Cloud computing security

Assignment Help Management Information Sys
Reference no: EM13751263

DTGOV uses Microsoft Office 2010 as its office productivity suite and Microsoft Exchange 2010 for email. The DTGOV Exchange instance is running on a cluster of physical servers operating in one of the DTGOV data centres. The DTGOV Information Management Board (IMB), headed by the CIO, has decided to move its office productivity and email suites to a service based model and want to investigate the use of an SaaS office productivity and email suite.

The IMB want to study the use of either Google Docs and Gmail or Microsoft's Office 365 as a possible SaaS offering for DTGOV and its clients. This will be intended to replace the existing Exchange 2010 data centre infrastructure as well as the Office 2010 installation on all desktop computers.

You have been assigned the task of providing the IMB with both a Risk Management assessment and a Security assessment for this proposed migration. You are to:

Select either Google Docs/Gmail or Office 365 as the SaaS provider.

Provide an Information Security assessment on your chosen provider using the techniques proposed by Ramgovind et al, and the ASD

Cloud Computing Security Considerations as your primary references. This assessment should be no more than 2 pages.

Provide a Risk Management assessment for your chosen provider using the Hickman and Beacroft, Threat and Risk Assessment Questionnaire V3 as a template.

Provide a covering one page executive summary to the IMB for these two documents and summarise the risk management and security benefits and drawbacks of the proposed migration of office productivity services to an SaaS model.

Reference no: EM13751263

Questions Cloud

Describe the background of the ancient greek city of athens : Describe the background of the ancient Greek city of Athens explaining how it started and the importance of the city. Your summary should be between 75-100 words.
Calculate total surplus : Calculate consumer surplus. Shade appropriate area in graph, calculate producer surplus. Shade appropriate area in graph - Calculate total surplus
Where the earliest aegean civilization was located : Mycenaean civilization was characterized by. The earliest Aegean civilization was located. The emergence of the 'city state' as a central institution in Greek life.
Assignment on analyze elements of managerial planning : Assignment On Analyze Elements of Managerial Planning, You started your restaurant business as a new entrepreneur now as one of the managers for your restaurants, identify the kind of organizational structure that the organization uses to coordinat..
Cloud computing security : Cloud Computing Security Considerations as your primary references. This assessment should be no more than 2 pages
Define the company''s supply chain performances : Develop a PowerPoint presentation for your company or an imaginary company for an upcoming all-staff meeting detailing some of the metrics you are proposing for measuring the company's supply chain performances. Analyze a minimum of three (3) metr..
Write a paper on aggression and the media : Write a paper on aggression and the media. Choose a TV show (popular one) to illustrate the issue and use scientific articles (Pros/Cons) to support your argument
Why have personal navigation devices become popular : Why have Personal Navigation Devices become popular? What technologies are required to facilitate the success of PNDs
Demonstrate thoughtful consideration of the ideas : demonstrate thoughtful consideration of the ideas and concepts presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards.

Reviews

Write a Review

Management Information Sys Questions & Answers

  It manager''s role in the need for an organization''s security

IT Manager's Role in the Need for an Organization's Security - Consider that you are a manager in a particular functional area

  Technology on business communicationsidentify as many

technology on business communicationsidentify as many business communications technology applications as possible. for

  Defining data relationshipsdefining data relationships is

defining data relationshipsdefining data relationships is an important process during the database design. discuss the

  Ways info systems aid organizations business objectives1 in

ways info systems aid organizations business objectives1. in what ways can information systems support an organizations

  How will pat respond and how will you respond to pat

Supply Chain Selection of vendors - How will Pat respond, and how will you respond to Pat?

  A new economy of sharing has fuelled an old approach to

internet impacts and support for new business modelssocial networking has provided new models of business. companies

  Concept of web services

Question about Information System Management - concept of Web Services and how web services will effect business operations in the future.

  Write a business report

Write a business report - draw on examples from other companies, to help produce a persuasive, well-supported, well-referenced, and robust defence of your position.

  Describe the concept of software as a service

Software as a Service (SaaS) - Describe the concept of Software as a Service (SaaS), and describe at least one application area

  Write paper on advising clambake company on their future is

Cross-Organizational Systems Consider the following scenario regarding the Clambake Company and decisions they need to make regarding their information systems (IS). Write a one-page (250-word) paper advising the Clambake Company on their future IS

  Evaluation and the initial dvelopment of applications

Oversees and coordinates the evaluation and the initial dvelopment of applications for state-of-the-art data processing equipment and various information system technologies.

  Actions that can be taken to improve security of business

BUS Management of Information Systems - It describes some of the actions that can be taken to improve the security of business uses of the Internet. Examples of security measures and technologies are provided.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd