Briefly describe cloud service information security features

Assignment Help JAVA Programming
Reference no: EM131329834

Case

Greentek is a software solution company for smartphone and tablet devices. Current headquarter (HQ) locates in Sydney, 30 sale team members and 50 software engineers base in Singapore and Manila respective. The cycle of apps development would start from HQ with ideas and design prototypes. The managers in HQ office will work with coders in Manila to form a full cycle of software development. When an app is ready for trial, Singapore team will test the app's functions and ready for marketing.

Task

You have been assigned the task to re-assess the current network and in-house hosting services; all three offices are connected with the MPLS for the VPN communication between the offices for daily tasks. Also to migrate some of the current in-house hosting services onto cloud-based to leverage apps roll out and cut down in-house maintenance cost over three offices. Your report proposal should explicitly address the following objectives:

1. Cloud delivery and deployment models to be used for Greentek;

2. Explain the impact on HQ, sale and development staff from your proposal;

3. Provide a tabulation consists of cost and features comparison from five major cloud vendors that able to support Xcode and Android Studio development platform environments;

4. Briefly describe cloud service information security features from the services cloud vendors that you proposed.

1. Cloud delivery and deployment models to be used for Greentek; (should keep the question back in your actual report)

• Which type of cloud deployment and delivery models would be best and suitable to the provided case ? why? + in-text ref(s)
• Should focus on the current three office connectivity through VPN/MPLS
• Should read the case provided and current organisation layout to form better arguments

2. Explain the impact on HQ, sale and development staff from your proposal;; (should keep the question back in your actual report)

• What are the impacts on HQ, sale and development staff ONCE the proposal model being implemented? + in-text ref(s) (if any)

o Administrative?
o Network, IT, resources management?
o Human resource
o Search other cases that related to your "selected cloud service model", for instance: security, SLA, jurisdiction of your cloud provider etc..+ in-text ref(s) (if any)

3. Provide a tabulation consists of cost and features comparison from five major cloud vendors that able to support Xcode and Android Studio development platform environments;; (should keep the question back in your actual report)

 

Cost

Features

Vendor 1

Actual as is Dec 2016

+ in-text ref(s)

Vendor 2

Actual as is Dec 2016

+ in-text ref(s)

Vendor 3

Actual as is Dec 2016

+ in-text ref(s)

Vendor 3

Actual as is Dec 2016

+ in-text ref(s)

Vendor 3

Actual as is Dec 2016

+ in-text ref(s)

4. Briefly describe cloud service information security features from the services cloud vendors that you proposed.; (should keep the question back in your actual report)

• Extract security features from your selected services cloud vendors+ in-text ref(s)

Report conclusion (1200 words for all four questions)

References:

APA6 ref style

Note:

1. Report should be submitted in MS Word . Please do not use any other format for your submission.
2. Please check spelling and grammar mistakes in your report as this will be part of the marking rubric.
3. Word limit (1200 words (-/+10%) will exclude cover page, introduction and references.
4. All figures, tables or any other data taken from various sources must be references as per APA 6th edition style referencing.

Rationale

This assessment will cover the following objectives:

• Be able to research and apply suitable cloud service delivery on a required case;
• Be able to identify the infrastructure, platform and service information security risk;
• Be able to measure, indicate and categorise the risk level for cloud service models.

Reference no: EM131329834

Questions Cloud

What is a disaster recovery plan : What criteria should be used when considering whether or not to involve law enforcement agencies during an incident?
Chinese government to the sale of opium in china : How can you apply the Realistic Theory of political power and trade to explain the reaction of the Chinese Government to the Sale of Opium in China? Was the reaction of the Chinese Government justified compared to the reasons given for the War aga..
Calculate the final temperature of a bubble : Given the number density function Eq. 14.33 and the temperature curve plotted in Fig. 14.3 to the surrounding atmosphere, calculate the Final temperature of a bubble of air that rises adiabatically from a state z1 = 0, T 300 K to an altitude z2 = ..
What is a business continuity plan : What is a business continuity plan, and why is it important? What is a business impact analysis, and what is it used for?
Briefly describe cloud service information security features : Briefly describe cloud service information security features from the services cloud vendors that you proposed.; (should keep the question back in your actual report)
Establishment costs and source of funds : Penetration pricing occurs when a company launches its products at low prices in order to secure market share - Customer Demographics all the category of people in the society. But we're focusing on the youths
Discuss the pricing policy of price discrimination : Discuss the pricing policy of price discrimination. Provide the economic reasoning for movie theaters, airlines, and many other businesses to charge customers different prices based on time of the day, age, and purchase dates. Why?
Economic and political conclusions of classical dichotomy : Part A) What is ‘Classical Dichotomy'? What is the neutrality of money? Are the two related? If so,how are they related? What are the major economic and political conclusions of ‘Classical Dichotomy'?
Compute the shapley value of the game : Show that the core of this game consists of a single allocation vector.- Compute the Shapley value of this game. (Notice the symmetry between players 2 and 3.)

Reviews

Write a Review

JAVA Programming Questions & Answers

  Method splitstack that takes a stack

Write a method splitStack that takes a stack of integers as a parameter and splits it into negatives and non-negatives. The numbers in the stack should be rearranged so that all the negatives appear on the bottom of the stack and all the non-negat..

  Implement simple java program to input syllabus grades

To implement simple Java program to input (hypothetical) syllabus grades, computing and displaying both normal Mean and Harmonic Mean.

  Draw dashed lines

Write a class Lines containing a static method dashedLine to draw dashed lines, so it can write:

  Chat facility using java

Develop an intranet based email server with user registration, user login, inbox, compose mail and chat facility using java, JSP, MS Access/MySQL, JDBC etc.

  Write a program to generate an ascii-graphics

Write a program to generate an ASCII-graphics of an equilateral triangle. The input to your program is a single integer number representing the length of the side of the triangle. This number must be 2 or larger.

  Implement a simple relational dbms

In Problem Set, you began to implement a simple relational DBMS by taking the code base that we gave you and adding support for INSERT commands and for SELECT * commands involving a single table.

  Create an equals method for every physical class

Create an equals method for every physical class. Make attributes private Have get and set methods to access items in the shopping list Have defined class constructors

  Write a java program to implement the finite field

Write a program called "GF2.java" to implement the finite field GF(p n ) where p is a prime number and n is a positive integer.  You also need to write four methods to realize "+", "-", "´", and "/".

  Prevent clear communication

Conversational implicature always prevents clear communication - Describe a situation where communication between you and a co-worker

  Develop a menu driven console java program

Review the text p.933for the use of the printf method and using a format string -  You have completed the console program for collecting statistics for the entry of student marks. We are going to extend this application so the student names and ..

  Develop a java program given the width, length and depth

Write the source code for each class in a separate file which must have the same name as the class name together with the extension .java. Remember also that by convention, class names commence with a capital letter.

  Develop a menu driven console java program

Develop a Menu Driven Console Java Program to demonstrate you can use Java constructs including input/output via GUI dialogs, Java primitive and built-in types, Java defined objects, arrays, selection and looping statements and various other Java ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd