Provide risk analysis to show the potential cost of the risk

Assignment Help Computer Engineering
Reference no: EM133526591

Homework

The final step in developing the Virtual Technology Implementation Plan is to define how the plan that you have developed will be implemented within the organization. Technology implementation can be a complex process because it affects so many areas of an organization. Technology implementation also carries a high level of risk, so to protect the organization; a good implementation plan should be paired with good risk management and risk mitigation strategies.

For this homework, you will add a detailed implementation plan of 3 to 5 pages that describes your proposed solution. It should include risk management plans and risk mitigation recommendations for the implementation of the virtual system within the organization. Finally, you will further refine the Virtual Technology Implementation Plan to produce the Final Draft version. Updates may be based on peer and instructor feedback.

The project deliverables are as follows:

A. Update the Virtual Technology Implementation Plan document title page with a new date and project name.

B. Update the previously completed sections based on instructor feedback.

C. Develop a detailed Implementation and Risk Management Plan that addresses the following:

1. Implementation

a. Research and identify the important considerations of the design of virtual systems, and identify and defend the design practices that you have included in your implementation plan.

b. Develop plans and strategies for the deployment of the virtual information technology architecture within the enterprise.

2. Risk management

a. Prepare a plan to mitigate or reduce the risks associated with the cloud computing, virtual servers, or virtual data storage technologies that you have identified for implementation in your plan.

b. Provide a risk analysis to show the potential cost of the risks in your risk mitigation plan. This analysis should take risk probability into account.

c. Provide a table that describes the previous configuration and the new configuration using virtualization.

Refine your Virtual Technology Implementation Plan. Complete the following:

A. Review the entire document for any changes and improvements that you would like to make.

B. Ensure that this final version of the plan is sufficiently detailed to allow the organization to confidently move forward with the implementation of the virtual technology based on your recommendations.

C. Any previous instructor feedback should be addressed with appropriate changes.

Argumentation

Now that you have the complete solution to TSG's issues, it is time to present your upgraded design to the TSG executive team and the board of directors. The intent is to document the issues identified in Phase 1, present the proposed solution, and document the return on investment (ROI). You should also be prepared to answer their questions. Your presentation should be about 8-10 slides (excluding the title and reference slides) consisting of the following:

A. A title page with a title, date, company name, and your name

B. An agenda or topics slide

C. Slide numbers on each page

D. 1-3 slides documenting the previous environment

E. 1-3 slides documenting your proposed solution

F. 1-2 slides providing your ROI calculations

G. 1-2 slides discussing the advantages of your solution

H. Notes for each page based on the information content on the slide, providing a narrative of 3-4 paragraphs of your rationale for the data center and infrastructure implementation and the improvements you are recommending

Each slide should support your argument and solution, and should include citations in-text on the slide, and in the references section of the presentation.

Reference no: EM133526591

Questions Cloud

Lifespan unit reflections : ick two unit reflections that you want to do you will select three topics/concepts. Summarize the topics/concepts in your own words.
What nondrug therapies might be useful for this patient : What subjective and objective information indicates the presence of SIADH? Assess the severity of SIADH based on the subjective and objective information
What is the principle of charity : What is the principle of charity?
What is biological collectivism : What is biological collectivism and explain how it is harmful to the self and others?
Provide risk analysis to show the potential cost of the risk : Provide a risk analysis to show the potential cost of the risks in your risk mitigation plan. This analysis should take risk probability into account.
Earning master degree in counseling or social work : You are a teacher and are currently working on earning a master's degree in counseling or social work.
How is conception of locke on state of nature from hobbes : How is the conception of Locke on the state of nature differ from Hobbes' conception of it?
Explain david humes searching critique of philosophers : Explain the significance of David Hume's searching critique of philosophers' claims of certainty.
Has participating in course inspired sense of excitement : Has participating in this first course inspired a sense of excitement as we work further towards this career?

Reviews

Write a Review

Computer Engineering Questions & Answers

  What proposed business intelligence infrastructur consist of

Imagine that you are hired as a CIO of a quickly growing retail chain with an online presence. You have growing transactional databases but want to build.

  Differentiate between phishing and whaling attacks

For this task, imagine that an international organization has hired a national agency to levy phishing, spear phishing, and whaling attacks on a local.

  Correlate the improvement in security devices

Correlate the improvement in security devices and the increase in security attacks and address why the attacks continue to increase

  What does one need to know about the element data

What does one need to know about the element data type in order for a bstree data type to be possible.

  List ethical challenge that could impact a u.s. company

List ethical challenge that could impact a U.S. company that wants to acquire a non-U.S.-based company - The right to private phone conversations

  Describe the different types of information systems

INFORMATION SYSTEMS-Level I Semester I-National Council for Higher Education- BACHELOR OF SCIENCE IN SOFTWARE ENGINEERING.

  What would you need to do to run it every night as root

Suppose you wanted to delete the trash of all users every night using the just created /root/deleteTrash.bash script.

  Write a program that inputs several lines of text

Write a program that inputs several lines of text and a search character and uses function strchr to determine the total occurrences of the character in the lines of text.

  Compare the iot with regular internet

Compare the IoT with regular Internet. Research Apple Home Pod. How does it interact with smart home devices? Alexa is now connected to smart home devices such.

  Dicsuss the business scenario that may call

express a business scenario that might call for an index-organized table.

  What are three different areas where policy would differ

What are three different areas where policy would differ between granting a person access (hiring directly or indirectly) to your IT systems.

  Evaluate the implications of the system connectivity

Identify related systems and assets, regulatory requirements, and overall risk approach and Evaluate the implications of the system connectivity to the internet

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd