Discuss the requirements for remote administration

Assignment Help Computer Network Security
Reference no: EM13732910

The DTGOV IMB has considered your assessment of the risk management and security issues for the migration of DTGOV's office productivity and email tools to an SaaS provider. They have decided that they need an additional assessment on the management and the SLA of the chosen provider.

You have been assigned the task of providing the IMB with an assessment of the management requirements and the provisions of the SLA for the proposed provider. You are to:

  1. Using the SaaS provider that you chose for assignment 2 (either Google or Office 365):
    1. Discuss the requirements for remote administration, resource management, SLA management and billing management of your chosen provider. It may be useful to consider Morad and Dalbhanjan's operational checklists here. This section should be no more than two to three pages in length.
    2. Discuss briefly how you will consider application resilience, backup and disaster recovery for your chosen provider. This section should be no more than two to three pages in length.
    3. Use Erl's SLA guidelines to assess the SLA for your chosen provider. This section should be no more than two to three pages in length.
    4. Provide a covering one to two page executive summary of these three assessments to the IMB and summarise the major opportunities and risks that have been identified in your assessments.

Verified Expert

Reference no: EM13732910

Discuss your experience working with labsim

Discuss your experience working with LabSim and completing Unit 1 Lab tasks in Part I. Of the three Sections chosen in LabSim Module 3, share your thoughts about one of the s

Develop the issp for the organisation

You are required to analyse the scenario on page 3 and develop the following ISSP for the organisation - You also need to include a section containing the justification of the

Prepare a technical paper about network security

Prepare a Technical Paper about Network Security for a Small Accounting Firm. The firm realizes that it needs help to secure its network and customers' data. With your backgr

Complete annotated bibliography on your assigned about iran

Complete an annotated bibliography on your assigned about Iran. The annotated bibliography must contain at least 20 entries. You may use Internet sources, but please include

Discuss the steps necessary to make electronic evidence

Identify and discuss the steps necessary to make electronic evidence admissible in court and identify various crimes and incidents that are involved in electronic forensic inv

Prepare analysis of the interconnectedness of cybersecurity

Prepare a paper highlighting the threat that China poses to the United States as regards Cyberwar and theft of Intellectual Property (IP). The student should identify the k

Primary steps to database design

We explored the 2-primary steps to database design - conceptual design and physical design. We discussed importance of having representatives from all key stakeholders in conc

Mobile technologies and commerce

Your attention in this paper can be focused on any of the following topics covered in our text: · Information Management / IT Architecture. · Database, Data, W

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd