Risks and issues associated with backing up data to cloud

Assignment Help Computer Network Security
Reference no: EM131655818

Question:

Webb's Stores is a successful regional retailer that operates stores in Australia and also in New Zealand. Webb's sell a range of food stuffs as well as some speciality items. The company has two main data centres, one located in Sydney and the other in Melbourne. It also has a number of regional data centres located in Wagga, Bathurst, Port Macquarie, Brisbane and Auckland in New Zealand.

Webb's Stores has engaged you as a consultant to advise them on the use of Cloud Computing in their daily operations. They have some 600 sales staff that work in their stores and 200 staff that work in their two main warehouses in Sydney and Melbourne. Webb's have been facing increasing issues with application and operational complexity and the management of their data. They have been advised that a move to using a Cloud based infrastructure would be an advantage to them.

Webb's are considering the following:

They are considering a plan to close their Auckland data centre rather than update or replace the older infrastructure. The existing data and services in that data centre would be moved to the Cloud. If this migration is successful, then this could be a first step in the eventual migration of all Webb's services to the cloud.

They are concerned at the increasing costs of LTO 6 tapes that are being used for their backup of mission critical data. They are also concerned at the cost of off-site storage of these tapes, but they are really concerned at the time it is taking to complete a full backup of their databases and other critical data.

Webb's Board is contemplating this strategy as a way to increase the company's flexibility and responsiveness. The Board also expects to achieve significant savings on the cost of maintaining their ICT infrastructure by closing their Auckland data centre. This would entail retiring the infrastructure in that data centre rather than having to update it.

Webb's has again approached you to advise them on this strategy. You have already advised Webb's that this strategic approach will mean that they will need to design and operate a "Hybrid Cloud" methodology, where part of their data centre is "on premise" and another part in a Cloud. Webb's also plan to run a Risk and Security Workshop to assess the risks, security issues and possible methods of control that will be required with this "Hybrid Cloud" approach. You will be required to organise, run and facilitate this workshop.

The Board is also concerned about how this strategy will affect their BCP (Business Continuity Plan) and their backup and disaster recovery strategies.

Your task is to prepare a report for Webb's Board that discusses the following:

1. Webb's have decided to migrate their MS SQL Server 2012 R2 database to an IaaS instance in the cloud.

a. Describe the type of security that you would deploy to protect this mission critical database once it is moved to an IaaS instance in a public cloud.

b. Describe the benefits and issues that would be the result of your deployment of these security measures.

2. What are the risks associated with migrating this mission critical database to the cloud? You should name and describe each risk that you identify that applies to:

a. The database

b. The IaaS infrastructure

c. The communications between Webb's and their IaaS database in the cloud

3. Webb's is considering the use of the Cloud for backup and possibly also for archival of records.

a. What are the risks and issues associated with backing up data to the cloud? You should name and describe each risk that you identify that applies to:

i. Backing up data to the Cloud

ii. Storage of data in the Cloud
iii. Retrieval of data from the cloud.

b. How does Webb's use of a Cloud backup affect their DR plans? Describe how you see that their backup and restore strategy will change as a result of this service.

4. How should Webb's protect access to these services that they are now moving to the Cloud?
Describe what you would recommend to Webb's Board to protect access to:

a. Their IaaS infrastructure,

b. Their Ms SQL Server 2012 R2 cloud instance,

c. Their Cloud network infrastructure

d. Their Cloud backup and restore infrastructure

Rationale

This assessment will cover the following objectives:

Be able to compare and evaluate the ability of different Cloud Computing Architectures to meet a set of given business requirements;

Be able to evaluate a set of business requirements to determine suitability for a Cloud Computing delivery model;

Be able to evaluate and design an ICT Risk Management strategy for a Cloud Computing Delivery plan to meet business requirements;

Be able to interpret, evaluate and plan the Governance and Security requirements for a Cloud Computing delivery plan;

Be able to analyse and evaluate business requirements to plan a migration to a Cloud model;

Reference no: EM131655818

Questions Cloud

What are style sheets : 1. What are style sheets? Explain the function of styles.
Discuss improvements for provides and health care plans : What thoughts do you have on improvements for provides and health care plans
Differences between an excel worksheet and a workbook : 1. Explain the differences between an Excel worksheet and a workbook.
Discuss committees and legislative commitments : federal legislators and explore their assigned committees and legislative commitments
Risks and issues associated with backing up data to cloud : Describe the type of security that you would deploy to protect this mission critical database once it is moved to an IaaS instance in a public cloud
Target market was middle aged women : Suppose you worked at McDonald's and your target market was middle aged women.
The neurobiological basis for the disorder : Explain the symptoms, how the diagnosis is made (e.g., findings on brain imaging, laboratory testing, etc.), the neurobiological basis for the disorder.
What are the different types of fractures : What are the risk factors for osteoporosis, What diagnostic study will you expect the health care provider to order for osteoporosis
How accessible are the primary destination within community : How accessible are the primary destination within or near the community? How does the network design differ if at all for auto, ped, bike, transit?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Differences between symmetric and asymmetric encryption

Describe the differences between symmetric and asymmetric encryption. Describe the common uses of the aforementioned selected cryptographic system.

  How clark -wilson model is implemented on computer system

Assume that the Clark -Wilson model is implemented on a computer system. Could a computer virus that scrambled constrained data items be introduced into the system?

  Evaluate the challenges and security risk

What methodology will you be following to realise your artefact? Describe approach that will be employed to develop your project artefact

  Analyze the characteristics of wireless lans

Analyze the characteristics of wireless LANs

  Suggest mitigation strategies for vulnerabilities identified

Risk Management varies in each instance and event. Selecting the various options from home or work may help make or break your network.

  Inherent flaws in the department of homeland securitys

In your opinion, what are the inherent flaws in the Department of Homeland Security's Blueprint for a Secure Cyber Future? Explain your answer

  Write the word statistic without the repeated letters

Write the word "statistic" without the repeated letters. Then complete the cipher with the unused alphabet characters. In this case, the message HELLO becomes ECJJM.

  Evaluate and summarize each given security model

Evaluate and summarize each Security Model listed below from the CISSP Exam Guide. A brief one paragraph summary per Security Model will suffice.

  Draw a concept map or annotated attack tree

CSI2102- Information Security. Task: Utilising the background information, draw a concept map or annotated attack tree which represents the context of John Kleen Communication & Media Ltd's work environment and also demonstrates: the links the data..

  Determine changes to existing security policies

Determine changes to existing security policies needed to make the NVCC bookstore Web site more secure.

  How many bits is the encrypted message

How many bits is the encrypted message - find the corresponding code for the first letter of your first name, add 1 to the left position of the most significant bit

  Show strategies to prevent such cyber warfare attack

Need a 1000 word paper on the various recent/news on the United States (particular the group known as Anonymous and Lulzsec). Also need the various strategies to prevent such cyber warfare attacks and prevention techniques.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd