Do a case analysis of any one of the cases presented in Chapter 6 in the textbook (Chapple et. al.), (pages attached). Make certain that your report covers all the major elements of the case. You should indicate clearly which case you have analysed, the Private Sector, the Public Sector or the Critical Infrastructure.
Make sure to follow APA style. Please make sure your submission is 2 – 3 pages in length and meet the minimum APA formatting guidelines:
Below attachment contains the information form the textbook
Pages below:
Private Sector Case Study
Cloud Collaboration is a large new media company that has recently launched a Software as a Service (SaaS) office suite. This suite includes a word processor, as well as presentation, e-mail, calendar, and spreadsheet applications. Also included are collaboration and Web authoring tools.
SaaS is a model of software distribution that hosts software in a cloud-based environment on a subscription basis. Instead of simply selling an application, a SaaS vendor offers access to the applications for a small subscription fee.
The application and data are stored on the vendor’s servers and the customer accesses them remotely. This benefits the customer by lowering operating costs, and adding security and portability. SaaS sometimes costs less, both in upfront and ongoing costs, than buying software in a traditional manner.
This is especially true for a small-business environment that may not have the capital necessary for the hardware associated with large centralised applications.
SaaS also adds a new layer of document security; even if a workstation is physically stolen, the information is safe because all of the documents are stored on the vendor’s servers instead of the customer’s workstation.
Storing the information remotely also gives the customer an amazing amount of portability. Any system with appropriate access software can access the data.
In Cloud Collaboration’s case, the office suite is Web-based, so any system with a Web browser can be used to access the applications
Public Sector Case Study
The U.S. military needed a way to communicate information quickly and securely in the rapidly changing environment of a battlefield. Wired communications, while secure and robust, had significant drawbacks.
Communication lines could easily be severed, and military personnel were limited to communicating only at fixed locations. Radio and wireless communications removed the threat of cut lines and extended the range of communications, allowing military personnel to communicate with mobile units, but only to a fixed range.
Stationary installations were still needed as base stations, and throughput degraded the farther the units were from the base station. That led the military to turn to a new type of wireless networking called wireless mesh networking.
Wireless mesh networks are based on a distributed network mesh topology. Each node in the network connects to multiple nodes. Each node also acts as a router for the nodes it connects to, allowing traffic to hop along multiple paths to a destination. This allows for a very robust and flexible network.
The loss of one node will not hurt the network, and nodes can be added at will. Range of the total network is also massive because nodes don’t need to be close to a central point. They need just one other node to function. An example of a mesh network can be seen in Figure 6-2.
Figure 6
Critical Infrastructure Case Study
Power plants are an important part of critical infrastructure and local, state, and national economies. Therefore, power plants need deep and multilayered access controls due to concerns over physical security. There are a number of sensitive areas that must be secured, and various employees need different levels of access to these locations.
At a plant in the upper Midwest, this access is handled with identity badges that include images of the user and an RFID with the user’s access rights.
The RFID handles access through multiple levels. There is a security checkpoint at the entrance to the parking lot and at the entrance to the building. Both points require a badge to enter.
From there, the badge allows personnel to enter the facilities they are authorised to enter. It also acts as “something you have” for multi-point authentication onto secure systems.