MCB002 Cloud Computing Assignment

Assignment Help Computer Engineering
Reference no: EM133051053

MCB002 Cloud Computing - York St John University

Level 7

Learning outcome 1: Design requirements

Learning outcome 2: Security in the Cloud

Learning outcome 3: Cloud Application Security

Learning outcome 4: Legal and Compliance.

Assignment Description

Question 1

1. A business Impact Analysis and Risk Management worksheet has been attached to this assignment.
2. Choose a department/function within an organisation.
3. Identify five (5) hypothetical risk/threats to use in this question; this might a malicious attack such as a malware, a natural disaster such as earthquake or anything else.
4. Fill out the form using the business function and risk/threat, using information as accurately and realistically as possible

Question 2

1. identify two cloud providers online. Summarise their posted policies regarding real-time or regular full backup, particularly in the context of BC/DR (Business Continuity/Disaster Recovery)

2. Compare and contrast in a table the two offerings, specially discussing how each deal with bandwidth for backups, pricing structure, and their suitability, for data portability to other cloud providers.

Question 3

1. Identify one cloud application you use and identify one API in use. This could be internal or a third- party API. Describe its functionality.
2. Describe the similarities and difference between the cloud software development lifecycle and any other model (just one model).
3. Identify and describe two components of the cloud application architecture.
4. Describe the functions of an identity management solution in the cloud environment.

Question 4
1. What are HIPAA rules and why are they different?
2. Describe the primary differences in a table between an SOC1, SOC2 and a SOC 3 report
3. Describe the primary difference between risk appetite and risk tolerance.

Attachment:- Cloud Computing.rar

Reference no: EM133051053

Questions Cloud

Fundamental security design principles : What is the difference between passive and active security threats? List and briefly define the fundamental security design principles.
What is the financial auditors role in society : What is the financial auditors' role in society? How are they important to preservation of public's trust in financial system
Develop and implement internationalization strategies : 1. What are the reasons that motivate leaders to develop and implement internationalization strategies?
What do you see as your core competencies : What do you see as your core competencies? How can you leverage them within your business unit as well as across other business units?
MCB002 Cloud Computing Assignment : MCB002 Cloud Computing Assignment Help and Solution, York St John University - Assessment Writing Service
Make the journal entry to record this increase in fair value : At December 31, 2023, it is estimated that division's recoverable amount increased to HK$3,241 million. Make the journal entry to record increase in fair value
Entering a developing market in india : Barriers to Market Entry Jaguar will face entering a developing market in India. Be specific and explain the strategies in detail for overcoming each barrier.
Purchasing agent for a manufacturer of luxury yachts : You are a purchasing agent for a manufacturer of luxury yachts. A sales rep from a company which makes high end furnishings for yachts invites you to attend the
How sentiment analysis is used to learn from twitter : Discussing how sentiment analysis is used to learn from twitter. In what domains is this used and to what effect?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd