Compare the following three types of threats Intentional th…
Compare the following three types of threats Intentional threats Unintentional threats, and Natural threats For each type, provide: a) One specific example b) One possible impact on the organization c) One control or monitoring method that could reduce the risk
Read DetailsA company has an internal file server with the IP address 10…
A company has an internal file server with the IP address 10.0.0.20 and a public web server with the IP address 198.51.100.15. Discuss one security advantage of the file server’s IP address type and one security risk of the web server’s IP address type.
Read DetailsA hospital is planning how to deploy its digital services an…
A hospital is planning how to deploy its digital services and must balance scalability, cost, and protection of sensitive patient data. They are considering three options: Option A: Keep all patient records, billing systems, and internal medical applications on infrastructure owned and managed by the hospital in its own secure data center. Option B: Move all applications, including patient records, appointment booking, and the hospital website, to a large cloud provider’s infrastructure that is shared with other customers. Option C: Keep patient records and billing systems on hospital-owned infrastructure, but host the public website and appointment-booking application on a large cloud provider. The two environments are securely connected. a) For each option (A, B, C), identify whether it corresponds to a private cloud, public cloud, or hybrid cloud deployment model, and justify your choice in one or two sentences. b) Which option would likely be the best choice for this hospital? Briefly justify your answer from a systems administration point of view.
Read Details