How should webb protect access to these services

Assignment Help Computer Network Security
Reference no: EM131656884 , Length: word count:1500

Assessment - Security Management and Migration

Task

Webb's Stores is a successful regional retailer that operates stores in Australia and also in New Zealand. Webb's sell a range of food stuffs as well as some speciality items. The company has two main data centres, one located in Sydney and the other in Melbourne. It also has a number of regional data centres located in Wagga, Bathurst, Port Macquarie, Brisbane and Auckland in New Zealand.

Webb's Stores has engaged you as a consultant to advise them on the use of Cloud Computing in their daily operations. They have some 600 sales staff that work in their stores and 200 staff that work in their two main warehouses in Sydney and Melbourne. Webb's have been facing increasing issues with application and operational complexity and the management of their data. They have been advised that a move to using a Cloud based infrastructure would be an advantage to them.

Webb's are considering the following:

  • They are considering a plan to close their Auckland data centre rather than update or replace the older infrastructure. The existing data and services in that data centre would be moved to the Cloud. If this migration is successful, then this could be a first step in the eventual migration of all Webb's services to the cloud.
  • They are concerned at the increasing costs of LTO 6 tapes that are being used for their backup of mission critical data. They are also concerned at the cost of off-site storage of these tapes, but they are really concerned at the time it is taking to complete a full backup of their databases and other critical data.

Webb's Board is contemplating this strategy as a way to increase the company's flexibility and responsiveness. The Board also expects to achieve significant savings on the cost of maintaining their ICT infrastructure by closing their Auckland data centre. This would entail retiring the infrastructure in that data centre rather than having to update it.

Webb's has again approached you to advise them on this strategy. You have already advised Webb's that this strategic approach will mean that they will need to design and operate a "Hybrid Cloud" methodology, where part of their data centre is "on premise" and another part in a Cloud.

Webb's also plan to run a Risk and Security Workshop to assess the risks, security issues and possible methods of control that will be required with this "Hybrid Cloud" approach. You will be required to organise, run and facilitate this workshop.

The Board is also concerned about how this strategy will affect their BCP (Business Continuity Plan) and their backup and disaster recovery strategies.

Your task is to prepare a report for Webb's Board that discusses the following:

1. Webb's have decided to migrate their MS SQL Server 2012 R2 database to an IaaS instance in the cloud.

a. Describe the type of security that you would deploy to protect this mission critical database once it is moved to an IaaS instance in a public cloud.

b. Describe the benefits and issues that would be the result of your deployment of these security measures.

2. What are the risks associated with migrating this mission critical database to the cloud? You should name and describe each risk that you identify that applies to:

a. The database

b. The IaaS infrastructure

c. The communications between Webb's and their IaaS database in the cloud

3. Webb's is considering the use of the Cloud for backup and possibly also for archival of records.

a. What are the risks and issues associated with backing up data to the cloud? You should name and describe each risk that you identify that applies to:

i. Backing up data to the Cloud

ii. Storage of data in the Cloud

iii. Retrieval of data from the cloud.

b. How does Webb's use of a Cloud backup affect their DR plans? Describe how you see that their backup and restore strategy will change as a result of this service.

4. How should Webb's protect access to these services that they are now moving to the Cloud? Describe what you would recommend to Webb's Board to protect access to:

a. Their IaaS infrastructure,

b. Their Ms SQL Server 2012 R2 cloud instance,

c. Their Cloud network infrastructure

d. Their Cloud backup and restore infrastructure

Rationale - This assessment will cover the following objectives:

  • Be able to compare and evaluate the ability of different Cloud Computing Architectures to meet a set of given business requirements;
  • Be able to evaluate a set of business requirements to determine suitability for a Cloud Computing delivery model;
  • Be able to evaluate and design an ICT Risk Management strategy for a Cloud Computing Delivery plan to meet business requirements;
  • Be able to interpret, evaluate and plan the Governance and Security requirements for a Cloud Computing delivery plan;
  • Be able to analyse and evaluate business requirements to plan a migration to a Cloud model;

Reference no: EM131656884

Questions Cloud

Maintaining a familiar operating environment : As such, roaming profiles were devised as means to allow flexibility between devices for end-users while still maintaining a familiar operating environment.
Discuss the first amendment rights to free speech : Watchtower contended that the ordinance violated First Amendment rights to free speech, free press, and the free exercise of religion.
Advantages and disadvantages of using ldap : Search the public web using a search engine like Google or Bing to find three (3) popular sites explaining the advantages and disadvantages of using LDAP.
Explain why you can or cannot honor clients request : Prepare a letter to the potential client explaining the following: Why you can or cannot honor his request. The reasoning for your decision.
How should webb protect access to these services : Assessment - Security Management and Migration. How should Webb's protect access to these services that they are now moving to the Cloud
Review case of drug felony of richard homar : On August 26, while employed as a policeman at a state university, Richard Homar was arrested by the state police and charged with a drug felony.
How is susie business diagrammed : Susie sells seashells by the Colorado sea shore. She's contacted us, BL Inc., to make a database to support her online sales.
How does stem education fit with science education : How does STEM education fit with science education? Give an example of how you will integrate STEM into your science curriculum.
Determine the correct expansion factor : Determine the reliability factor. Determine the correct expansion factor. Determine sample size you should use. Determine the sampling interval you should use.

Reviews

len1656884

9/25/2017 3:36:24 AM

Need 1500 words and a diagram. Need it today before 4 PM IST anyhow as student need to submit it today itself. Information security - Clear comprehensive assessment of InfoSec issues, critical points identified and discussed. Migration Risk Management - Clear, comprehensive description of Risk Management issues, critical points identified & discussed. Backup Risk Management - Clear, comprehensive description of backup and DR plan, all critical points identified & discussed.

len1656884

9/25/2017 3:36:18 AM

Access Management - Clear and comprehensive description of protecting IaaS infrastructure, server and backup and restore infrastructure, and all critical points identified & discussed. Presentation (Communicate in a professional manner), Grammar & Referencing Up to 5 marks may be deducted for poor grammar, presentation, spelling and not following the proper APA 6th edition style of referencing.

len1656884

9/25/2017 3:36:10 AM

Presentation - Your report MUST be presented in MS Word format. Your assessment must be submitted electronically and should: Have a cover page including: Assessment No & Assessment Title, Student Name, ID & Student Email and The assessment should also include at least the following sections: Executive Summary - this section should contain a brief summary about the contents of the report. This section should be a maximum of one A4 size page. Main Body of the report - Use this section to answer all the questions in Part I and Part II. All tasks should be clearly identified with headings. References - must be in APA style both in-text and at the end of the assessment document. Use Calibri, or a similar font, in 11 or 12 point type. All diagrams and images are to be embedded in the document. Diagrams and images that are supplied separately will not be marked. All text should be left-justified. Each page must have a header or footer with your name and student number. Page numbers must be shown in the footer of each page, except on the title page.

len1656884

9/25/2017 3:36:02 AM

Reports are marked and feedback attached using a MS Word based tool. Reports that are submitted in PDF format will be re-formatted to Word format in order to be marked. Allowances will not be made for any loss of information, diagrams or images as a result of the re-formatting. Please note: Assessment MUST be submitted as ONE word file on Turnitin. Please do not submit *.zip or *.rar or multiple files. All assessment submissions MUST contain a Turnitin originality report with them upon submission. Details about the use of Turnitin are available from the subject site.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd