Provide an information security assessment

Assignment Help Computer Networking
Reference no: EM13719854

DTGOV uses Microsoft Office 2010 as its office productivity suite and Microsoft Exchange 2010 for email. The DTGOV Exchange instance is running on a cluster of physical servers operating in one of the DTGOV data centres. The DTGOV Information Management Board (IMB), headed by the CIO, has decided to move its office productivity and email suites to a service based model and want to investigate the use of an SaaS office productivity and email suite.

The IMB want to study the use of either Google Docs and Gmail or Microsoft's Office 365 as a possible SaaS offering for DTGOV and its clients. This will be intended to replace the existing Exchange 2010 data centre infrastructure as well as the Office 2010 installation on all desktop computers.

You have been assigned the task of providing the IMB with both a Risk Management assessment and a Security assessment for this proposed migration. You are to:

  1. Select either Google Docs/Gmail or Office 365 as the SaaS provider.
  2. Provide an Information Security assessment on your chosen provider using the techniques proposed by Ramgovind et al, and the ASD Cloud Computing Security Considerations as your primary references. This assessment should be no more than 2 pages.
  3. Provide a Risk Management assessment for your chosen provider using the Hickman and Beacroft, Threat and Risk Assessment Questionnaire V3 as a template.
  4. Provide a covering one page executive summary to the IMB for these two documents and summarise the risk management and security benefits and drawbacks of the proposed migration of office productivity services to an SaaS model.

Verified Expert

Reference no: EM13719854

About connecting and disconnecting

Connecting and Disconnecting Online.You connect online multiple times a day from emails, social media, and instant messages (IM) to virtual business meetings and conference

Explain why it is recommended to secure windows

You are the Information Security Officer at a medium-sized company (1,500 employees). The CIO has asked you to explain why you recommend it is so important to secure your

Use discrete event simulation approach

Use discrete event simulation approach I introduced in class to simulate the traditional "machine-repairman" closed queuing network.Please check "examples" lecture notes (lect

Policies and procedures facilitate strategy execution

Policies and procedures facilitate strategy execution when they are designed to fit the company's strategy and objectives. Search for recent articles and select one that discu

Network management in organisations

Network Management in Organisations - develop skills in research, critical analysis an academic writing of high standard. In this assignment students

Investigate methods by which user gain access to network

Investigate the methods by which users could gain access to the network. Pay particular attention to: The problems of having open access for all users.

What is the importance and/or use of the program telnet

While I do not want to have a conversation with him, instant messenger with him, or send him an email, I would like to send him a short message to meet for a break at 2:00

What size of packet result in last bit being transmitted

What size of packet will result in the last bit being transmitted just as the first bit of the packet arrives at the "far end" of the cable?

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd