Discuss the requirements for remote administration

Assignment Help Computer Network Security
Reference no: EM13732910

The DTGOV IMB has considered your assessment of the risk management and security issues for the migration of DTGOV's office productivity and email tools to an SaaS provider. They have decided that they need an additional assessment on the management and the SLA of the chosen provider.

You have been assigned the task of providing the IMB with an assessment of the management requirements and the provisions of the SLA for the proposed provider. You are to:

  1. Using the SaaS provider that you chose for assignment 2 (either Google or Office 365):
    1. Discuss the requirements for remote administration, resource management, SLA management and billing management of your chosen provider. It may be useful to consider Morad and Dalbhanjan's operational checklists here. This section should be no more than two to three pages in length.
    2. Discuss briefly how you will consider application resilience, backup and disaster recovery for your chosen provider. This section should be no more than two to three pages in length.
    3. Use Erl's SLA guidelines to assess the SLA for your chosen provider. This section should be no more than two to three pages in length.
    4. Provide a covering one to two page executive summary of these three assessments to the IMB and summarise the major opportunities and risks that have been identified in your assessments.

Verified Expert

Reference no: EM13732910

Questions Cloud

How did industrialization contribute to militarism in europe : How did the industrialization contribute to militarism in europe?
What are three examples of assimilation : What are three examples of assimilation? during the new urban culture period.
What process strategy is applied in that organization : What process strategy (from the four process strategies) is applied in that organization and Where is the headquarter (or distribution center) of the organization? Are there any benefits locating there? If you could choose, where would you choose
What location would you consider most in interesting : Considering yourself a member of the merchant classes during the middle ages, what role would you strive for? What time period and location would you consider the most interesting to witness?
Discuss the requirements for remote administration : Discuss the requirements for remote administration, resource management, SLA management and billing management of your chosen provider. It may be useful to consider Morad and Dalbhanjan's operational checklists here.
How many work packages have been created : To ensure you have a clear scope for your team, create a 2-level WBS. Don't forget to include your WBS numbering. In your WBS, how many work packages have been created
Was luther most significant effective reformer of his time : Was Luther the most significant or effective reformer of his time, or is he simply the most noted?
Issues related to purchase and post-purchase activities : Consumer needs and wants are what drive marketers to succeed in selling their products or services through a variety of methods. Issues related to purchase and post-purchase activities
Research proposal- mini research project : What kind of study does the question suggest (empirical--e.g., ethnography, case study, descriptive study, experimental; historical--oral or archival or both; theoretical; discourse or textual analysis, etc.)?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe ipsec provides security at the network layer

If IPSec provides security at the network layer, why is it that security mechanisms are still needed at layers above IP

  Recovering scrambled bits

Determine the legal and ethical considerations for investigating and prosecuting digital crimes and analyse data on storage media and various file systems

  Security goal if someone modifies critical information

If an attacker breaks into a corporate database, modifies some information and deletes critical files, against what security goal or goals is this attack aimed?

  Design a new public key encryption scheme

Design a new public key encryption scheme - de ne and then show the correctness of the new scheme II.

  Computing decryption function and recovered plaintext

Decrypt to recover the plaintext. What is the decryption function, and the recovered plaintext? What type of cipher is this?

  Abc institute of research has sensitive information that

abc institute of research has sensitive information that needs to be protected from its rivals. the institute has

  Explain computer forensics software or services

Use a web search engine to search for companies specializing in computer forensics software or services. Select two or three and write a one- to two-page report comparing what each company does.

  Select a research topic from the list below after selecting

cybersecurity research paperselect a research topic from the list below. after selecting your topic research the

  Decrypt cipher-text by using secret key

Decrypt the cipher-text c = 12 by using secret key sk = (p, q) = (11, 13), where te corresponding public key is pk = (N, e) = (143, 13).

  Explain the purpose of the entity company code

Explain the purpose of the entity ‘Company Code'. How many company codes can an enterprise have and why?

  Discuss a minimum of five event types found in a dhcp log

Discuss a minimum of five event types found in a DHCP log and describe what they refer to and what plan will you follow to assign printers to all the users in the organization?

  Responsibility of confidentiality to previous employer

You have taken a job with a software user who has contracted your previous employer to develop a system for them. However, you have also a responsibility of confidentiality to your previous employer.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd