Discuss the requirements for remote administration

Assignment Help Computer Network Security
Reference no: EM13732910

The DTGOV IMB has considered your assessment of the risk management and security issues for the migration of DTGOV's office productivity and email tools to an SaaS provider. They have decided that they need an additional assessment on the management and the SLA of the chosen provider.

You have been assigned the task of providing the IMB with an assessment of the management requirements and the provisions of the SLA for the proposed provider. You are to:

  1. Using the SaaS provider that you chose for assignment 2 (either Google or Office 365):
    1. Discuss the requirements for remote administration, resource management, SLA management and billing management of your chosen provider. It may be useful to consider Morad and Dalbhanjan's operational checklists here. This section should be no more than two to three pages in length.
    2. Discuss briefly how you will consider application resilience, backup and disaster recovery for your chosen provider. This section should be no more than two to three pages in length.
    3. Use Erl's SLA guidelines to assess the SLA for your chosen provider. This section should be no more than two to three pages in length.
    4. Provide a covering one to two page executive summary of these three assessments to the IMB and summarise the major opportunities and risks that have been identified in your assessments.

Verified Expert

Reference no: EM13732910

Develop a detailed capstone project proposal and plan

Develop a detailed Capstone Project Proposal and Plan using project management software (as listed in the Study Schedule) and the skills you have acquired from IT Project Ma

How many ways can a selection of 6 coloured balls be made

At the local school there are 12 different time periods during which 370 different classes must be scheduled. How many rooms does the school need - In how many different way

Create alternative message which has hash value

Generates the alternative message which has a hash value which collides with Bob's original hash value. Illustrate a message that Alice may have spoofed, and demonstrate tha

Describe as the explosive growth in digital crime

Name at least three factors that have lead to what some authors describe as the "explosive growth" in digital crime and cyber victimization. Provide some examples of what an

How do you plan to validate the data after acquiring it

What diplomatic strategies should you use with the network administrator and what privacy issues might be a concern with bank records (bank account numbers, customer names, et

What is a proxy firewall and how is it different

COIS23001 - Network Security - What is a proxy firewall and how is it different from a network (or transparent) firewall and what does NAT stand for, and how does the mechanis

Describe the importance of communication protocols

Explain the importance of communication protocols. Identify the protocols in your design and provide rationale for your decision. Define the overall network architecture. Expl

Dos attackers use zombies to attack victims

Why do you think DoS attackers use zombies to attack victims instead of sending attack packets directly to victims? Come up with two reasons.


Write a Review

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd