Provide an information security assessment

Assignment Help Computer Networking
Reference no: EM13719854

DTGOV uses Microsoft Office 2010 as its office productivity suite and Microsoft Exchange 2010 for email. The DTGOV Exchange instance is running on a cluster of physical servers operating in one of the DTGOV data centres. The DTGOV Information Management Board (IMB), headed by the CIO, has decided to move its office productivity and email suites to a service based model and want to investigate the use of an SaaS office productivity and email suite.

The IMB want to study the use of either Google Docs and Gmail or Microsoft's Office 365 as a possible SaaS offering for DTGOV and its clients. This will be intended to replace the existing Exchange 2010 data centre infrastructure as well as the Office 2010 installation on all desktop computers.

You have been assigned the task of providing the IMB with both a Risk Management assessment and a Security assessment for this proposed migration. You are to:

  1. Select either Google Docs/Gmail or Office 365 as the SaaS provider.
  2. Provide an Information Security assessment on your chosen provider using the techniques proposed by Ramgovind et al, and the ASD Cloud Computing Security Considerations as your primary references. This assessment should be no more than 2 pages.
  3. Provide a Risk Management assessment for your chosen provider using the Hickman and Beacroft, Threat and Risk Assessment Questionnaire V3 as a template.
  4. Provide a covering one page executive summary to the IMB for these two documents and summarise the risk management and security benefits and drawbacks of the proposed migration of office productivity services to an SaaS model.

Verified Expert

Reference no: EM13719854

Previous Q& A

  Write down a report without conducting a literature review

It is possible to design a study, collect and analyze data, and write a report without conducting a literature review? What are the dangers and drawbacks of conducting your research without doing a literature review?

  Discussion - assertive communication

Describe a situation where you probably should have been assertive in your communication, but you were not.

  Explain the four reasons why diversity is important

Discuss four reasons why diversity is such an important consideration in training and development. From a diversity standpoint, what do you need to know about your targeted learners?

  Simplify the developing full marketing strategy

What information would you gather in order to be able to develop full marketing strategy? Meaning, information that is needed for segmentation, targeting, and positioning.

  Improve your verbal communication

Improve your verbal communication - You-language is a way of speaking that projects responsibility onto another person and tends to be judgmental.

  Explore the mission and values of the monsanto company

What are (were) the mission and values of the Monsanto Company? What ethical issues are of primary importance to Monsanto organization?

  Calculate the acceleration of mass

A mass of 10 lbm is acted on by a force of 3.5 lbf. What is the acceleration in ft/min2?

  Explain an income statement and cash flow statement

Define the interrelationship between an income statement, balance sheet, and cash flow statement and which statement is most important for a new venture and why?

  Show critical thinking skills on a job

Critical Thinking and Job Requirements : While communication and critical thinking skills are important, they may not be the only requirements for a future job.

  Find the temperature and mass of gas in cylinder

What will be the temperature and mass of gas in the cylinder if this is accomplished? In a manner that maintains the temperature of the gas at 330 K?


Write a Review


Similar Q& A

  Program to compute employee-s weekly pay

Write down the program which reads the employee's number from keyboard, number of hours worked and the hourly rate of pay.

  You are working as the network administrator in abc

you are working as the network administrator in abc technologies. your companys network has been experiencing many

  How does server stack deliver packet to http server software

A computer in the Computing Department has just been turned on. The user starts up their web browser and requests to see the Macquarie University home page. The home page resides on a server on the administration subnet.!

  Make case for assigning unique flow label to each long-term

The question arises as to which packets generated by a source should carry nonzero IPv6 flow labels. For some applications, the answer is obvious. Small exchanges of data should have a zero flow label because it is not worth creating a flow for a ..

  Researching web browsers

Research three web browsers. For each browser, try to use it to at least access, if not actively work with, each of the following type of common web sites.

  Purposethe primary objective of the project is to encourage

purposethe primary objective of the project is to encourage students to explore in modest depth the operations function

  Insert and remove dns messages into the network

Suppose that an intruder could both insert and remove DNS messages into the network. Give three scenarios showing the problems that such an intruder could cause.

  The logic circuit consists of an active high output decoder

The logic circuit consists of an active high output decoder, an active low decoder and a 4:1 Mux. Write output expressions for f1,f2,f3 and replace logic circuit with a single 4:1 mux

  Multi-step protocols

Often a multi-step protocols the pipeline concept is applied. What does this mean? give an example, Explain it pictorially.

  What is the full address of the abbreviated ipv6

Given the following IPv6 addresses in hexadecimal colon notation, answer the following questions. Where applicable leave your answers in fully expanded hexadecimal colon notation.

  Information technology hello please i would like to

hello ltbrgt please i would like to get a good score with this assignment.hope to get a feedback

  What is the server ip address

Create 3 subnets for this organisation with the first subblock of 250 addresses, the second subblock of 60 addresses and the third subblock of 12 addresses.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd