Sher to secure the data they handle while ng transmitted. But if the data are ces that also one other companies ortant to ensure these stored data are Indian Harvest Specialtifoods a Blemis Minnesotaand company that distributes rains and legs to stan wode relies on cloud software provider NetSuite to ensure that its data sent to the cloud are fully protected. Mike Mullin, Indian Harvest's IT director feels that using SSL (Secure Sockets Layer to encrypt the data is him some level of confidence that the data are cure. He also points out that his company and other users of doud services need to pay attention to their own cty praction, especially acces controls "Your side of the infrastructure is just as vulnerable if not more vulnerable than the provides she One way to deal with these problem is to use a dood vender that is a public company, which is required by lane to disclose how it manages informa tion Salesforce.com meets this regiment with PRISER cations that employer encryption Companies required to meet these trains involving protected data either in the United or the EU won't be able to publicades. Some of these relation call for proof that stems are securely munand, which may require confirmation from an independent and a providers are to allow another.com and spect the data ce Microfound a way to deal with this problem tut may be helt The company reduced 26 diferent types of audio a list of 200 naty control for meeting compli ance dars that we applin tieduste enment and services Microsoft does not every morando access to idace but is compliance framewock allows medios to under from a menu of test and more the Computer systems to her manning 247, but cloud providers have always been able to provide theel of Million como Salesforce.com uttered a 30-minute outage near January 2009 and othen veral yea care. The January 2009 outape locked more than 100.000 wees out of crucial application and data 322 Part Two Information Technology Instructure needed to business with customers. Mom than 300.000 customers using intuits online network of small business aplications were able to access the rice for two days in June 2010 following power out Agreements for such as Amaron EC2 and Mimore state that the companies are not oing to be held liable for fata loss or fines or other pil penalties when companies their services. Toth vendos obferuidance on how to the lead platform surely, and they may still be in to protect dat better than sor.com homegrown facilities Salesimo.com had been building up anul rodesigning its infrastructure to ensure better service. The company invested 550 million in Mimo technology a mining wystem that tesa duplicate date in a separate location and synchronizes the data instantaneously tree use a disabled, the other takes on Sale.com added two data centers on the sand West com In addition to its Silicon Valley facility. The company dried processing for its larger customer among these contento balance its datablad Shed AC 200 MG Computing IT SIT anch the may we ing LTC M. CASE STUDY QUESTIONS 1. What security and commit problems are described in this cat 2. What people, nation and technology contribute to these problem? 3. How cam is chod computing Explain your answer 4. If you were in charge of your company's inform tion systems department, what we would you want to clarity with prospective vendont 5. Would you en your corporate Systems food computing provider? Why or what? MIS IN ACTION Get www.salesforce.com, then answer the following question 1. Click on Security and describe Salesforce.com security vision How helpful are the 2. click on Best Practices and describe what cribinet compris can do to the security How he plane these guidelines 3.f you ran abess, would you feel confident abouting Salesforce.com's on demande Why or why not

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Accounting Questions!