What steps dsi take to provide adequate security for osds

Assignment Help Computer Network Security
Reference no: EM131041504

The Department of Spatial Information (DSI) is a State Government department. The major functions of DSI is to provide accurate and timely spatial information to other Government departments, but also to make some of this spatial information available to the public. In order to provide both the government and public services , DSI has developed a number of web services that deliver this information through a number of internally developed applications. This suite of web services and applications is referred to as the DSI Online Spatial Delivery System (OSDS).

DSI have a number of new projects being developed that are expected to increase the demand for its spatial data dramatically. The Executive Management of DSI have looked at a number of proposals to support these new programs. The two alternatives they are investigating are:

1. Increasing the internal DSI Data Centre capacity to host and support the new projects in the OSDS. This would probably need a 50% increase in web infrastructure and support services within the Department. This would necessitate an increase in data centre infrastructure, server numbers as well as a major increase in the bandwidth available to DSI.

2. Migrating the OSDS to a Cloud provider. This would allow DSI to continue to develop and refine the data in its internal Maintenance systems and then move a copy of the completed data to the cloud-based Delivery system for publication.
DSI Management is planning to adopt Proposal 2 but have asked you to give them a report that looks at the following aspects of the

proposal:

1. What model should DSI adopt for a cloud-based OSDS?

2. How should DSI assess the risk of adopting a cloud-based OSDS?

3. What steps should DSI take to provide adequate security for the OSDS?

Reference no: EM131041504

Objects-attributes and methods of the o-o model

Briefly explain what are objects, attributes, and methods of the O-O model. Draw an object model(s) and list a minimum of five attributes and five methods for the class and s

Discuss some of the security threats a company could face

In 1 - 2 pages, discuss some of the security threats a company could face when adding wireless access points (WAPs) to its network. How could the company reduce these risks

Computer ethics

CHECK OUT COMPUTER ETHICS INSTITUTE'S ADVICE. The Computer Ethics Institutes Web site at www.cpsr.org/program/ethics/cei.html offers the "Ten Commandments of Computer Ethics

Generates alternative message that has hash value

Generates an alternative message that has a hash value that collides with Bob's original hash value. Show a message that Alice may have spoofed, and demonstrate that its h

Examine the security characteristics of both ipv4

Examine the security characteristics of both IPv4, which is most prevalent in today's networks, and IPv6, which is up and coming. State and explain the major shortcomings of

Components that are used to create an ethernet network

You are trying to describe the Ethernet as the most common local area networking standard for your coworkers, friends, or family members. Discuss the following: Discuss the

Describe and assess impact of these devices on newspaper

Personal data assistants (PDAs), iPads, and e-Readers have the capability to wirelessly connect to online stores so that their users can purchase books, music, games,read e-

What does kleopatra allow you to do once it is installed

What does Kleopatra allow you to do once it is installed? What key type was used to create the certificate on Kleopatra? What other types of encryption key types are possibl

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd