Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Case

FXP Task 1: TechFite Case Stud

Rating
-
Sold
-
Pages
8
Grade
A
Uploaded on
22-02-2022
Written in
2021/2022

A. Summarize an organizational need in the case study, including the scope of the need. Given that there is such a high vulnerability in regards to Cyber Security, the organization through its Chief Information Officer has concerned about the adequacy of its present cybersecurity framework which is comprised of the two-firewall framework. Due to the stake, it has in The National Aeronautics and Space Administration (NASA) and other stakeholders, who are desperate for a joint venture. Techfite is worried about the potential of the firewall framework to proficiently deal with the security of the extremely elevated system traffic due to the federal government acquiring access to Techfite. The cybersecurity framework that is needed must also be self-regulating and readily available to review logs and also store logs. Regardless of the urgent need to update the cybersecurity framework, Techfite is confronted with a few restraints and limitations, and restrictions the essential being the fiscal restrictions. On top of that, the government also has some restrictions to adhere to, the primary being that the new system shall be in compliance with FISMA, using the NIST for security framework. Unfortunately, there is also space limitations, as well as a requirement for the system to support high data traffic from international partners as a result of expanded overseas operations. The system should also have the ability to send warnings and notifications of possible attackers on the network and host systems. In an effort to deflect a criminal’s attention, the system should also deploy honeypots as a decoy to attract hackers away from the real network

Show more Read less
Institution
Course

Content preview

FXP Task 1: TECHFITE CASE STUDY 1




m
er as
co
eH w
o.
rs e
ou urc
FXP Task 1: TechFite Case Study

Christopher L Oden
o
aC s


C850 – Emerging Technologies
vi y re



Western Governors University
ed d
ar stu
is
Th
sh




This study source was downloaded by 100000823909754 from CourseHero.com on 04-18-2021 18:37:51 GMT -05:00


https://www.coursehero.com/file/36336705/techfite-case-studydoc/

, FXP Task 1: TECHFITE CASE STUDY 2


A. Summarize an organizational need in the case study, including the scope of the need.

Given that there is such a high vulnerability in regards to Cyber Security, the organization

through its Chief Information Officer has concerned the adequacy of its present cybersecurity

framework which is comprised of the two-firewall framework. Due to the stake, it has in The

National Aeronautics and Space Administration (NASA) and other stakeholders, who are

desperate for a joint venture. Techfite is worried about the potential of the firewall framework to

proficiently deal with the security of the extremely elevated system traffic due to the federal

government acquiring access to Techfite. The cybersecurity framework that is needed must also




m
er as
be self-regulating and readily available to review logs and also store logs. Regardless of the




co
eH w
urgent need to update the cybersecurity framework, Techfite is confronted with a few restraints




o.
rs e
and limitations, and restrictions the essential being the fiscal restrictions. On top of that, the
ou urc
government also has some restrictions to adhere to, the primary being that the new system shall
o

be in compliance with FISMA, using the NIST for security framework. Unfortunately, there is
aC s
vi y re


also space limitations, as well as a requirement for the system to support high data traffic from

international partners as a result of expanded overseas operations. The system should also have
ed d




the ability to send warnings and notifications of possible attackers on the network and host
ar stu




systems. In an effort to deflect a criminal’s attention, the system should also deploy honeypots as

a decoy to attract hackers away from the real network.
is
Th




B. Propose an emerging technology solution to address the organizational need from the

case study.
sh




Due to the needs of Techfite, it is recommended that the company utilize Cloud Workload

Security (CWS). As noted above there is a requirement to adequately handle large volumes of

traffic of data and guarantee the highest level security of network systems and hosts. CWS


This study source was downloaded by 100000823909754 from CourseHero.com on 04-18-2021 18:37:51 GMT -05:00


https://www.coursehero.com/file/36336705/techfite-case-studydoc/

Written for

Course

Document information

Uploaded on
February 22, 2022
Number of pages
8
Written in
2021/2022
Type
CASE
Professor(s)
Unknown
Grade
A

Subjects

$8.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
boomamor2 NURSING
Follow You need to be logged in order to follow users or courses
Sold
1025
Member since
4 year
Number of followers
733
Documents
3718
Last sold
3 weeks ago

4.0

116 reviews

5
60
4
24
3
16
2
4
1
12

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions