Reference no: EM132190619
1. Conversion to a Virtual Network Organizations that move to virtualized environments has typically done so through conversion of an existing traditional network. There are an array of decision points involved in this conversion, including scaling the environment, making decisions about data storage, and building the network management procedures that are associated with a traditional network. Discuss the factors that would be involved in making a conversion from a traditional network to a virtualized network, including potential pain points and strategies for mitigating or minimizing those potential areas of challenge.
2. Migrating to the Cloud Too Tall Tents is an outdoor sports and camping manufacturer doing business in the United States, Canada, and several cities in the United Kingdom. They recently experienced a serious breach of security, when a backup cartridge, which contained customer identity and credit information, was stolen. The network administrator was transporting the cartridge to the offsite location, and it was stolen while he was out of the car having a meal at a truck stop along the way. The executives of Too Tall Tents have called the CIO, Jim Lee, in for a meeting to give him an opportunity to explain this breach of protocol and to update them as to the work he has done to ensure such a serious situation will never be repeated. Jim has decided the only way to save himself is to recommend that the organization move to cloud-based storage solutions. He is anxious to be on the top of his game when he attends this very important meeting and wants to be educated on the topic of secure cloud storage. Jim has hired you to provide this education for him, including the options available to him and what the pros and cons are of adopting those options. Discuss the advice that you would offer Jim to help him prepare for his proposal to the executives of the company.
3. Security Implication of Cloud Storage Options In the first discussion question, you were asked to provide Jim Lee with viable options for converting his current backup processes to a cloud storage solution. It is important to consider the security implications of such a move. Among the important controls that play a role in secure storage are access controls, the use of encryption to protect the data in transit and at rest, and the management and control of the keys with which that data is encrypted. Discuss these security controls and any others that may play a role in converting to cloud storage options.