Activities the overhead of using the services

Assignment Help Basic Computer Science
Reference no: EM13141287

you need to write a single report not more than 20 pages in the body. Read the section describing the formatting requirements for the assignment carefully. 
Report: Security in Mobile Systems, Virtualization and Clouds 
Our organisation, after implementing mobile services has discovered that a lot of the expected benefits have not been achieved. While the staff agree and can see how the new untethered access to business data and services can help in their day to day activities the overhead of using the services due to authentication has made the system poorly accepted. 
The security mechanism was imposed to limit the likelihood of having long term connections from external partners which may be abused by external entities. The organisation has a large number of external business partners who regularly connect to the organisation resources as part of cooperative business processes. 
After the appointment of an external consultant specialising in dealing with user productivity and business network design a number of problems were highlighted. 
Firstly, the system was designed so that the security management was pushed onto the mobile devices making the use of the service disruptive to the users. The accessing of different services while using mobile devices required a separate login in to each service. Not only that, but prolonged inactivity would shut down the connection to the mobile device requiring a twostep process to re-establish a connection to the device then reconnection to the service. 
Secondly, to implement the new network design making the data more accessible from various parts of the network resulted in explosion in the number of duplicated physical servers on the system. Most of the time the servers are idle in anticipation of work being allocated to them from a user connection. The extra servers resulted as an expense in purchasing setting up and maintaining the servers for day to day operations. The number of IT staff has doubled since the introduction of the new design just to be able to maintain all the services and keep the systems functioning. 
The consultation report suggested that more cost effective alternatives may be to either virtualize the servers or move the services to an appropriate cloud. Once the design has been decided we could solve the multiple log on requirements with the adoption of a single sign on solution. 
These approaches and technologies are new to the organisation. The IT department grew up on the need to provide services as they are needed and not a long term strategic planning for future needs. As a result you have been tasked with writing a report to explain and explore the following technology and services: 
a) Investigate and report on types of virtualizations and benefits to their adoption in an organisation? How will the technological adoption help resolve some of the issues with the current network solution? 
b) The world is currently abuzz with cloud services. Investigate and report what cloud services are, what kind of cloud services is there and what is the benefit of the different type of services? 
c) The report lists the adoption of a single sign on process as a part of the solution. Investigate and report what are single sign on solutions and how do single sign on services work? 
d) One of the reasons for original security design was the external connections with our partners. It was recommended that they should consider a VPN solution for external connections. Investigate and report the on types of VPNs, working and functionality of VPN and how they would help with the security requirements for external partner access. 
e) Seeing that we have two options as a possible solution to our current design (virtualization and cloud services) which solution would you recommend that they adopt? Justify your recommendations. 
Please read the next section very carefully. 
Format for Assignment 3 
Your report MUST follow the structure for a report as specified in the Faculty of Business Communications skills handbook, however, you will not be required to submit the following sections: Glossary, or Appendices. You may want to consider the structure of the marking scheme when structuring the body of your report. 
Your report must include references where you have used other sources (both in the body text and listed at the end of the report) as specified in the Communication skills handbook. For current reference style guide please refer to the document online at https://www.usq.edu.au/library/help/referencing/harvard. Work submitted with no references in the body of the report will NOT be accepted. 
Your report must be printed with 1.5 line spacing; at least 12-point font size; and the body of the report should be no more than 20 pages of single-sided A4 paper. Penalty will apply for exceeding the page limit. 
Assignments not following the report style will be heavily penalised. 
WIKIPEDIA is not considered a suitable reference source and its use in referencing is strongly discouraged. You should not have it as a reference in the assignment. 
The assignment is to be submitted using the EASE system which will be made available for that purpose a week before the due date. 

Reference no: EM13141287

Questions Cloud

Prepare a use case : Prepare a Use Case intermediate description for the office clerk 'Creates Shareholder' use case, as documented in the event table solution and the use case diagram solution.
Answer for the case study of employee benefits : answer for the case study of employee benefits at healthco from cummings and worley.
What are the chances that their children will have freckles : Freckles are an autosomal dominant trait. A woman with freckles ( Ff ) marries a man without freckles. What are the chances that their children will have freckles?
Write about black decker company : write about black Decker company and any major initiatives they have planned
Activities the overhead of using the services : While the staff agree and can see how the new untethered access to business data and services can help in their day to day activities the overhead of using the services due to authentication has made the system poorly accepted.
What elese can be done to incrase or decrease the chances : Environments factors such as low folic acid, low vit b6, b12, inositol, metthionine and high homocysteine increases risk for NTCD. cysteine reduction in diets helps prevention also. What elese can be done to incrase or decrease the chances of a mo..
What is the best age for women to have a baby : what is the best age for women to have a baby contrary to 21-35. Please provide evidence of source.
Compare and contrast the processes of replication : Compare and contrast the processes of replication and transcription. Be sure o include in the discussion a comparison of the purpose of the processes, the templates used in each process, when each process occurs, and the initiation and termination..
Paper on green house effect and global warming : Write a 3 page MLA FORMAT paper on Green House Effect and Global Warming .

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Executing critical section in mutual exclusion protocol

In Lamport's mutual exclusion protocol, if process i is implementing critical section.

  Describe operational-tactical and strategic reporting

Describe operational, tactical and strategic reporting. How do requirements drive reporting system inputs requirements and write down the ramifications of ignoring user requirements.

  Computing characters are there in encyclopedia

The text of the Encyclopedia Britannica is about 44 million words. For a sample of about 2000 words, the average word length was 6.1 characters per word. Approximately how many characters are there in the encyclopedia?

  Minimum-spanning-tree problem for lp formulation

The minimum-spanning-tree problem is to find an acyclic subset T + E that connects all of the vertices and whose total weight c(T ) = ce is minimized. Write down the dual of your LP formulation.

  Managing cyber crime to protect business

Provide a scenario of a cyber crime by way of example that will demonstrate to your business a situation that might occur.

  The authentication process in a synchronous token system

Describe how the Kerberos authentication process work and outline the main components within the Kerberos environment, their respective functions and the level of security provided by Kerberos. Draw a diagram supporting your explanation Explain..

  Evaluate for risk management purposes

Choose three information assets that a typical organization has and evaluate for risk management purposes which vulnerability should be evaluated for additional controls first?

  Importance of top management commitment

Discuss the importance of top management commitment and the development of standards for successful project management. Provide examples to illustrate the importance of these items.

  Perform a web search on it outsourcing and their result

Perform a web search on IT outsourcing and review the results. Select any two IT outsourcing companies and analyze their services, clients, and capabilities.

  Explain benefits of a global market

What are some of the benefits of a global market and why? List at least 2 benefits, weighing any short-term and long-term impacts.

  Describe areas where you disagreement between sources

IT engagement model and management. Include any information you believe adds to the material in the text. Describe any areas where you see disagreement between the sources.

  Structured english for clyde-s narrative of reimbursement

On trip lasting more than one day, we permit hotel, taxi, and airfare, also meal allowances. Same times apply for meal expenses." Write structured English for Clyde's narrative of reimbursement policies.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd