Internal it services hosted on premise

Assignment Help Basic Computer Science
Reference no: EM13936429

The Scenario

Many organizations are using cloud services in place of internal IT services hosted on premise. Cloud services reduce the need for capital expenditure and can be set up in minutes without the need for long hardware procurement cycles. However using cloud services implies a loss of control over the infrastructure used to provide the services but not the need for security.
There are many forms of cloud service these include Software as a Service, Platform as a Service, and Infrastructure as a Service. There are many deployment models including Public Cloud, Private Cloud and Community Cloud.

Assignment Task

This assignment requires you to write a report which describes the major information security challenges faced by an organization using cloud IT services in place of internal IT services hosted on premises. You should use research from the internet and other available sources to identify these challenges. This report should then describe the technologies that are available and relevant that an organization using cloud services can exploit to manage the challenges that you have identified. It should then provide some recommendations. The report should not exceed 3000 words in length.

Report Structure
Introduction
This should be an introduction and summary of your paper and findings in 200 to 300 words.

  • Description of cloud services and deployment models
  • This should provide a short description of the different cloud service models and deployment models together with a summary their advantages and security challenges. As a guide, an approximate word count for this section is 800 words.
  • Security Challenges of cloud services.
  • Identify and describe the major information security challenges of cloud services to an organization that is using them. Describe how the responsibility for security is divided between the cloud service provider and the cloud service tenant. As a guide, an approximate word count for this section is 800 words.

Relevant Information Security Technologies.

This section should describe the relevant IT security technologies and approaches that are available to an organization using cloud services to manage the security challenges that were described in the previous section. It should provide practical advice on which technologies are most suitable and their effectiveness. As a guide, an approximate word count for this section is 800 words.
Conclusions and recommendations

This section should be 200 to 300 words in length and should summarize the conclusions and recommendations from your study.

Reference no: EM13936429

Questions Cloud

Show how this priority queue is affected by adding string : To tell if one element in ZooGraph has relation X to another element, you look for a path between them. Show whether the following statements are true, using the picture or adjacency matrix.
Evaluation and interpretation of criminal justice data : Discuss why these aspects were selected. Describe how the selected aspects relate to the evaluation and interpretation of criminal justice data and research findings. Explain why researchers would consider qualitative methods an artistic expression o..
Organization and develop an information security strategy : The task is to carry out an information security risk assessment for an organization and develop an Information Security Strategy for that organization. This should include, at least:
Value and exchange for developing a marketing strategy : Marketing Reflection - Explaining the concepts of Value and Exchange for developing a marketing strategy.
Internal it services hosted on premise : Many organizations are using cloud services in place of internal IT services hosted on premise. Cloud services reduce the need for capital expenditure and can be set up in minutes without the need for long hardware procurement cycles. However usin..
What do you estimate the dollar amount of rollover balances : Also the value of a(s - q)/t = 1. If current CD balances are $100 million, what do you estimate the dollar amount of rollover balances to be?
Explain the super predator myth : During the 1990s and into the 2000s a juvenile super predator myth drove statutory and policy development throughout the nation. Using federal or state government publications and/or peer reviewed journal articles: Explain the super predator myth
Identify recent new-product launches or promotional campaign : Go to Nestlé's Australian web site (www.nestle.com.au). Review its latest news and the Peter's brand page to identify recent new-product launches or promotional campaigns. Which segments of the market are these products/campaigns aimed at? Do you ..
What is expected interest cost and month-end balance on cds : If current rates are 2 percent, what is the expected interest cost and month-end balance on your CDs? what are some examples of criteria you would be looking for in this process?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Calculate the difference between two numbers

Create a template function that can be used to calculate the difference between two numbers. Make it able to use two integers, two floats, and an integer and a float.

  Study ai literature to find-task can be solved by computers

Study the AI literature to find whether or not the following tasks can presently be solved by computers. Give proper reference to support your answer.

  Know the industry in which a company operates

Getting to know the industry in which a company operates is a critical factor for leveraging information systems and gaining a competitive advantage.

  What is the general solution to handle such game trees

The min max algorithm cannot handle some games (even-with alpha-beta pruning) because of the depth of the search trees involved. What is the general solution to handle such game trees?

  How many fragments are generated in link that has mtu

How many fragments are generated? What are values in the various fields in IP datagrams generated realted to fragmentaion?

  More registers appears to be a good thing

More registers appears to be a good thing, in terms of reducing the total number of memory accesses a program might require. Using the arithmetic expression S = (A+B)-(C+D)

  What is the standard iana-registered higher-level

How could you determine whether or not a TCP service is running at port 13 of a given Internet host? Test this for the host(s) assigned by your instructor. What is the standard IANA-registered higher-level protocol associated with this port?

  Write java method takes integer array and fills the array

Write a Java method which takes an integer array parameter and fills the array with random numbers between 1 and 1000, including 1 and 1000.

  Networks present of opportunities for security challenges

1. Networks present a lot of opportunities for security challenges. What type of network are you on, and what security elements are employed? Are they effective? Why or why not?

  Does the diagram meet all three levels of normalization

Does the diagram meet all three levels of normalization? (Patient: *PatientKey *Name *Address City State Zip) (Physician: *PhysicianKey *Name *Address City State Zip)

  Use the ribbon instead of toolbars and menus

"APA and the Office Ribbon". View the American Psychological Association (APA) style report (6th edition). Next, review the APA requirements. Then, explain what you believe to be the most challenging aspect of APA formatting.

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd