Describe advantages and disadvantages of virtualization

Assignment Help Other Subject
Reference no: EM132321863

Assignment: This assignment has two parts:

Part One: Understanding Risks in Virtualized Networks

Virtualization (VMware, Microsoft Hyper-V, and VirtualBox) provides an enterprise with a significant opportunity to increase efficiency and decrease costs in its IT operation. For this task, assume that the vice president of IT operations of an organization has consulted you (chief cyber architect) to provide five advantages and five disadvantages of virtualization and to provide four best principles and practices that can be adopted in a virtualized environment that will reduce the risks associated with virtualization. It may help to select a specific organization with which you are familiar.

Address the following in your paper:

1. Provide an introductory section on virtualization and its application in enterprise network.

2. Use a table format to differentiate the advantages and disadvantages of virtualization.

3. Identify risks and attacks that are associated with the use of virtualization or virtual desktop infrastructure (VDI).

4. Describe four best practices and principles that will reduce the risks associated with virtualization.

5. Wrap up with a summary and conclusion.

Length: 3-4 pages, not including titles and reference pages.

References: Support your assignment with a minimum of 4 scholarly resources

Keep your audience in mind. Remember you are not preparing this for an academic audience. Your audience will not care about theoretical or conceptual issues in risk management. They will only care about specific issues, strategies, and scenarios that are relevant to their organization.

Your paper should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards

Part Two: Using Security Risk Analysis (SRA) in Risk Mitigation

For this task, imagine that you are a senior risk assessor for an organization (it may help to select a specific organization with which you are familiar). You have spent sleepless nights when conducting the security risk analysis (SRA) of the organization. Top-level management determines that the result of the SRA indicated excessive risk. Is excessive risk synonymous with lots of risk? What approaches can you use to handle confirmation of excessive risks in the organization?

Length: 4-6 pages, not including titles and reference pages.

References: Support your assignment with a minimum of 6 scholarly resources.

Your audience for this assignment is yourself. Discuss your own reasoning and thoughts on the assignment prompt and how you would act as the SRA for the organization you have chosen.

Your paper should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards.

Reference no: EM132321863

Questions Cloud

Describe the influence of marine viruses on carbon cycling : Describe carbon cycling in marine ecosystems and describe the influence of marine viruses on carbon cycling.
What do you expect lisa diagnosis to be : What do you expect Lisa's diagnosis to be? Support your answer with diagnostic criteria from the text.
Comparison of News Article and Academic Journal Article : ENG 111 Assignment Instructions - Essay: Comparison of a News Article and an Academic Journal Article. Review the two articles
What would be a way to incubate the petri dishes : On my lab it says to use a incubator but a incubator wasn't included in it. What would be a way to incubate the Petri dishes?
Describe advantages and disadvantages of virtualization : Virtualization (VMware, Microsoft Hyper-V, and VirtualBox) provides an enterprise with a significant opportunity to increase efficiency and decrease costs.
Explain the potential impact of cybercrimes on a business : Cyvercrimes are a rising threat to businesses. Study the Case Study of Uber Hack and explain the potential impact of cybercrimes on a business.
Explain why legislators may not listen to all constituents : Explain how policymaking processes might make it difficult for public to monitor and evaluate House. explain why legislators may not listen to all constituents
How cloud computing could be used by carlson : Assess how cloud computing could be used by Carlson instead of a SAN. Create a diagram using Visio or its open source alternative software to illustrate.
About international relations in the contemporary : Describe briefly what you have learned in this course about international relations in the contemporary world. Explain how this course has affected your outlook

Reviews

Write a Review

Other Subject Questions & Answers

  Which step in decision making process

Which step in decision making process do you think is difficult to complete? What would you do to change or make it easier? Which information would you say is most overlooked when making risk-and quality management decisions?

  Explore wikipedia entry concept map and then create your own

Write down ideas you are considering for your topic and begin organizing them (a process called "brainstorming"). Explore the Wikipedia entry Concept Map and then create your own. During your brainstorming, use the websites bubble.us, Mindmeister,..

  The marketing mix must be a dynamic

The marketing mix must be a dynamic! Given the changes that occur on a regular basis, it is imperative for marketing managers to scan the environment around them to ascertain what changes are happening (both consumer preferences and competition) and ..

  Compute the npv and irr of each project

Compute the NPV and IRR of each project. If there were no budget constraint, which projects would you recommend?

  Attribute is characteristic or property of an entity

An attribute is a characteristic or property of an entity. If person is an entity, would the same attributes be used to describe a person in a medical database, in a student database, in a fitness club database? Why or why not?

  Which would you say is the best practice explain why

What are 3 of the most commonly used evaluation strategies for change strategies? Which would you say is the best practice? Explain why.

  Addresses the issue of the moral right to healthcare

For this discussion, begin by creating a PowerPoint presentation that addresses the issue of the moral right to healthcare.

  Continue the progress they have made in therapy

What can I do as a counselor to help clients develop the support that they need to continue the progress they have made in therapy?

  Political subdivision that employs them are subject

Police officers, their supervisors and the political subdivision that employs them are subject to civil liability for violations of criminal and civil rights

  Discuss how a social construct is handled in postmodern art

Discuss how a social construct is handled in Postmodern art. You should plan to find at least two specific Postmodern artworks to discuss.

  Risk factor and a disease can be considered casual

What are Hill’s criteria for judging whether an association between a risk factor and a disease can be considered casual?

  Importance of spacing norms in the united states

What do these responses to your space violations reveal to you regarding the importance of spacing norms in the United States?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd