Cyberattacks Against Major Businesses, Software as a Service (SaaS), own T1 Internet Connections

October 31, 2022 8:46 am Victoria Business Writing

Cyberattacks against major businesses, Software as a Service (SaaS), own T1 internet connections

Question 1

As companies continue to grow their footprints and customer reach by expanding their networks into the cloud, it has become imperative for companies to show the ability to provide consistent and reliable connectivity across the WAN and/or internet to drive customer growth. As we have witnessed in recent years, many companies like Amazon, Microsoft, and Salesforce.com have grown exponentially with their ability to drive consistent and reliable access for customers to grow the bottom line.

For this discussion, pick one of the following topics associated with the cloud and research it accordingly. Your main post should describe how you would evaluate the cloud service as a business tool and customer benefit.

Focus on the following capabilities needed for a company that is just deciding to get into the cloud services world.
• Software as a Service (SaaS)
• Infrastructure as a Service (IaaS)
• Platform as a Service (PaaS)

Question 2

Cyberattacks against major businesses, colleges, and the federal government have dramatically increased in recent years. In most cases, the cyberattack ended in massive breaches and leaks of personal information. Here are a few examples for you to review:

Here’s What Happened to Your Target Data That Was Hacked

https://www.businessinsider.com/heres-what-happened-to-your-target-data-that-was-hacked-2014-10

Home Depot Hackers Exposed 53Milion Email Addresses

https://www.businessinsider.com/home-depot-hackers-exposed-53-million-email-addresses-2014-11

U on Nebraska Data Breach Affects 650.000 Students

https://www.nbcnews.com/id/wbna47678637

Cybersecurity Resource Center

https://www.opm.gov/cybersecurity/

In each of these cases, the organization noted possible causes for its security breach. For your main post, select one of these examples, or find an example of your own noting the same type of security breach, and identify the most probable cause in security that allowed the breach. If you choose a different example, be sure you provide a link to the story at the end of your initial post.

Question 3

For a growing business, one location is typically not enough. With enough personnel and capital, many businesses prefer to set up multiple offices to attract different regions of customers.

With separate offices, how can your business install a network so all the locations can work, communicate, and share information easily, instantaneously, and effectively? For your main post, assume the following:

A business has two locations in different states. Both locations have their own T1 internet connections. How do you join these two networks together so every computer can see every other computer?

Your solution should provide a suggested overview to achieve the end goal of integrating the networks. Be sure you address important issues like maintaining security, reliability, end-user operations, and network speed.


Like us! Follow us! Follow us! Follow us! (+1)9177276363
We make use of cookies to enhance browsing experience and provide additional important functionality. Privacy policy
Whatsapp Button