Describe the operation of transport layer security

Assignment Help Computer Networking
Reference no: EM13732992

Part A

Mobile Systems, Virtualization and Clouds

Management deliberation of the first report commissioned, it was decided that the best options for the organisation would be to either build a private cloud infrastructure or utilise a public solution. After closer review of the information provided, the management conclusion was that the public solution with the possibility of being locked into a provider, possible loss of control of data, and the possibility of having to modify the business process to be in line with the provider, was to restrictive for the organisations future plans. While the initial cost of building a private solution is high it is felt that this option would provide the flexibility needed for future direction.
It was also noted that the report focused a lot on the issues of security and controlling access to the information stored in the cloud. Most of the solution regarding security focused on the connections between the client and the cloud services with the use of Transport Layer Security, VPNs or IPSec. This was useful information but the best practice and advantages over each of the solutions was not clear from the report and therefore needs further investigation.

Reading the last report also discussed peripherally virtualisation and using virtual servers in the cloud. As the organisation has for a long time been a traditional IT shop with physical servers the idea of being able to create virtual servers on demand has a lot of promise especially with the possible organisational future plans.

The organisation grew up at a fairly fast rate and has moved through a number of IT solutions over the years. All the solutions have been home grown and designed in house to meet the known challenges. As a result the solutions tended to be only short lived forcing a redesign in a shorter period than originally planned. It is evident that most of the IT personal in the organisation would not have the skills to take on the task of such a complicated and time consuming build. Therefore we will have to have a solution designed and built to the organisational needs by going through a tender process.

With the frequent changes to the computer systems, the IT department has implemented a traditional centralised Help Desk to deal with user's queries and problems in using the systems. Over the years the number of reported Help Desk requests have decreased while the number of incidents where files or services had to be rebuilt or rolled back from archive has increased. Recent internal survey suggests that the users are more likely to ask other employees then approach the Help Desk when facing technical problems.

You have been tasked to write a report to explain and explore the following technology and services:

a) The proposed change in the IT infrastructure is a major commitment of resources and we need to make sure that it has the best opportunity of being a success. In order to make this a success we need to start building the users skill base through training and education. It is felt that the current IT support mechanism by the use of Help Desk and instructions on web pages is not efficient. Research and report on alternative strategies for providing help services to users that could help with the adoption of the new design.

b) Research and describe the operation of Transport Layer Security (TLS), VPNs and IPSec. With the possible options describe the benefits and limitations of the solutions and provide a recommendation for which security mechanism to implement.

c) Building a private cloud storage and virtual service type solution provides the best of both world. Research and report on the type of virtualisation available and the advantages and disadvantages in building and using virtualised service type solutions.

d) Up to now the organisations IT department has been able to meet the challenges of designing and implementing the necessary communication networks for the organisation. However with the new design (private or public cloud) the IT department is venturing into areas where they lack experience. As possible solution the idea of tendering the build through Request for Proposal process has been raised. You have been asked to do brief analyses of the Request for Proposal process and highlight the benefits and the pitfalls of the process. The management is especially interested in what they need to get right in order to have the best guarantee for success.

Part B

Presentation of the Report Power Point Voice Over

You are to prepare and present the major finding of the report to the management. The presentation will consist of a Power Point presentation with voice over on the slides highlighting the reports major findings for the research areas in Part A. The report is not to be of more than 12 minutes in duration. Because of the time constraint you will have to make sure you focus only on the major issues and information recorded on the report.

Verified Expert

Reference no: EM13732992

Previous Q& A

  Terms of leadership theory

Clearly describe Robert Nardelli's leadership style in terms of Leadership Theory, incorporating the following theories within your paper:

  Foundations of project foundations

Project foundations (operational requirements, system requirements, design constraints, and software requirements) determine the scope of work to be accomplished in a project.

  Describe the attributes of your product or service in detail

Describe the attributes of your product or service in detail, Describe the pace at which your product will move through the product life cycle and the factors that will affect its movement

  Foundation for employee and organizational success

Managing employee performance provides a foundation for employee and organizational success. It coordinates many of the human resources (HR) functions together to create an interdependent dialogue on performance.

  Position in the united states

Lastly, would any of these benefits or concerns change the way you work when you return to a position in the United States?

  Example of norm of reciprocity in a multinational company

Question 1: Examine and provide a detailed example of norm of reciprocity in a multinational company. Question 2: Illustrate common and unique features of localization vs standardization using a Venn Diagram or similar chart, be sure that the char..

  Integrated delivery system

Your duties while working with the integrated delivery system (IDS) include periodic participation with the ethical board. A question has arisen as to whether expensive treatment options such as robotic surgery should be made available, despite th..

  Creating a performance grading

To correct this situation, you will begin by creating a performance grading form that will be used to assess the front-line supervisor's performance. Create a form that includes areas the supervisors should be graded on and the relative weight or ..

  Hris needs-data flow

From the e-Activity, predict two changes in the HR industry that could necessitate a change in long-range planning of HRIS needs and create a case which explains the reasons why an organization should take action regarding its HRIS based on your a..

  Evaluate the impact of the report

Then, locate a news article or video related to obesity. Identify the source and evaluate the impact of the report, in relation to the media attention and focus on the topic of obesity.


Write a Review


Similar Q& A

  Explain systems security certifications consortium web site

What are the areas addressed in CBK? Was policy explicitly listed? If not, where do you feel it is addressed in the CBK?

  Determine maximum value in ring if there is unique initiator

Design an algorithm that, under the standard set of assumptions (bidirectional links, total reliability, connectivity), determines maximum value in the ring assuming that there is a unique initiator.

  Describe link-state and distance-vector routing compare and

as a lead network administrator you need to review a few things with your team before implementing the next phase of

  Explain the networks fundamental characteristics and

write a 2- to 4-page paper that includes the following based on your organizationmiddot explain the networks

  Explain the steps take to stop cyber squatter

First protective strategy which is to register your trademark a trademark it can. Having it listed in the government registry is the right way to go, registry.

  Explain client-server architecture for serving client on pc

When people explain client-server architecture, they are usually referring to a system in which a large server is serving a client on a PC. With X Window, reverse is frequently the case. Explain

  Networking and telecommunications technologies all along

networking and telecommunications technologies along with computer hardware software data management technology and the

  How client process in given end system find location of user

Explain how a client process in a given end system can find the location of a given user to establish a connection, for example, Internet telephone, at a given point in time.

  Research and choose three graphical troubleshooting tools

in this assignment you will research graphical troubleshooting tools for a microsoft windows network. using the course

  Reasons to prevent outsider obtaining free network acces

List three reasons you might still want to prevent an outsider obtaining free network access by intruding into your wireless network.

  Identify and describe the processes involved in the windows

identify and describe the processes involved in the windows client server environment.explain the role of clientserver

  Case studynetworks are evolving scalability presentation

case studynetworks are evolving. scalability presentation acts reliability safety measures and cost considerations are

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd