From the first e-Activity, analyze the industry researched for each security model would be most applicable, and explain why you believe that to be the case. Identify the security models from your findings.
Information is priceless in the modern world of business, and it’s interesting to note that different security models are suitable for particular industries. Information security models often restrict access to stored information by unauthorized person to reduce disclosure, modification, disruption, destruction use, perusal, and inspection of crucial information. Role-based access control security model is more suitable for a highly specialized industry like the electronic equipment industry since it allows a business to exploit role mining to realize high-quality roles in the current access permissions. For an industry like the Arms Industry, Discretionary Access Control (DAC) model would be more appropriate for the implementation of confidentiality policies linked to national security (Bergstra & Burgess, 2007).
From the second e-Activity, ascertain the primary way in which the organization that you researched was able to leverage a cloud solution while overcoming its security concerns. Discuss whether or not you believe
…show more content…
It offers cloud computing services to its consumers through iCloud, for instance. Apple has leveraged cloud solution while overcoming its security concerns by ensuring that its information security system is built on a backbone of data security, particularly combined with geographic redundancy for maximum accessibility. The company has also invested physical and logical data security that not only makes it hard for hackers to access the company’s servers, but also its security applications or software that run their servers. The concerns surrounding cloud operations are warranted because the distributed or multi-tenancy nature of the cloud computing systems makes them vulnerable (Bergstra & Burgess,