Case Study. Case Study

Do a case analysis of any one of the cases presented in Chapter 6 in the textbook (Chapple et. al.),( pages attached)Make certain that your report covers all the major elements of the case. You should indicate clearly which case you have analyzed, the Private Sector, the Public Sector or the Critical Infrastructure.

Make sure to follow APA style. Please make sure your submission is 2 – 3 pages in length and meet the minimum APA formatting guidelines:
•    12-pt, Times New Roman font
•    Double-spaced
•    1” margins on all sides
•    Please provide a title page including your Name, Course Number, Date of Submission, and Assignment name.
•    Paraphrasing of content – Demonstrate that you understand the case by summarizing the case in your own words. Direct quotes should be used minimally.
•    Reference Section (A separate page is recommended.) Please cite the source using APA formatting guidelines. If you need guidance or a refresher on this, please visit: https://owl.english.purdue.edu/owl/resource/560/10/ (link is external) Be sure to include at least three reference sources.
•    In-text citations – If you need additional guidance, please visit: https://owl.english.purdue.edu/owl/resource/560/02/ (link is external)

Bellow attachment contains the information form the textbook

Pages below:

Private Sector Case Study

Cloud Collaboration is a large new media company that has recently

launched a Software as a Service (SaaS) office suite. This suite includes a

word processor, as well as presentation, e-mail, calendar, and spreadsheet

applications. Also included are collaboration and Web authoring tools.

SaaS is a model of software distribution that hosts software in a cloud-based

environment on a subscription basis. Instead of simply selling an application,

a SaaS vendor offers access to the applications for a small subscription fee.

The application and data are stored on the vendor’s servers and the customer

accesses them remotely. This benefits the customer by lowering operating

costs, and adding security and portability. SaaS sometimes costs less, both in

upfront and ongoing costs, than buying software in a traditional manner. This

is especially true for a small-business environment that may not have the

capital necessary for the hardware associated with large centralized

applications.

SaaS also adds a new layer of document security; even if a workstation is

physically stolen, the information is safe because all of the documents are

stored on the vendor’s servers instead of the customer’s workstation. Storing

the information remotely also gives the customer an amazing amount of

portability. Any system with appropriate access software can access the data.

In Cloud Collaboration’s case, the office suite is Web-based, so any system

with a Web browser can be used to access the applications

Public Sector Case Study

The U.S. military needed a way to communicate information quickly and

securely in the rapidly changing environment of a battlefield. Wired

communications, while secure and robust, had significant drawbacks.

Communication lines could easily be severed, and military personnel were

limited to communicating only at fixed locations. Radio and wireless

communications removed the threat of cut lines and extended the range of

communications, allowing military personnel to communicate with mobile

units, but only to a fixed range. Stationary installations were still needed as

base stations, and throughput degraded the farther the units were from the

base station. That led the military to turn to a new type of wireless

networking called wireless mesh networking.

Wireless mesh networks are based on a distributed network mesh topology.

Each node in the network connects to multiple nodes. Each node also acts as

a router for the nodes it connects to, allowing traffic to hop along multiple

paths to a destination. This allows for a very robust and flexible network. The

loss of one node will not hurt the network, and nodes can be added at will.

Range of the total network is also massive because nodes don’t need to be

close to a central point. They need just one other node to function. An

example of a mesh network can be seen in Figure 6-2.

FIGURE 6

Critical Infrastructure Case Study

Power plants are an important part of critical infrastructure and local, state,

and national economies. Therefore, power plants need deep and multilayered

access controls due to concerns over physical security. There are a number of

sensitive areas that must be secured, and various employees need different

levels of access to these locations. At a plant in the upper Midwest, this

access is handled with identity badges that include images of the user and an

RFID with the user’s access rights.

The RFID handles access through multiple levels. There is a security

checkpoint at the entrance to the parking lot and at the entrance to the

building. Both points require a badge to enter. From there, the badge allows

personnel to enter the facilities they are authorized to enter. It also acts as

“something you have” for multipoint authentication onto secure systems.

Case Study