What the risks and issues associated with backing up data

Assignment Help Computer Network Security
Reference no: EM131654283 , Length: word count:1500

Assessment - Security Management and Migration

Task - Webb's Stores is a successful regional retailer that operates stores in Australia and also in New Zealand. Webb's sell a range of food stuffs as well as some speciality items. The company has two main data centres, one located in Sydney and the other in Melbourne. It also has a number of regional data centres located in Wagga, Bathurst, Port Macquarie, Brisbane and Auckland in New Zealand.

Webb's Stores has engaged you as a consultant to advise them on the use of Cloud Computing in their daily operations. They have some 600 sales staff that work in their stores and 200 staff that work in their two main warehouses in Sydney and Melbourne. Webb's have been facing increasing issues with application and operational complexity and the management of their data. They have been advised that a move to using a Cloud based infrastructure would be an advantage to them.

Webb's are considering the following:

  • They are considering a plan to close their Auckland data centre rather than update or replace the older infrastructure. The existing data and services in that data centre would be moved to the Cloud. If this migration is successful, then this could be a first step in the eventual migration of all Webb's services to the cloud.
  • They are concerned at the increasing costs of LTO 6 tapes that are being used for their backup of mission critical data. They are also concerned at the cost of off-site storage of these tapes, but they are really concerned at the time it is taking to complete a full backup of their databases and other critical data.

Webb's Board is contemplating this strategy as a way to increase the company's flexibility and responsiveness. The Board also expects to achieve significant savings on the cost of maintaining their ICT infrastructure by closing their Auckland data centre. This would entail retiring the infrastructure in that data centre rather than having to update it.

Webb's has again approached you to advise them on this strategy. You have already advised Webb's that this strategic approach will mean that they will need to design and operate a "Hybrid Cloud" methodology, where part of their data centre is "on premise" and another part in a Cloud.

Webb's also plan to run a Risk and Security Workshop to assess the risks, security issues and possible methods of control that will be required with this "Hybrid Cloud" approach. You will be required to organise, run and facilitate this workshop.

The Board is also concerned about how this strategy will affect their BCP (Business Continuity Plan) and their backup and disaster recovery strategies.

Your task is to prepare a report for Webb's Board that discusses the following:

1. Webb's have decided to migrate their MS SQL Server 2012 R2 database to an laaS instance in the cloud.

a. Describe the type of security that you would deploy to protect this mission critical database once it is moved to an laaS instance in a public cloud.

b. Describe the benefits and issues that would be the result of your deployment of these security measures.

2. What are the risks associated with migrating this mission critical database to the cloud? You should name and describe each risk that you identify that applies to:

a. The database

b. The laaS infrastructure

c. The communications between Webb's and their laaS database in the cloud

3. Webb's is considering the use of the Cloud for backup and possibly also for archival of records.

a. What are the risks and issues associated with backing up data to the cloud? You should name and describe each risk that you identify that applies to:

i. Backing up data to the Cloud

ii. Storage of data in the Cloud

iii. Retrieval of data from the cloud.

b. How does Webb's use of a Cloud backup affect their DR plans? Describe how you see that their backup and restore strategy will change as a result of this service.

4. How should Webb's protect access to these services that they are now moving to the Cloud? Describe what you would recommend to Webb's Board to protect access to:

a. Their laaS infrastructure,

b. Their Ms SQL Server 2012 R2 cloud instance,

c. Their Cloud network infrastructure

d. Their Cloud backup and restore infrastructure

Rationale - This assessment will cover the following objectives:

  • Be able to compare and evaluate the ability of different Cloud Computing Architectures to meet a set of given business requirements;
  • Be able to evaluate a set of business requirements to determine suitability for a Cloud Computing delivery model;
  • Be able to evaluate and design an ICT Risk Management strategy for a Cloud Computing Delivery plan to meet business requirements;
  • Be able to interpret, evaluate and plan the Governance and Security requirements for a Cloud Computing delivery plan;
  • Be able to analyse and evaluate business requirements to plan a migration to a Cloud model;

Reference no: EM131654283

Questions Cloud

Company annual performance appraisal : Aside from the company's annual performance appraisal, when should you give feedback and coaching to employees? How should you introduce such encounters?
Discuss a the growth of computer usage : The growth of computer usage over the years and our growing dependance on them
The impact of freed slaves in the north : Why were there significant fears about the impact of freed slaves in the North? Who had the most to win/lose?
Would you suggest a change in the test procedure : On the basis of your calculation in part a, would you suggest a change in the test procedure? Explain what change you would make and the reasons.
What the risks and issues associated with backing up data : What are the risks and issues associated with backing up data to the cloud? How should Webb's protect access to these services that they are now moving to Cloud
Attributed to the failure of new coke : What were some of the marketing reasons that could have attributed to the failure of New Coke.
How the two films show american culture : What I'd like you to write is your thesis statement that talks about how the two films show American culture as supported by (2-3) elements of film.
What were the key leadership challenges for this project : Critically analyse challenges that a project leader may meet while running a project - identify specific challenges and possible recommendations before starting
Show proficiency of computer software packages : The college of business at a state university has a computer literacy requirement for all graduates. Students must show proficiency with a computer spreadsheet.

Reviews

len1654283

9/23/2017 1:09:56 AM

Australian student, total 1500 words. Information security - Clear comprehensive assessment of InfoSec issues. critical points identified and discussed. Migration Risk Management – Clear, comprehensive description of Risk Management issues, critical points identified & discussed. Backup Risk Management - Clear, comprehensive description of backup and DR plan. all critical points identified & discussed. Access Management - Clear and comprehensive description of protecting laaS infrastructure, server and backup and restore infrastructure. and all critical points identified & discussed.

len1654283

9/23/2017 1:09:47 AM

Presentation (Communicate in a professional manner), Grammar & Referencing - Up to 5 marks may following the proper APA 6th edition style of referencing. Presentation - Your report MUST be presented in MS Word format. Your assessment must be submitted electronically and should: Have a cover page including: Assessment No & Assessment Title, Student Name, ID & Student Email.

len1654283

9/23/2017 1:09:41 AM

The assessment should also include at least the following sections: Executive Summary - this section should contain a brief summary about the contents of the report. This section should be a maximum of one A4 size page. Main Body of the report - Use this section to answer all the questions in Pad I and Pad II. All tasks should be clearly identified with headings. References - must be in APA style both in-text and at the end of the assessment document.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd