Evaluate ability of different cloud computing architectures

Assignment Help Computer Network Security
Reference no: EM13718214

Task 1

DTGOV uses Microsoft Office 2010 as its office productivity suite and Microsoft Exchange 2010 for email. The DTGOV Exchange instance is running on a cluster of physical servers operating in one of the DTGOV data centres. The DTGOV Information Management Board (IMB), headed by the CIO, has decided to move its office productivity and email suites to a service based model and want to investigate the use of an SaaS office productivity and email suite.

The IMB want to study the use of either Google Docs and Gmail or Microsoft's Office 365 as a possible SaaS offering for DTGOV and its clients. This will be intended to replace the existing Exchange 2010 data centre infrastructure as well as the Office 2010 installation on all desktop computers.

You have been assigned the task of providing the IMB with both a Risk Management assessment and a Security assessment for this proposed migration. You are to:

1. Select either Google Docs/Gmail or Office 365 as the SaaS provider.

2. Provide an Information Security assessment on your chosen provider using the techniques proposed by Ramgovind etal, and the ASD Cloud Computing Security Considerations as your primary references. This assessment should be no more than 2 pages.

3. Provide a Risk Management assessment for your chosen provider using the Threat and Risk Assessment Questionnaire (White, P. 2015), as a template. You are to complete only the following sections of the template:

a. Section 6 Data, A. Data Classification

b. Section 6 Data, C. Backup

c. Section 7. Identity Management

d. Section 10 B. VPN

e. Section 10. C. Cryptography

f. Section 11. Cloud Services

Each section is to be completed with only the following detail:

a. Is the question applicable: yes, no or NA

b. What do you think are the likely consequences of the risk? (see Appendix B, Consequences for the term to use)

c. What do you think is the likelihood of the risk occurring? (see Appendix B, Likelihood for the term to use)

d. What is the risk rating for this question? (see Appendix B, Risk Rating for the risk rating)

4. Provide a covering one page executive summary to the IMB for these two documents and summarize the risk management and security benefits and drawbacks of the proposed migration of office productivity services to an SaaS model.

Task 2

The DTGOV IMB has considered your assessment of the risk management and security issues for the migration of DTGOV's office productivity and email tools to an SaaS provider. They have decided that they need an additional assessment on the management and the SLA of the chosen provider.

You have been assigned the task of providing the IMB with an assessment of the management requirements and the provisions of the SLA for the proposed provider. You are to:

1. Using the SaaS provider that you chose for assignment 2 (either Google or Office 365):

a. Discuss the requirements for remote administration, resource management, SLA management and billing management of your chosen provider. It may be useful to consider Morad and Dalbhanjan's operational checklists here. This section should be no more than two to three pages in length.

b. Discuss briefly how you will consider application resilience, backup and disaster recovery for your chosen provider. This section should be no more than two to three pages in length.

c. Use Erl's SLA guidelines to assess the SLA for your chosen provider. This section should be no more than two to three pages in length.

d. Provide a covering one to two page executive summary of these three assessments to the IMB and summarise the major opportunities and risks that have beesn identified in your assessments.

Rationale

This assignment covers the following objectives:

- Be able to compare and evaluate the ability of different Cloud Computing Architectures to meet a set of given business requirements;
- Be able to evaluate a set of business requirements to determine suitability for a Cloud Computing delivery model;
- Be able to evaluate and design an ICT Risk Management strategy for a Cloud Computing Delivery plan to meet business requirements;
- Be able to interpret, evaluate and plan the Governance and Security requirements for a Cloud Computing delivery plan;
- Be able to analyse and evaluate business requirements to plan a migration to a Cloud model;

Verified Expert

Reference no: EM13718214

Questions Cloud

Calculate the work done on the package by gravity : A 4.50kg package slides 1.55m down a long ramp that is inclined at 11.5 m below the horizontal. Calculate the work done on the package by gravity
An effective screening technique : Which of the following is an example of an effective screening technique? A A car maker advertising the high quality of their car
Drag coefficient of semi-tractor trailer without cab fairing : The drag coefficient (Cd) of a semi-tractor trailer without a cab fairing is 0.96,and with the fairing is 0.76 based on frontal area of 80ft^2. if power=Force * velocity, determine the horsepower (Hp) reduction of using the fairing in the truck is go..
What series resistance should be used : A galvanometer with a coil resistance of 40.0 Ω deflects full scale for a current of 2.0 mA. What series resistance should be used
Evaluate ability of different cloud computing architectures : Provide an Information Security assessment on your chosen provider using the techniques proposed by Ramgovind etal, and the ASD Cloud Computing Security Considerations as your primary references.
What is the period of small oscillations for this pendulum : A simple pendulum is 6.00 m long. What is the period of small oscillations for this pendulum if it is located in an elevator accelerating upward at 7.00 m/s2
What sorts of developments might discourage : Suppose that you were in business and intended to build a plant to turn out a promising new item-say, a pencil that would last twice as long as the kinds available now. What sorts of developments might discourage you from making this investment..
What is the frictional force between the road and the tires : A car of mass 1620 kg is traveling without slipping on a flat, curved road with a radius of curvature of 33 m. What is the frictional force between the road and the tires
Calculate the greatest speed of the block : A 0.8-kg block attached to an ideal spring with a spring constant of 92 N/m oscillates on a frictionless, horizontal surface. If the total mechanical energy is 0.64 J, the greatest speed of the block is

Reviews

Write a Review

Computer Network Security Questions & Answers

  The 2 main types of communications media used for network

the 2 main types of communications media used for network connections are wired connections and wireless connections.

  Process of generating an rsa key pair

List the smallest 10 numbers that are greater than 1000 and are candidates for being selected as the public key - can the number 1995 be selected as the public key? Justify your answer.

  Is there any way that eve can read encrypted communications

Suppose that Eve runs a key server. Alice downloads a key from the key server which Eve claims is Bob's public key. Bob downloads a key from the key server which Eve claims is Alice's public key.

  How to encrypt a message using a stream cipher

How to encrypt a message using block cipher algorithms we covered in class? What are the similarities and differences between those algorithms and How to encrypt a message using a stream cipher?

  How the database and web services can be protected

Study how the database and web services can be protected against unauthorized use while maintaining access for authorized users by using firewall and VPN techniques

  What levels of security appropriate to secure information

Determine what levels of security are appropriate to secure the information system while allowing a maximum amount of uninterrupted work flow.

  Data standards and data security

Data Standards and Data Security

  Efficient means of electronic payments

Think about security concerns and limited resources, do you think public sector entities should consider utilizing PayPal to facilitate inexpensive and efficient means of electronic payments?

  Use javascript to implement rsa including encryption

Use JavaScript to implement RSA including Encryption.

  Describe a malware attack that causes the victim

Describe a malware attack that causes the victim to receive physical advertisements and describe an instance of a file that contain evidence of its own integrity and authenticity.

  It infrastructure management pg assessment item 2enterprise

assessment item 2 ltbrgtenterprise architect3939s bog amp swot analysis ii ltbrgtvalue 35 ltbrgtdue date 04-oct-2014

  Describe the relationship between information security

1. research the sarbanes-oxley act. write a minimum of 500 wordsthis question only cite your sources using apa 6th

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd