Discuss the requirements for remote administration

Assignment Help Computer Network Security
Reference no: EM13732910

The DTGOV IMB has considered your assessment of the risk management and security issues for the migration of DTGOV's office productivity and email tools to an SaaS provider. They have decided that they need an additional assessment on the management and the SLA of the chosen provider.

You have been assigned the task of providing the IMB with an assessment of the management requirements and the provisions of the SLA for the proposed provider. You are to:

  1. Using the SaaS provider that you chose for assignment 2 (either Google or Office 365):
    1. Discuss the requirements for remote administration, resource management, SLA management and billing management of your chosen provider. It may be useful to consider Morad and Dalbhanjan's operational checklists here. This section should be no more than two to three pages in length.
    2. Discuss briefly how you will consider application resilience, backup and disaster recovery for your chosen provider. This section should be no more than two to three pages in length.
    3. Use Erl's SLA guidelines to assess the SLA for your chosen provider. This section should be no more than two to three pages in length.
    4. Provide a covering one to two page executive summary of these three assessments to the IMB and summarise the major opportunities and risks that have been identified in your assessments.

Verified Expert

Reference no: EM13732910

Identify physical security methods and the role

Identify physical security methods and the role they play in a network security plan. Compare and contrast the advantages and disadvantages of the physical security methods

Primary steps to database design

We explored the 2-primary steps to database design - conceptual design and physical design. We discussed importance of having representatives from all key stakeholders in conc

Implement a secure network infrastructure

Implement a secure network infrastructure for a commercial LAN or WAN environment - Understand the impact on the social and commercial environment of network security design

What is 128-bit encryption

Most Web browsers now use "128-bit encryption" to exchange data with secure Web sites. But what does this mean. What is "128-bit encryption". In terms of software available

Implement a secure information and network infrastructure

you are required to design and implement a secure information and network infrastructure that ensures high availability, reliability, scalability, performance and security t

The outline is security threats & vulnerabilities

the outline is Security Threats & Vulnerabilities, You must provide a 1-page outline of your paper by the end of Week 3. Your outline must include citations to three refere

Pros and cons of singular and consolidated policy format

What are the pros and cons of Singular and Consolidated policy format? Is it necessary to include standards, baselines, guidelines or procedures in this policy document? Expla

Development for critical infrastructure protection

Identify the state actors and non-state actors that pose the greatest cyber threat to the United States and justify your selections - describe how the mix of state and non-

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd