Evaluate ability of different cloud computing architectures

Assignment Help Computer Network Security
Reference no: EM13718214

Task 1

DTGOV uses Microsoft Office 2010 as its office productivity suite and Microsoft Exchange 2010 for email. The DTGOV Exchange instance is running on a cluster of physical servers operating in one of the DTGOV data centres. The DTGOV Information Management Board (IMB), headed by the CIO, has decided to move its office productivity and email suites to a service based model and want to investigate the use of an SaaS office productivity and email suite.

The IMB want to study the use of either Google Docs and Gmail or Microsoft's Office 365 as a possible SaaS offering for DTGOV and its clients. This will be intended to replace the existing Exchange 2010 data centre infrastructure as well as the Office 2010 installation on all desktop computers.

You have been assigned the task of providing the IMB with both a Risk Management assessment and a Security assessment for this proposed migration. You are to:

1. Select either Google Docs/Gmail or Office 365 as the SaaS provider.

2. Provide an Information Security assessment on your chosen provider using the techniques proposed by Ramgovind etal, and the ASD Cloud Computing Security Considerations as your primary references. This assessment should be no more than 2 pages.

3. Provide a Risk Management assessment for your chosen provider using the Threat and Risk Assessment Questionnaire (White, P. 2015), as a template. You are to complete only the following sections of the template:

a. Section 6 Data, A. Data Classification

b. Section 6 Data, C. Backup

c. Section 7. Identity Management

d. Section 10 B. VPN

e. Section 10. C. Cryptography

f. Section 11. Cloud Services

Each section is to be completed with only the following detail:

a. Is the question applicable: yes, no or NA

b. What do you think are the likely consequences of the risk? (see Appendix B, Consequences for the term to use)

c. What do you think is the likelihood of the risk occurring? (see Appendix B, Likelihood for the term to use)

d. What is the risk rating for this question? (see Appendix B, Risk Rating for the risk rating)

4. Provide a covering one page executive summary to the IMB for these two documents and summarize the risk management and security benefits and drawbacks of the proposed migration of office productivity services to an SaaS model.

Task 2

The DTGOV IMB has considered your assessment of the risk management and security issues for the migration of DTGOV's office productivity and email tools to an SaaS provider. They have decided that they need an additional assessment on the management and the SLA of the chosen provider.

You have been assigned the task of providing the IMB with an assessment of the management requirements and the provisions of the SLA for the proposed provider. You are to:

1. Using the SaaS provider that you chose for assignment 2 (either Google or Office 365):

a. Discuss the requirements for remote administration, resource management, SLA management and billing management of your chosen provider. It may be useful to consider Morad and Dalbhanjan's operational checklists here. This section should be no more than two to three pages in length.

b. Discuss briefly how you will consider application resilience, backup and disaster recovery for your chosen provider. This section should be no more than two to three pages in length.

c. Use Erl's SLA guidelines to assess the SLA for your chosen provider. This section should be no more than two to three pages in length.

d. Provide a covering one to two page executive summary of these three assessments to the IMB and summarise the major opportunities and risks that have beesn identified in your assessments.

Rationale

This assignment covers the following objectives:

- Be able to compare and evaluate the ability of different Cloud Computing Architectures to meet a set of given business requirements;
- Be able to evaluate a set of business requirements to determine suitability for a Cloud Computing delivery model;
- Be able to evaluate and design an ICT Risk Management strategy for a Cloud Computing Delivery plan to meet business requirements;
- Be able to interpret, evaluate and plan the Governance and Security requirements for a Cloud Computing delivery plan;
- Be able to analyse and evaluate business requirements to plan a migration to a Cloud model;

Verified Expert

Reference no: EM13718214

Questions Cloud

Calculate the work done on the package by gravity : A 4.50kg package slides 1.55m down a long ramp that is inclined at 11.5 m below the horizontal. Calculate the work done on the package by gravity
An effective screening technique : Which of the following is an example of an effective screening technique? A A car maker advertising the high quality of their car
Drag coefficient of semi-tractor trailer without cab fairing : The drag coefficient (Cd) of a semi-tractor trailer without a cab fairing is 0.96,and with the fairing is 0.76 based on frontal area of 80ft^2. if power=Force * velocity, determine the horsepower (Hp) reduction of using the fairing in the truck is go..
What series resistance should be used : A galvanometer with a coil resistance of 40.0 Ω deflects full scale for a current of 2.0 mA. What series resistance should be used
Evaluate ability of different cloud computing architectures : Provide an Information Security assessment on your chosen provider using the techniques proposed by Ramgovind etal, and the ASD Cloud Computing Security Considerations as your primary references.
What is the period of small oscillations for this pendulum : A simple pendulum is 6.00 m long. What is the period of small oscillations for this pendulum if it is located in an elevator accelerating upward at 7.00 m/s2
What sorts of developments might discourage : Suppose that you were in business and intended to build a plant to turn out a promising new item-say, a pencil that would last twice as long as the kinds available now. What sorts of developments might discourage you from making this investment..
What is the frictional force between the road and the tires : A car of mass 1620 kg is traveling without slipping on a flat, curved road with a radius of curvature of 33 m. What is the frictional force between the road and the tires
Calculate the greatest speed of the block : A 0.8-kg block attached to an ideal spring with a spring constant of 92 N/m oscillates on a frictionless, horizontal surface. If the total mechanical energy is 0.64 J, the greatest speed of the block is

Reviews

Write a Review

Computer Network Security Questions & Answers

  Why are scada systems particularly vulnerable to cyber treat

Why are SCADA systems particularly vulnerable to cyber treats? C. Using the X.805 security framework as a reference, discuss the SCADA security requirements for an electric, water or oil refinery enterprise.

  The network administrator to protect the network against

over the past several years the chief executive officer of your company has read articles on internet control message

  How system with capabilities as access control mechanism

Consider how a system with capabilities as its access control mechanism could deal with Trojan Horses.

  Network management in network management why is it

network management in network management why is it important to carefully consider decisions that will lock the firm

  Ientify another application other than course management

security change management and architectural adaptationthe online course management system from previous assignments is

  Choose a recent technical article from a referred journal

please choose a recent technical article from a referred journal or conference proceedings on the topic of threats and

  Identify and describe the organizational authentication

Identify and describe the organizational authentication technology and network security issues

  Do russia and china do enough in the cyberspace area

From the criminality perspective, do Russia and China do enough in the cyberspace area?

  How adequate destruction of materials ensuring privacy

How will your company ensure adequate destruction of the materials thus ensuring an individual's privacy? Will any state-wide, national, or industry standards be met? If so, which ones and how?

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Security infrastructure and protocols

Compare and contrast the trust models for public keys used in PKI and PGP, and assess the statement that a PKI is a "top-down" approach to trust and PGP is a "bottom-up" approach to trust.

  Generate a key for some email addresses

Generate a public and private key pair for yourself. If you have any problem in installing it properly, please discuss this in the project folder.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd