Develop an ongoing performance measurement

Assignment Help Computer Networking
Reference no: EM132344422

Practical Task

For this task you will be required to manage the security, privacy and compliance of a cloud service, and will require access to the following:

• The cloud information and communications technology (ICT) business specifications
• The cloud ICT security assurance specifications
• Management-related scenarios
• A cloud-focused security environment, including threats to security that are, or are held to be, present in the environment
• Information on the security environment, including:
o Laws or legislation
o Existing enterprise security policies
o Enterprise expertise
• Risk analysis tools and methodologies currently used in industry.

To demonstrate that you can effectively manage the security, privacy and compliance of a workplace cloud service, you will need to demonstrate how you:

1. Identify, document and discuss the cloud security issues, including both the business and commercial issues, that relate to the types of delivery and deployment models relevant to your workplace. (discuss this with your assessor)

2. Determine the specific enterprise areas of security responsibility and conduct some research into the relevant security controls and measures for each identified area.

3. Implement the most relevant security controls and measures identified.

4. Identify and document the compliance regulations that are relevant to data storage in your workplace.

5. Determine the business continuity and data recovery plans that are most relevant to your industry and enterprise.

6. Identify what logs and audit trails are available, secure them appropriately and develop a plan to maintain them.

7. Conduct some research to investigate and review the legislation, organisational and jurisdictional policy and procedures that relate to management of the following areas, to ensure that they meet the enterprise policy:
a. Cloud-related privacy issues relevant to your enterprise.
b. Relevant codes of ethics and conduct.
c. The principles of equal employment opportunity, equity and diversity.
d. Financial management requirements.
e. Governance requirements.

8. Implement any changes identified as required by the research conducted, and integrate them appropriately to the business continuity of operation program (COOP) and existing security plans.

9. Develop an ongoing performance measurement and evaluation review process to evaluate the security effectiveness of the implemented security controls.

10. Collect and collate all the relevant documentation required as part of the COOP as would be required for audit tracking purposes.

While you are demonstrating each of the above actions, you will need to keep a journal outlining each point. Ensure that you detail each point clearly outlining how you performed the action and what the outcome was. You must submit your journal as part of this assessment.

Once you have completed these activities, you will need to sit down with your assessor and discuss:

11. The management specifications and objectives identified throughout the task.

12. Management tools and techniques used throughout the task.

13. The organisational and political context within your organisation including, but not limited to; roles and responsibilities that would become redundant, possible resistance, interference with existing and developing projects, senior management and executive level support and the external and industry influences that could impact on security.

14. Discuss and evaluate how the system development life cycle (SDLC) assisted in the development of the continuity of operation program (COOP).

15. Techniques used for critical analysis in the management context throughout the task.

Once you have competed the discussion, write a report on tasks 11-15.

Reference no: EM132344422

Questions Cloud

Difference between microsoft word and microsoft excel : In what case you would choose to use one over the other? In what case you would you integrate Excel into Word or Word into Excel?
Reputation in the successful adoption of an innovation : How important in general is a company's reputation in the successful adoption of an innovation? Is it important to you?
How is critical thinking used in psychology : How is critical thinking used in Psychology? Give examples of how you use critical thinking in your everyday life. The response must be typed.
Calculate the book value per share of common stock : On January 1, 2018, Baltimore Company issued $100,000 face value, 5%, 5-year bonds at 102. Interest is paid annually on January 1.
Develop an ongoing performance measurement : Develop an ongoing performance measurement and evaluation review process to evaluate the security effectiveness of the implemented security controls
What are some advantages of entering a market early : What are some advantages of entering a market early? Are there advantages to entering a market late? Why?
Spreadsheets to calculate grades : The college IT department manager no longer wants to use spreadsheets to calculate grades. The manager has asked you to design a program
Explain how information progresses to the next stage : There are many steps in the process of memory, and it is important to understand how each step works in order to improve your own memory. In this assignment.
In feature driven development a proposed model selected : In Feature Driven Development a proposed model selected by the modeling team or composed by merging ideas from the proposed models is known as a?

Reviews

Write a Review

Computer Networking Questions & Answers

  Plan for the development of an addressing and naming model

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required page length.

  High-performance network

A company is interested in upgrading its current core infrastructure, which comprises 2 100mbps switches which connect to a utility room that houses 8 100mbps switches wired with Ethernet Category 5 that run to each client machines.

  What delivery and deployment models should dsi adopt

What delivery and deployment models should DSI adopt for a cloud-based OSDS? How should 051 assess the risk of adopting a cloud-based OSDS

  Social issues related to it administration

MN501 - Intellectual Property rules and processes important for conducting high- tech business and PowerPoint presentation based on the above essay

  Analyse and describe how a router performs

Discuss any FOUR reasons for an occurrence of routing loop and its implications on a network operation - Explain why the network 192.168.2.0/24 is not reachable from the HQ router - Calculate the best path to the network 10.0.0.0 from router-A in Fig..

  Osi model-switching systems-network channel processors

In packet switching, the output links to which a packet should be forwarded is not known before their arrivals. Unlike in time-division multiplexing, there is no telling exactly how many packets from an input will be destined for each output over ..

  Discuss and review network planning

Describe how you would design a logistics network consisting of only one warehouse.Discuss and review network planning.

  Describe the open systems interconnection protocol mod

Identify the advantages and disadvantages of circuit switching and packet switching-X.25, Frame Relay, Asynchronous Transfer Mode2, and Transmission Control Protocol/Internet Protocol (TCP/IP)-regarding performance, speed and throughput potential,..

  What is a distance-vector routing protocol

What is a distance-vector routing protocol. What are the advantages and disadvantages of distance-vector protocols

  Evaluate different wan protocols

Evaluate different WAN protocols; such as HDLC, PPP, Frame Relay, DHCP, ISDN, NAT and PAT in a network environment, and configure, verify, troubleshoot

  Assuming no inflation and an interest rate of 4 what

could you please solve the following the problems?a a truck is purchased for 20000. at the end of its 5 year life its

  Set up a network consisting of pc

You are required to set up a network consisting of PCs, routers and servers. You need to configure routing between routers - Perform the activities and support

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd