Reference no: EM133054180
MCB002 Cloud Computing - York St John University
Learning outcome 1: Design requirements
Learning outcome 2: Security in the Cloud
Learning outcome 3: Cloud Application Security
Learning outcome 4: Legal and Compliance.
Assignment Description
Question 1
Q1. A business Impact Analysis and Risk Management worksheet has been attached to this assignment.
Q2. Choose a department/function within an organisation.
Q3. Identify five (5) hypothetical risk/threats to use in this question; this might a malicious attack such as a malware, a natural disaster such as earthquake or anything else.
Q4. Fill out the form using the business function and risk/threat, using information as accurately and realistically as possible
Question 2
Q1. identify two cloud providers online. Summarise their posted policies regarding real-time or regular full backup, particularly in the context of BC/DR (Business Continuity/Disaster Recovery)
Q2. Compare and contrast in a table the two offerings, specially discussing how each deal with bandwidth for backups, pricing structure, and their suitability, for data portability to other cloud providers.
Question 3
Q1. Identify one cloud application you use and identify one API in use. This could be internal or a third- party API. Describe its functionality.
Q2. Describe the similarities and difference between the cloud software development lifecycle and any other model (just one model).
Q3. Identify and describe two components of the cloud application architecture.
Q4. Describe the functions of an identity management solution in the cloud environment.
Question 4
Q1. What are HIPAA rules and why are they different?
Q2. Describe the primary differences in a table between an SOC1, SOC2 and a SOC 3 report
Q3. Describe the primary difference between risk appetite and risk tolerance
Attachment:- Cloud-Computing-Assignment.rar