Provide an information security assessment

Assignment Help Computer Networking
Reference no: EM13719854

DTGOV uses Microsoft Office 2010 as its office productivity suite and Microsoft Exchange 2010 for email. The DTGOV Exchange instance is running on a cluster of physical servers operating in one of the DTGOV data centres. The DTGOV Information Management Board (IMB), headed by the CIO, has decided to move its office productivity and email suites to a service based model and want to investigate the use of an SaaS office productivity and email suite.

The IMB want to study the use of either Google Docs and Gmail or Microsoft's Office 365 as a possible SaaS offering for DTGOV and its clients. This will be intended to replace the existing Exchange 2010 data centre infrastructure as well as the Office 2010 installation on all desktop computers.

You have been assigned the task of providing the IMB with both a Risk Management assessment and a Security assessment for this proposed migration. You are to:

  1. Select either Google Docs/Gmail or Office 365 as the SaaS provider.
  2. Provide an Information Security assessment on your chosen provider using the techniques proposed by Ramgovind et al, and the ASD Cloud Computing Security Considerations as your primary references. This assessment should be no more than 2 pages.
  3. Provide a Risk Management assessment for your chosen provider using the Hickman and Beacroft, Threat and Risk Assessment Questionnaire V3 as a template.
  4. Provide a covering one page executive summary to the IMB for these two documents and summarise the risk management and security benefits and drawbacks of the proposed migration of office productivity services to an SaaS model.

Verified Expert

Reference no: EM13719854

Questions Cloud

Explore the four phases of the information research process : For each of the four phases of the information research process, identify the corresponding steps and develop a set of questions that a researcher should attempt to answer.
Define quality in terms of product : Define quality in terms of what it means for a product to have high quality. Define quality in terms of what a customer's perception of a product might be.
What is difference between serial and sequential searching : What is the difference between serial, sequential and indexed sequential searching
Explain functionalist and social constructivist perspectives : Describe the key differences between the functionalist and the social constructivist perspectives of knowledge.
Provide an information security assessment : Provide an Information Security assessment on your chosen provider using the techniques proposed by Ramgovind et al, and the ASD Cloud Computing Security Considerations as your primary references. This assessment should be no m..
Write down a report without conducting a literature review : It is possible to design a study, collect and analyze data, and write a report without conducting a literature review? What are the dangers and drawbacks of conducting your research without doing a literature review?
Discussion - assertive communication : Describe a situation where you probably should have been assertive in your communication, but you were not.
Explain the four reasons why diversity is important : Discuss four reasons why diversity is such an important consideration in training and development. From a diversity standpoint, what do you need to know about your targeted learners?
Simplify the developing full marketing strategy : What information would you gather in order to be able to develop full marketing strategy? Meaning, information that is needed for segmentation, targeting, and positioning.

Reviews

Write a Review

Computer Networking Questions & Answers

  Use a straight-through cable to connect to hub

Assuming you use a straight-through (not a crossover) cable, what port on hub A will you use to connect it to hub B?

  Describe components, devices involved in each topology

Outline the three general network topologies (bus, ring, and star). Describe the components, devices, and arrangement of components and devices involved in each topology, as well as some of the pros and cons of each configuration.

  Discuss the advantages and disadvantages of each approach

A backbone network can be constructed as a switched backbone, a routed backbone or a VLAN backbone. Each of these approaches has its advantages and disadvantages.

  Explaining protocol to avoid defeat

Is there any protocol which you and Luke can use to avoid defeat? If not, describe why not. If there is protocol that would work, describe it.

  On the basis of your understanding of the isoosi network

on the basis of your understanding of the isoosi network reference model of tcpip and data encapsulation in

  Design and document an ip addressing scheme

Design and document an IP addressing scheme to meet ElectroMyCycle's needs. Specify which IP address blocks will be assigned to different modules of your network design.

  Question 1amake a distinction between passive and active

question 1amake a distinction between passive and active attacks.bprovide two reasons why it is very important to

  Which physical topology type connects all end nodes to a

a avoids the potential inefficiencies of csmacd because no transmission capacity if wasted on collisions and

  Explain development cost of programming time

If programmer are paid 20 dollars per hour and CPU time costs 50 dollars per minute, determine how many times should a problem of size 500 be solved by using Alg2 to explain its development cost?

  Determine about the crash if rip and ospf is used

Large wide area network covers United States and has multiple nodes in evey state. Node in Denver crashes completely. How do other nodes in the country determine about the crash if RIP is used? If OSPF is used?

  Question 1terrorism is the use of aggression fear and

question 1terrorism is the use of aggression fear and threats for political ideological or social purposes. cyber

  Include recommendations for how dirt bikes could benefit

dirt bikes management is concerned about how much money is being spent on communicating with people inside and outside

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd