Prepare a report for softarc engineering

Assignment Help Computer Network Security
Reference no: EM131505532 , Length: 13

Security Management and Migration

Task

SoftArc Engineering Ltd is a civil engineering company which works across Australia as well as in Indonesia, Timor-Leste and Papua New Guinea. The company is considering the following strategic proposal:

- They plan to close down the Brisbane data centre rather than update or replace the older infrastructure. The existing data and services in that data centre would be moved to the Sydney data centre, which has the most up to date infrastructure, as well as capacity to expand.

- They plan to move all their Web Services into the Cloud in order to provide an increased level of HA (High Availability) as well as a better degree of flexibility in supplying data to their customers and employees.

- They also plan to use the Cloud Infrastructure to increase flexibility and availability for some of the LoB (Line of Business) applications that will continue to run on their own internal infrastructure. However, they are hoping to take advantage of the Cloud infrastructure to help manage and balance demand on internal resource use.

The Board of SoftArc Engineering is contemplating this strategy as a way to increase the company's flexibility and responsiveness, particularly for its remote area and overseas operations. The Board also expects to achieve significant savings on the cost of maintaining their ICT infrastructure by closing the oldest existing data centre. This would entail retiring the infrastructure in that data centre rather than having to update it.

SoftArc Engineering has again approached you to advise them on this strategy. You have already advised SoftArc Engineering that this strategic approach will mean that they will need to design and operate a "Hybrid Cloud" methodology, where part of their data centre is "on premise" and another part in a Cloud.

SoftArc Engineering also plan to run a Risk and Security Workshop to assess the risks, security issues and possible methods of control that will be required with this "Hybrid Cloud" approach. You will be required to organise, run and facilitate this workshop.

The Board is also concerned about how this strategy will affect their BCP (Business Continuity Plan) and their backup and disaster recovery strategies.

Your task is to prepare a report for SoftArc Engineering that discusses the following:

1. Describe which Cloud architectures you would employ to assist SoftArc Engineering meet the Board's strategy?

    1. Describe each of the architectures that you would use, along with your reasons for deploying it.

     2. Describe the benefits and issues that would be the result of your deployment of these architectures.

2. Describe the risks that you see associated with this new Hybrid Cloud strategy. You should name and describe each risk that you identify, and then describe a possible control for the risk. This may be presented in a tabular form.

3. Describe the general Information Security steps and controls that you would recommend to the Board to secure the Hybrid Cloud. You will need to explain to the Board your reasons for recommending these particular security steps.

4. Discuss briefly what you would recommend should be included in SoftArc Engineering's BCP as a result of their adoption of a Hybrid Cloud approach. You will need to consider, as a minimum, the issues of application resilience, backup and disaster recovery in a Hybrid Cloud environment. This section should be no more than 2 pages.

5. Discuss the requirements that SoftArc Engineering will need to consider in order to conduct remote server administration, resource management and SLA management for it's proposed IaaS and PaaS instances.(it may be useful to consider Morad and Dalbhanjan's operational checklists for this section). This section should be no more than two to three pages in length.

6. The SoftArc Engineering board has decided, as an initial step, to move their SharePoint instance and their SQL Server 2012 Database servers to the AWS cloud in order to begin the migration process, and test their strategy.

    1. Describe the steps that you would include in the plan to migrate these services.

    2. What are the critical points and issues that you see occurring at each of these steps? Explain why you see these points or issues as critical.

Rationale
This assessment will cover the following objectives:
- Be able to compare and evaluate the ability of different Cloud Computing Architectures to meet a set of given business requirements;
- Be able to evaluate a set of business requirements to determine suitability for a Cloud Computing delivery model;
- Be able to evaluate and design an ICT Risk Management strategy for a Cloud Computing Delivery plan to meet business requirements;
- Be able to interpret, evaluate and plan the Governance and Security requirements for a Cloud Computing delivery plan;
- Be able to analyse and evaluate business requirements to plan a migration to a Cloud model;

Reference no: EM131505532

Questions Cloud

Effective or ineffective early risk identification : To what extent do you think is it possible to identify risks associated with the project early in the project''s life span?
What should a husband and wife be like : Think for a moment about the role of a husband and the role of a wife. What should a husband and wife be like
What is the estimated cost of the new laboratory : A biotech firm is considering abandoning its old plant, built 23 years ago, and constructing a new facility that has 50% more square footage.
Describe your own personal relationship to politics in us : Describe your own personal relationship to politics in the US. Over the course of our study this semester, has anything about that changed?
Prepare a report for softarc engineering : Describe each of the architectures that you would use, along with your reasons for deploying it - Discuss the requirements that SoftArc Engineering
What is your estimate of the cumulative average hours : The structural engineering design section within the engineering department of a regional electrical utility corporation has developed several standard designs.
Describe the duties of each major head within organization : Describe the duties of each major head within the organization. Provide a rationale for the development of your particular mission and value statement.
What do you think about the higher diagnoses of anxiety : What do you think about the higher diagnoses of anxiety in women? Why do you think that women are more prone to anxiety than men
Estimate the overhead costs for the first month of program : The overhead costs for a company are presently $X per month. The management team of the company, in cooperation with the employees.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Evaluate and select a security tool for recommendation

The purpose of project is to write an executive proposal for a fictitious company called Advanced Research Corporation. Evaluate and select a security tool for recommendation from the provided list of tools.

  How to form the trojan integrated cirucit

How to form the trojan integrated cirucit and what are the tools are used to simulate the ciruit to our system and how to pass it as input to the clustering algorithm to get the output

  Explain the organizational authentication technology

Identify and describe the organizational authentication technology and network security issues and make a list of access points internal and external (remote) and design a secure authentication technology and network security for GFI.

  Explain the following in terms of ict - worms and malware

In about 300 words, explain the following in terms of ICT - Worms and Malware

  How did the attacker gain access to the system

How did the attacker gain access to the system? Provide as much detail as possible about the attack, the tool used, etc. What IP address or addresses did the attacker use?

  How can rfid works in construction company

How can RFID works in construction company, take one construction company as an example and write how RFID functions in it, i dont want you to explain each and every standard.

  Find out the modification made to the excel spreadsheet

A dissatisfied employee that is planning to leave an organization decides to delete a file from the server. He then copied an Excel Spreadsheet into another file, modifies the new file and deletes the old file.

  Use private key to decrypt the cipher text

Using blocks of 4 encrypt the message I AM AN MSC STUDENT MAJORING IN SECURITY using the public key above. Similarly use the private key above to decrypt the cipher text.

  Computer security for your company

Present a brief summary of the arguments for and against outsourcing computer security for your company. Select two firms that offer computer security outsourcing services, and compare them and their services. Include several pros and cons of each

  Redesign the university ip addressing space

Redesign the University IP addressing space. The University owns 2 x Class B (144.149.0.0 and 131.172.0.0) IPv4 Public IP addressing space and also utilizes IPv4 Private IP addresses

  Search the internet for one instance of a security breach

search the internet for one instance of a security breach that occurred for each of the four best practices of access

  Explain the major steps needed to preserve the integrity

Analyze the overall procedures for First Responder and Incident Handling, and ascertain the fundamental way in which such procedures relate to the scenario in this specific case.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd