Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Your group has just been hired as a security advisor for a new startup company named Financial Info Quest (FIQ) that aims at providing fast, up-to-date financial data and news to investment companies in Canada and around the world. FIQ will compete in the same market than Bloomberg, but intends offer services at much lower prices and specialize in the gathering of news information related to Canadian markets.

FIQ just developed a Web platform to which clients can hook up in order to receive the offered services. The Web site has a public section, as well as a private (for members only) section, which is protected by a password. Each client will have a distinct password. The Web platform was recently developed by three graduate students who were hired as summer interns. The platform was written in Java and installed on Windows servers, with the back-end information being stored on Oracle databases. These servers have been placed in a private room, at the Montreal downtown office space of FIQ. They have rented a floor in a newly renovated building situated on Saint-Lawrence Boulevard, which is nicely located near the corner of Mount Royal Avenue where a high vacancy rate has led to low rental prices.

FIQ is about to sign a deal with an offshore company that will offer 24/7 monitoring of news events on the Internet. The owners of FIQ are really excited about this new deal since they are going to receive a great service at a very low and affordable price.

Finally, FIQ is about to hire 5 financial analysts that will coordinate the collection and sharing of information, and add valuable insight regarding Canadian financial information that will be provided to FIQ's clients. The hiring process is almost over and the new employees will begin working at FIQ in the next month. They will each be given a computer as well as a laptop and a smartphone. They are expected to be able to connect to the company's network and access work information systems at any given time of the day, any day of the week. For remote access, one of the summer interns has setup RDP (remote desktop protocol) so that every employee can remotely access their desktop and access any resource on FIQ's network, just as if the employee was physically present at the office.

One of the owners, Gino, is in charge of business development and sales. FIQ is fortunate to have more than 100 small investment boutiques in Montreal and Toronto who are already interested in FIQs services. Services will be offered as a yearly membership, with a monthly fee that will automatically be charged on client's credit card accounts. In order to get things up and running quickly, Gino is thinking of hiring the students once again to quickly develop software that will allow FIQ to manage the payments automatically and directly without needing to pay a fee to a third party payment processor.

The owners of FIQ request that you perform an information security threat and risk assessment on their business processes. They want you to present the top 5 risks that you will have identified, and recommend various risk mitigating controls that will enable FIQ to adequately manage their risks. You will need to present the risks in a convincing way since the owners of FIQ think they already have everything covered very well.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91701306

Have any Question?


Related Questions in Computer Engineering

What are the uses and value of statistical significance

What are the uses and value of statistical significance testing and the p-value as demonstrated in the various analytical techniques (t-tests, ANOVA, chi-square, etc.). What's the fundamental reason we apply these techni ...

Strong passwords are at least 8 characters in length

Strong passwords are at least 8 characters in length, contain both upper- and lower-case letters, as well as some digits and special characters. Use the requirements (specified below) for a password to define in BNF a gr ...

How does having an understanding of spreadsheet software

How does having an understanding of spreadsheet software help you succeed in your personal or professional life?

A simple medium access control protocol would be to use a

A simple medium access control protocol would be to use a fixed assignment time division multiplexing (TDM) scheme. Each station is assigned one time slot per cycle for transmission. For the bus, the length of each slot ...

Identify and evaluate at least three considerations that

Identify and evaluate at least three considerations that one must plan for when designing a database. Suggest at least two types of databases that would be useful for small businesses, two types for regional level organi ...

String cyclic leftshift string s int k that creates and

String cyclic LeftShift (String s, int k) that creates and returns a string in which character of s has been moved left k steps, so that the characters that would "fall off' the left end are appended to the right. For ex ...

What is the various security architectures which provides

What is the various security architectures. Which provides the best balance between simplicity and security? Justify your answer.

1 what would be the purpose for a user to protect a

1. What would be the purpose for a user to protect a file from "read" or "write" access by other users? 2. Is there a reason why it would be safer for administrators to use two different accounts when working with a comp ...

In a competitive market the market demand is qd 60- 6p and

In a competitive market, the market demand is Qd= 60- 6P and the market supply is the Qs= 4P the full economic price under a price ceiling of $3 is:?

Discuss the importance of using an access control model in

Discuss the importance of using an access control model in determining how employees in an organization should gain access to resources.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As