What steps dsi take to provide adequate security for osds

Assignment Help Computer Network Security
Reference no: EM131041504

The Department of Spatial Information (DSI) is a State Government department. The major functions of DSI is to provide accurate and timely spatial information to other Government departments, but also to make some of this spatial information available to the public. In order to provide both the government and public services , DSI has developed a number of web services that deliver this information through a number of internally developed applications. This suite of web services and applications is referred to as the DSI Online Spatial Delivery System (OSDS).

DSI have a number of new projects being developed that are expected to increase the demand for its spatial data dramatically. The Executive Management of DSI have looked at a number of proposals to support these new programs. The two alternatives they are investigating are:

1. Increasing the internal DSI Data Centre capacity to host and support the new projects in the OSDS. This would probably need a 50% increase in web infrastructure and support services within the Department. This would necessitate an increase in data centre infrastructure, server numbers as well as a major increase in the bandwidth available to DSI.

2. Migrating the OSDS to a Cloud provider. This would allow DSI to continue to develop and refine the data in its internal Maintenance systems and then move a copy of the completed data to the cloud-based Delivery system for publication.
DSI Management is planning to adopt Proposal 2 but have asked you to give them a report that looks at the following aspects of the

proposal:

1. What model should DSI adopt for a cloud-based OSDS?

2. How should DSI assess the risk of adopting a cloud-based OSDS?

3. What steps should DSI take to provide adequate security for the OSDS?

Reference no: EM131041504

Questions Cloud

Percentage of dividends increase the wacc : In the weighted average cost of capital formula, is the "cost of preferred stock" equal to the dividends paid out? If so, wouldn't paying out a higher percentage of dividends increase the WACC?
What issues should such a internal compliance system address : Identify (in outline fashion) in a list (with explanations) what issues should such an internal compliance system address, to whom/what should it be directed, and how will it be implemented? How should this corporate self-regulation system be in..
How banks work : In your opinion, infer the most significant failure in the banking system and then discuss possible ways the failure can be avoided in the future.
Stocks and other assets : Assess the factors you should consider when advising a client to invest in stocks, bonds, real estate, or some other financial instrument.
What steps dsi take to provide adequate security for osds : The Department of Spatial Information (DSI) is a State Government department. How should DSI assess the risk of adopting a cloud-based OSDS? What steps should DSI take to provide adequate security for the OSDS
After-tax cost of debt to be used in wacc calculation : a) What is the cost of debt? b) If the marginal tax rate of the company is 30%, what is the after-tax cost of debt to be used in the WACC calculation?
What are the three basis questions that societies answer : A household's decision about what quantity of an output or product to demand depends on a number of factors. List them.
Find comment letters received on a current exposure draft : Describe on your own words the issues that the exposure draft/proposal and comments letters dealt with - Find comment letters received on a current exposure draft
What is the payback period : What is the payback period? (Give partial year to two decimal places. SHOW ALL WORK FOR FULL CREDIT).

Reviews

Write a Review

Computer Network Security Questions & Answers

  Compute value of shared secret key

You have secretly picked value SA = 17. You begin session by sending Bob your computed value of TA. Bob responds by sending you value TB = 291. What is the value of your shared secret key?

  What role does this play in international competitiveness

Can political risk be "managed"? If so, what methods can be used to manage such risk, and how effective are they? Discuss the lengths to which you would go to manage political risk relative to the kinds of returns you would expect to gain.

  Implementing and managing an information security

Develop a list of at least five (5) best practices for implementing and managing an information security governance program within an organization

  Install a new network consisting of a dozen computers

Your electronics manufacturing company is working on a new product. The board of directors thinks that this product will revolutionize the travel industry and generate huge profits for the company. To protect this product during the research and deve..

  Write down a 4 to 5 page paper in which you make a plan for

your sister owns a small clothing store. during a conversation at a family dinner she mentions her frustration with

  Advising about a software purchase

Your local art museum recently purchased a quad-core computer with 16 GB of RAM. The curator read an article about an art collection inventory system software package that could go on the new computer.

  Identify url of the website and your assigned business model

Identify the URL of the website and your assigned business model/category in the first part of the report. Describe the website structure and the purpose of each element (include snapshots and diagrams where appropriate).

  Potential security weaknesses of the chosen company

This report identifies the potential security weaknesses of the chosen company and explains potential solutions of the security weaknesses.

  What will be public values transmit for commuication

Alice and Bob choose the numbers 6 and 10 privately. What will be the public values they transmit and what would be the final secret computed?

  Explain what technologies will you implement to mitigate

Each progress report should contain a review of the project, summarizing work completed since the last report -

  Describe a malware attack that causes the victim

Describe a malware attack that causes the victim to receive physical advertisement and describe how to modify a NAT router to prevent packets with spoofed IP addresses from exiting a private network.

  Paper on security protection in a network

Write a short paper on security protection in a network. How to design your system to accommodate high level and low level users, hosts, and data

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd