What the risks and issues associated with backing up data

Assignment Help Computer Network Security
Reference no: EM131654283 , Length: word count:1500

Assessment - Security Management and Migration

Task - Webb's Stores is a successful regional retailer that operates stores in Australia and also in New Zealand. Webb's sell a range of food stuffs as well as some speciality items. The company has two main data centres, one located in Sydney and the other in Melbourne. It also has a number of regional data centres located in Wagga, Bathurst, Port Macquarie, Brisbane and Auckland in New Zealand.

Webb's Stores has engaged you as a consultant to advise them on the use of Cloud Computing in their daily operations. They have some 600 sales staff that work in their stores and 200 staff that work in their two main warehouses in Sydney and Melbourne. Webb's have been facing increasing issues with application and operational complexity and the management of their data. They have been advised that a move to using a Cloud based infrastructure would be an advantage to them.

Webb's are considering the following:

  • They are considering a plan to close their Auckland data centre rather than update or replace the older infrastructure. The existing data and services in that data centre would be moved to the Cloud. If this migration is successful, then this could be a first step in the eventual migration of all Webb's services to the cloud.
  • They are concerned at the increasing costs of LTO 6 tapes that are being used for their backup of mission critical data. They are also concerned at the cost of off-site storage of these tapes, but they are really concerned at the time it is taking to complete a full backup of their databases and other critical data.

Webb's Board is contemplating this strategy as a way to increase the company's flexibility and responsiveness. The Board also expects to achieve significant savings on the cost of maintaining their ICT infrastructure by closing their Auckland data centre. This would entail retiring the infrastructure in that data centre rather than having to update it.

Webb's has again approached you to advise them on this strategy. You have already advised Webb's that this strategic approach will mean that they will need to design and operate a "Hybrid Cloud" methodology, where part of their data centre is "on premise" and another part in a Cloud.

Webb's also plan to run a Risk and Security Workshop to assess the risks, security issues and possible methods of control that will be required with this "Hybrid Cloud" approach. You will be required to organise, run and facilitate this workshop.

The Board is also concerned about how this strategy will affect their BCP (Business Continuity Plan) and their backup and disaster recovery strategies.

Your task is to prepare a report for Webb's Board that discusses the following:

1. Webb's have decided to migrate their MS SQL Server 2012 R2 database to an laaS instance in the cloud.

a. Describe the type of security that you would deploy to protect this mission critical database once it is moved to an laaS instance in a public cloud.

b. Describe the benefits and issues that would be the result of your deployment of these security measures.

2. What are the risks associated with migrating this mission critical database to the cloud? You should name and describe each risk that you identify that applies to:

a. The database

b. The laaS infrastructure

c. The communications between Webb's and their laaS database in the cloud

3. Webb's is considering the use of the Cloud for backup and possibly also for archival of records.

a. What are the risks and issues associated with backing up data to the cloud? You should name and describe each risk that you identify that applies to:

i. Backing up data to the Cloud

ii. Storage of data in the Cloud

iii. Retrieval of data from the cloud.

b. How does Webb's use of a Cloud backup affect their DR plans? Describe how you see that their backup and restore strategy will change as a result of this service.

4. How should Webb's protect access to these services that they are now moving to the Cloud? Describe what you would recommend to Webb's Board to protect access to:

a. Their laaS infrastructure,

b. Their Ms SQL Server 2012 R2 cloud instance,

c. Their Cloud network infrastructure

d. Their Cloud backup and restore infrastructure

Rationale - This assessment will cover the following objectives:

  • Be able to compare and evaluate the ability of different Cloud Computing Architectures to meet a set of given business requirements;
  • Be able to evaluate a set of business requirements to determine suitability for a Cloud Computing delivery model;
  • Be able to evaluate and design an ICT Risk Management strategy for a Cloud Computing Delivery plan to meet business requirements;
  • Be able to interpret, evaluate and plan the Governance and Security requirements for a Cloud Computing delivery plan;
  • Be able to analyse and evaluate business requirements to plan a migration to a Cloud model;

Reference no: EM131654283

Questions Cloud

Company annual performance appraisal : Aside from the company's annual performance appraisal, when should you give feedback and coaching to employees? How should you introduce such encounters?
Discuss a the growth of computer usage : The growth of computer usage over the years and our growing dependance on them
The impact of freed slaves in the north : Why were there significant fears about the impact of freed slaves in the North? Who had the most to win/lose?
Would you suggest a change in the test procedure : On the basis of your calculation in part a, would you suggest a change in the test procedure? Explain what change you would make and the reasons.
What the risks and issues associated with backing up data : What are the risks and issues associated with backing up data to the cloud? How should Webb's protect access to these services that they are now moving to Cloud
Attributed to the failure of new coke : What were some of the marketing reasons that could have attributed to the failure of New Coke.
How the two films show american culture : What I'd like you to write is your thesis statement that talks about how the two films show American culture as supported by (2-3) elements of film.
What were the key leadership challenges for this project : Critically analyse challenges that a project leader may meet while running a project - identify specific challenges and possible recommendations before starting
Show proficiency of computer software packages : The college of business at a state university has a computer literacy requirement for all graduates. Students must show proficiency with a computer spreadsheet.

Reviews

len1654283

9/23/2017 1:09:56 AM

Australian student, total 1500 words. Information security - Clear comprehensive assessment of InfoSec issues. critical points identified and discussed. Migration Risk Management – Clear, comprehensive description of Risk Management issues, critical points identified & discussed. Backup Risk Management - Clear, comprehensive description of backup and DR plan. all critical points identified & discussed. Access Management - Clear and comprehensive description of protecting laaS infrastructure, server and backup and restore infrastructure. and all critical points identified & discussed.

len1654283

9/23/2017 1:09:47 AM

Presentation (Communicate in a professional manner), Grammar & Referencing - Up to 5 marks may following the proper APA 6th edition style of referencing. Presentation - Your report MUST be presented in MS Word format. Your assessment must be submitted electronically and should: Have a cover page including: Assessment No & Assessment Title, Student Name, ID & Student Email.

len1654283

9/23/2017 1:09:41 AM

The assessment should also include at least the following sections: Executive Summary - this section should contain a brief summary about the contents of the report. This section should be a maximum of one A4 size page. Main Body of the report - Use this section to answer all the questions in Pad I and Pad II. All tasks should be clearly identified with headings. References - must be in APA style both in-text and at the end of the assessment document.

Write a Review

Computer Network Security Questions & Answers

  Name and explain 4 key security tips you would share with

question 1 name and describe 4 key security tips you would share with your coworkers to keep their data safe their

  How to cracking passwords without salt

Cracking Passwords with Salt on Linux.  Recently, an associate of yours got access to an Ubuntu Linux server. You  suspect users of this system (UST students) have a strong tendency to use the same passwords for everything (including their online..

  Problems of hacking

Question 1: Describe what hacking of memory or hacking of RAM means. Question 2: Examine the common tools that hackers use to hack into memory of computing devices. Detail two (2) real-life examples of such tools in action.

  Information security for document management systems

The system is authenticated by using our LDAP accounts. Each employee is assigned to a security group but the documentation is manually entered into the proper category because we rely on the employee to assign the group we are at risk of confide..

  Greatest it security concern facing businesses today

Give your opinion on what you believe to be the greatest IT security concern facing businesses today and explain the main reason(s) why you believe such is the case

  How can the computer system described in the story

Identify your actants, and categorise their scale, i.e. digital, software, hardware, human, cultural, structural - describe and analyse how some of these actants are acting on each other

  Research the possible ways of creating such a cctv system

MN603 Wireless Networks and Security Assignment. Research the possible ways of creating such a CCTV system for the above Case study to help Raju out. Which way would be the best possible approach. Justify your answer

  Academic method to project management

Sunnyville Corporation is in the business of selling home appliances. Sunnyville Corporation  has over 50 sales agents across the country. The management at Sunnyville Corporation has decided to implement an online sales program.

  Identify and explain how the breach occurred

Identify the type of breach and identify and explain how the breach occurred (or suspicions by authorities as to how it may have occurred)

  It infrastructure groups

Information Technology infrastructure groups are often responsible for direct customer interaction and associated customer service.

  Create random secret one-time pad key ka and xors

Creates random secret one-time pad key KA and XORs it with K. She sends M1 = KA K to Bob. Bob creates random secret one-time pad key KB, XORs what he gets with it to compute M2 = M1 KB.

  How security can be configured and provide configuration

Describe how the security can be configured, and provide configuration examples (such as screen-shots and configuration files). Marks are based on demonstrating technical detail and understanding, and choice of examples.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd