Describe the threats to its it data center infrastructure

Assignment Help Computer Engineering
Reference no: EM132300303

Assignment: Business Continuity and Disaster Recovery in Cloud Computing

In many organizations, the primary role of the IT staff is to ensure 99.999% availability of computing resource applications, power, files, networks, and phone systems to name a few.

In this assignment, imagine that you have been hired by the midsized, multinational, BIG-CLOUD company to create and graphically depict a cloud based business continuity plan (BCP) and disaster recovery plan (DRP). Your solution must include details on how the cloud solution of your choice will address three (3) or more high fault items such as user disk failure, server disk failure, network failure, database failure, phone system failure, server power failure, desktop power failure, fire, flood, and malware. (Use the template in Chapter 10 of the text as a reference for the BCP and DRP plan.) Fictitious assumptions and details may be assumed or created for the completion of this assignment.

Write a five to eight (5-8) page paper in which you:

1. Provide a brief background on the company that has hired you and describe its backup and recovery challenges.

2. Describe the threats to its IT data center infrastructure.

3. Create a BCP plan for the high fault items that are being addressed.

4. Create a DRP plan for the high fault items that are being addressed.

5. Create a section in your BCP that addresses the mitigation strategy of your cloud solution in regard to the high fault items listed in the scenario.

6. Create a section in your DRP that addresses the mitigation strategy of your cloud solution in regard to the high fault items listed in the scenario.

7. Discuss the amount of control your organization wants to retain over its data, in relation to moving information to a third party, and data leaving the country or region boundaries. Assume both situations are such that allows for a cloud-based backup solution.

8. Evaluate the pros and cons of your cloud-based backup solution with regards to your organization's requirements (i.e., flexibilities you gain versus absolute control you lose). Determine whether the pros outweigh the cons.

9. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Explain the security considerations in cloud-computing environments.

• Compare and contrast private with public clouds.

• Summarize business applications that can migrate to the cloud.

• Use technology and information resources to research issues in cloud computing environments.

• Write clearly and concisely about cloud & virtual computing topics using proper writing mechanics and technical style conventions.

Reference no: EM132300303

Questions Cloud

Describe the effectiveness of the agile methodology : Investigate recent professional or academic research regarding the effectiveness of the Agile methodology. Format your PowerPoint speaker notes according.
Analyze the complementary or discrete relationship : From the e-Activity, analyze the complementary or discrete relationship that cloud computing has with SOA. Examine the SaaS domain as it relates to SOA.
Evaluate the types of analytics you would use : Suppose that you are the CIO of a fairly new, large organization. Evaluate the types of analytics you would use in support of your SLA.
Dimension of setting up and facilitating virtual interaction : Our text states, "Virtual groups often require multiple leaders because of the added dimensions of setting up and facilitating virtual interaction,
Describe the threats to its it data center infrastructure : In this assignment, imagine that you have been hired by the midsized, multinational, BIG-CLOUD company to create and graphically depict a cloud based business.
Write the assignment on the company SINGTEL : BUS 14287 Nottingham University Business School. Write an assignment for the Strategic Management. You need to write the assignment on the company "SINGTEL"
Organization develop customer profitability analysis : Why would an organization develop a Customer Profitability Analysis?
Describe various risk factors or precursors : Adolescent pregnancy is viewed as a high-risk situation because it poses serious health risks for the mother and the baby. Describe various risk factors.
Create the need for organizational change : Discuss the external and internal forces that create the need for organizational change.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Identifying necessary entities based on the scenario

The Division maintains a list of authorized CE providers and the course-profession combinations the CE providers offer.

  Perform multiple die rolls using a random number generator

Write a program that performs multiple die rolls using a random number generator.

  Explain some of the different file permissions available

Write a 200- to 300-word response in which you provide and explain some of the different file permissions available within UNIX®.

  How many ways are there for her to distribute the points

How many ways are there for her to distribute the points if a particulat student, Amanda, gets no more than 10 points?

  Create modified versions of the stars program

Create modified versions of the Stars program to print the following patterns. Create a separate program to produce each pattern. Hint: Parts b, c, and d.

  Find all n prime numbers that are positive integers greater

How to write a java code that take a given number n , and finds all n prime numbers that are positive integers greater .

  Describe the purposes of domain analysis

Describe the purposes of domain analysis. Which UML (unified modeling language) diagrams are useful in scenario-based modeling?

  Write a program that plays the tic-tac-toe game

Write a program that plays the tic-tac-toe game. Two players take turns clicking an available cell in a 3 x 3 grid with their respective tokens .

  Electricity and magnieism state and explain ampere law

state and explain ampere law ? ltbrgtstate and explain biot savert law ? ltbrgtstate and explain ohm3939s law ?

  Describe the physical meaning of controllability

In order to effecte a complete controller design, a system must be controllable. Describe the physical meaning of controllability.

  How many block frames are there in the cache

How many block frames are there in the cache? Explain the bit fields needed for addressing each word in the two-level memory system.

  What is cybersecurity threat

What is Cybersecurity threat? Why we need to implement methods and procedures to protect our personal information from Cyber-attacks?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd