Discuss the requirements for remote administration

Assignment Help Computer Network Security
Reference no: EM13732910

The DTGOV IMB has considered your assessment of the risk management and security issues for the migration of DTGOV's office productivity and email tools to an SaaS provider. They have decided that they need an additional assessment on the management and the SLA of the chosen provider.

You have been assigned the task of providing the IMB with an assessment of the management requirements and the provisions of the SLA for the proposed provider. You are to:

  1. Using the SaaS provider that you chose for assignment 2 (either Google or Office 365):
    1. Discuss the requirements for remote administration, resource management, SLA management and billing management of your chosen provider. It may be useful to consider Morad and Dalbhanjan's operational checklists here. This section should be no more than two to three pages in length.
    2. Discuss briefly how you will consider application resilience, backup and disaster recovery for your chosen provider. This section should be no more than two to three pages in length.
    3. Use Erl's SLA guidelines to assess the SLA for your chosen provider. This section should be no more than two to three pages in length.
    4. Provide a covering one to two page executive summary of these three assessments to the IMB and summarise the major opportunities and risks that have been identified in your assessments.

Verified Expert

Reference no: EM13732910

Mobile technologies and commerce

Your attention in this paper can be focused on any of the following topics covered in our text: · Information Management / IT Architecture. · Database, Data, W

Describe whom would you speak to or interview

Describe whom would you speak to or interview. List what investigative questions you would ask the witnesses, victims, and perpetrator. Explain other procedures you may take i

Protecting and securing any kind of network

Protecting and securing any kind of network is our responsibility as a network engineer. No matter what kind of situation we get into weather good or bad we have to stick to

Common information security threats

This is part one of a three-part assignment. The final version will be submitted. It is expected that adjustments will be made in the final version based on the feedback p

Differences between asymmetric and symmetric encryption

Examine the fundamental differences and similarities between asymmetric and symmetric encryption. Recommend one (1) application for which each encryption method is best suit

Can one tool be used for managing more than one area

What is the best tool for each area? Can one tool be used for managing more than one area? Why or why not? Support your information and make sure all information sources are

Describe situations where end-to-end encryption combined

Give some examples where traffic analysis could jeopardize security. Describe situations where end-to-end encryption combined with link encryption would still allow enough t

Your company has assigned you the task

Your company has assigned you the task of evaluating its computer networks. You are to write a memo covering 15 points on which you will evaluate the technology, connectivit

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd