Risks and issues associated with backing up data to cloud

Assignment Help Computer Network Security
Reference no: EM131655818

Question:

Webb's Stores is a successful regional retailer that operates stores in Australia and also in New Zealand. Webb's sell a range of food stuffs as well as some speciality items. The company has two main data centres, one located in Sydney and the other in Melbourne. It also has a number of regional data centres located in Wagga, Bathurst, Port Macquarie, Brisbane and Auckland in New Zealand.

Webb's Stores has engaged you as a consultant to advise them on the use of Cloud Computing in their daily operations. They have some 600 sales staff that work in their stores and 200 staff that work in their two main warehouses in Sydney and Melbourne. Webb's have been facing increasing issues with application and operational complexity and the management of their data. They have been advised that a move to using a Cloud based infrastructure would be an advantage to them.

Webb's are considering the following:

They are considering a plan to close their Auckland data centre rather than update or replace the older infrastructure. The existing data and services in that data centre would be moved to the Cloud. If this migration is successful, then this could be a first step in the eventual migration of all Webb's services to the cloud.

They are concerned at the increasing costs of LTO 6 tapes that are being used for their backup of mission critical data. They are also concerned at the cost of off-site storage of these tapes, but they are really concerned at the time it is taking to complete a full backup of their databases and other critical data.

Webb's Board is contemplating this strategy as a way to increase the company's flexibility and responsiveness. The Board also expects to achieve significant savings on the cost of maintaining their ICT infrastructure by closing their Auckland data centre. This would entail retiring the infrastructure in that data centre rather than having to update it.

Webb's has again approached you to advise them on this strategy. You have already advised Webb's that this strategic approach will mean that they will need to design and operate a "Hybrid Cloud" methodology, where part of their data centre is "on premise" and another part in a Cloud. Webb's also plan to run a Risk and Security Workshop to assess the risks, security issues and possible methods of control that will be required with this "Hybrid Cloud" approach. You will be required to organise, run and facilitate this workshop.

The Board is also concerned about how this strategy will affect their BCP (Business Continuity Plan) and their backup and disaster recovery strategies.

Your task is to prepare a report for Webb's Board that discusses the following:

1. Webb's have decided to migrate their MS SQL Server 2012 R2 database to an IaaS instance in the cloud.

a. Describe the type of security that you would deploy to protect this mission critical database once it is moved to an IaaS instance in a public cloud.

b. Describe the benefits and issues that would be the result of your deployment of these security measures.

2. What are the risks associated with migrating this mission critical database to the cloud? You should name and describe each risk that you identify that applies to:

a. The database

b. The IaaS infrastructure

c. The communications between Webb's and their IaaS database in the cloud

3. Webb's is considering the use of the Cloud for backup and possibly also for archival of records.

a. What are the risks and issues associated with backing up data to the cloud? You should name and describe each risk that you identify that applies to:

i. Backing up data to the Cloud

ii. Storage of data in the Cloud
iii. Retrieval of data from the cloud.

b. How does Webb's use of a Cloud backup affect their DR plans? Describe how you see that their backup and restore strategy will change as a result of this service.

4. How should Webb's protect access to these services that they are now moving to the Cloud?
Describe what you would recommend to Webb's Board to protect access to:

a. Their IaaS infrastructure,

b. Their Ms SQL Server 2012 R2 cloud instance,

c. Their Cloud network infrastructure

d. Their Cloud backup and restore infrastructure

Rationale

This assessment will cover the following objectives:

Be able to compare and evaluate the ability of different Cloud Computing Architectures to meet a set of given business requirements;

Be able to evaluate a set of business requirements to determine suitability for a Cloud Computing delivery model;

Be able to evaluate and design an ICT Risk Management strategy for a Cloud Computing Delivery plan to meet business requirements;

Be able to interpret, evaluate and plan the Governance and Security requirements for a Cloud Computing delivery plan;

Be able to analyse and evaluate business requirements to plan a migration to a Cloud model;

Reference no: EM131655818

Questions Cloud

What are style sheets : 1. What are style sheets? Explain the function of styles.
Discuss improvements for provides and health care plans : What thoughts do you have on improvements for provides and health care plans
Differences between an excel worksheet and a workbook : 1. Explain the differences between an Excel worksheet and a workbook.
Discuss committees and legislative commitments : federal legislators and explore their assigned committees and legislative commitments
Risks and issues associated with backing up data to cloud : Describe the type of security that you would deploy to protect this mission critical database once it is moved to an IaaS instance in a public cloud
Target market was middle aged women : Suppose you worked at McDonald's and your target market was middle aged women.
The neurobiological basis for the disorder : Explain the symptoms, how the diagnosis is made (e.g., findings on brain imaging, laboratory testing, etc.), the neurobiological basis for the disorder.
What are the different types of fractures : What are the risk factors for osteoporosis, What diagnostic study will you expect the health care provider to order for osteoporosis
How accessible are the primary destination within community : How accessible are the primary destination within or near the community? How does the network design differ if at all for auto, ped, bike, transit?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd