Provide an information security assessment

Assignment Help Computer Networking
Reference no: EM13719854

DTGOV uses Microsoft Office 2010 as its office productivity suite and Microsoft Exchange 2010 for email. The DTGOV Exchange instance is running on a cluster of physical servers operating in one of the DTGOV data centres. The DTGOV Information Management Board (IMB), headed by the CIO, has decided to move its office productivity and email suites to a service based model and want to investigate the use of an SaaS office productivity and email suite.

The IMB want to study the use of either Google Docs and Gmail or Microsoft's Office 365 as a possible SaaS offering for DTGOV and its clients. This will be intended to replace the existing Exchange 2010 data centre infrastructure as well as the Office 2010 installation on all desktop computers.

You have been assigned the task of providing the IMB with both a Risk Management assessment and a Security assessment for this proposed migration. You are to:

  1. Select either Google Docs/Gmail or Office 365 as the SaaS provider.
  2. Provide an Information Security assessment on your chosen provider using the techniques proposed by Ramgovind et al, and the ASD Cloud Computing Security Considerations as your primary references. This assessment should be no more than 2 pages.
  3. Provide a Risk Management assessment for your chosen provider using the Hickman and Beacroft, Threat and Risk Assessment Questionnaire V3 as a template.
  4. Provide a covering one page executive summary to the IMB for these two documents and summarise the risk management and security benefits and drawbacks of the proposed migration of office productivity services to an SaaS model.

Verified Expert

Reference no: EM13719854

Company cyber security posture

Analyze the connection between corporate governance and a company's cyber security posture. Provide at least three (3) points to justify whether or not there is an impactful

Different components difficult to incorporate into a network

Do you believe that a network with different types of computers, maybe different operating systems, or different components would be difficult to incorporate into a network.

Evaluate the current ethical concerns surrounding your topic

Evaluate the current ethical and legal concerns surrounding your topic. Select one ethical or legal concern surrounding your topic, take a position on the issue, and provide r

Which of common application architectures for email is best

Some experts argue that thin-client client-server architectures are really host-based architectures in disguise and suffer from the same old problems. Do you agree? Explain.

Distinct canonical names are required in conference

Let N users participating in audio/video conference using IP multicasting. Each user is equipped with microphone, a camera, and speakers. How many distinct canonical names

Explain are lans a stable technology or changing

Are LANs a stable technology or are they changing just as rapidly as other forms of communication technologies? Should software licenses be dropped completely?

What makes tcp-ip networking so popular

What makes TCP/IP networking so popular? Provide at least 2 examples (other than the Internet) for which TCP/IP networking is well-suited, and discuss reasons to support you

What is the server port number for data download

Use Wireshark tool to capture packets when you download Lecture 1 from the COIT20229 Course Webpage. Before you undertake this task, you should have Wireshark installed in y

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd