Week 4 assignment I have attached all the requirements below and also the last weeks answers to help along

User Generated

renfre2099

Computer Science

Description

Using the scenario from the Week One assignment, write a 2- to 3-page business memo to the CIO of your organization detailing security recommendations. Include a Visio® diagram illustrating your security model and any areas of conercn. Be sure to follow APA standards for a business memo.

Referencing your prior week's infrastructure (specific) choices, use the "Understanding Cloud Security" guidance in Ch. 12 of the Cloud Computing Bible to think about one or two additional recommendations that you would make to improve security.

Incorporate into your memo the inherent security concerns for each area:

  • Service: What service to use (SaaS, PaaS, etc)? This is based on your Week One decision.
  • Design principles: To what standards do you need to adhere? (use Ch. 14, Amazon Web Services for Dummies, as a reference) This is based on your Week Two decision.
  • Security concerns: What virtualization security concerns do you have? This is based on your Week Three decision.

If you don't have access to information about your organization's network, try meeting with the network manager to come up with some ideas. If this is not possible, use the following scenario:

You are the IT Manager of a mid-size wholesale distribution business of 500 employees. The following are a few systems that are used within your business:

  • Internal Exchange 2003 server - this is a physical server
  • Internal CRM system - this is a virtual machine
  • Internal ERP system using SAP ERP 6.0 - this is a physical server
  • Internal File server using 1.2 TB of data - this is a virtual machine
  • (2) Internal SQL Servers used for business intelligence - (1) server is virtual and (1) server is physical

The network has the following characteristics:

  • A WAN with (4) connected sites - (3) distribution centers, and a corporate office.
  • Each site is connected via a 100 Mbps MPLS WAN and has a single T-1 for a failover connection.
  • The datacenter is centralized at one of the distribution centers.
  • There are (2) internet connections a 100 Mbps primary connection and a 10 Mbps backup.
  • The network has redundant firewalls that also provide VPN access for any remote access that is needed.
  • Each site has a LAN that is 1 Gbps Ethernet.
I have included week 2 and 3 this is week 4

Unformatted Attachment Preview

Running Head: EXECUTIVE BRIEFING MEMO FOR TECHNICAL LEADERSHIP. Executive Briefing Memo for Technical Leadership. Bruce Nutter University of Phoenix Course 12/11/2017 1 EXECUTIVE BRIEFING MEMO FOR TECHNICAL LEADERSHIP 2 Technical Leadership. Policy Title Information Security Policy Responsible Executive Communications Information Officer Responsible Department Department of Information and Technology Endorsed by Steering Committee of Data Governance Effective Date January 1, 2018, following 1month mandatory training Last Update March 26, 2017 I. Memo Overview This executive briefing memo will provide an overview of how three design principles for cloud applications will be used by the technical leadership to implement the software-as-a-service. SaaS supports Cloud Computing Service and allows the users use the internet to schedule their customers and control the level of equipment across the company in all the service. II. Three design principles for cloud applications used to implement the software-as-aservice. SaaS SaaS refers to the use of software-as-a-service, rather than in the traditional format. It has overtaken the traditional method of purchasing a software and out rightly beginning to use it upon loading on a computer system as a device by embracing the subscription for the software services based on the model ordered (Antonopoulos & Gillam, 2017). The place where the software is hosted in the cloud for accessibility through the internet also determine how the software service will benefit an entity. The benefits of using SaaS are enormous and cut across all entities, individuals or organizations. a. Monitoring Prevents Problems EXECUTIVE BRIEFING MEMO FOR TECHNICAL LEADERSHIP 3 The management will ensure that the risks associated with the SaaS in cloud services are properly monitored. SaaS enables transparent and timely monitoring and reporting of any risks relating to the cloud computing service. It has a well-documented escalation and monitoring process that allows communication across the cloud service (Yang & Liu, 2013). SaaS will be integrated to allow security monitoring process, escalation process, cloud risk development and reporting of all the risks related to the cloud computing service. As a result, SaaS provides regular escalations and information that originates from the cloud service provider. The SAAS application will be used to undertake planning, invoicing, accounting, monitoring, and evaluation, tracking of projects and communication. There are upfront costs that come with the use of SAAS through the monthly subscriptions that has replaced the one-stop purchase. In case a user no longer needs the SAAS, then the subscription can be terminated forthwith. b. Application Management Automates Administration The management is obliged to ensure that all the applications of SaaS are managed to ensure that they are compliant with the administration needs. This means that SaaS will be used to ensure full automation of all the application and processes in an organization at all times. It obliges the users to comply with legal, policy, regulation and contractual obligations that come with the use of the cloud computing service. Its authorization will be used to uphold the integrity of the cloud service it offers to users (Wilder, 2014). This is the cultural dimension observed by SaaS that allows the compliance manager put in place all policies, code of conduct and regulations under periodic review. The management will also ensure that all the necessary processes are in place for compliance purposes EXECUTIVE BRIEFING MEMO FOR TECHNICAL LEADERSHIP 4 All the SAAS application will be automatically updated online and the fields saved in the club as opposed to the computer hard disk. The SaaS will also be made to generate its processing power from the cloud and comes with ready to use applications for subscriptions (Golden, 2013). It is beneficial for short time users and can provide additional services and storage even without extra installation. It has free automatic updates and comes with a cross-service compatibility. No restrictions on the internet and location of use to access the files in the cloud server. It has the capacity to enable users to alter applications to suit their needs. c. Tier-Based Design Increases Efficiency The SaaS conforms to the design principle of as tier-based design and this obligates the management to buy and implement all the security features in the cloud. It will be used to increases the efficiency in cloud computing by ensuring that observes a high level of information risk and security. Besides, the SaaS has a high capability of facilitating a monitoring and management process that is of an integral significance to all investments of the SaaS cloud service (Golden, 2013). Its architecture dimension will be tailored to enable the manager to get involved in all aspects of the initiative from procurement to the commissioning of the SaaS. The management is thus responsible for the evaluation of the various vendors and management of various aspects of the SaaS. They also undertake the review of technology applicable to the SaaS to ass the design and security features before making decisions on the final investments EXECUTIVE BRIEFING MEMO FOR TECHNICAL LEADERSHIP 5 References Antonopoulos, N., & Gillam, L. (2017). Cloud computing: Principles, systems, and applications. Cham, Switzerland: Springer. Golden, B. (2013). Service-Oriented and Cloud Computing . Hoboken, N.J: John Wiley & Sons Inc. Wilder, B. (2014). Cloud architecture patterns: [develop cloud-native applications]. Beijing: O'Reilly. Yang, X., & Liu, L. (2013). Principles, methodologies, and service-oriented approaches for cloud computing. BUSINESS PRESENTATION BRUCE NUTTER NTC/302 EXECUTIVE BRIEFING MEMO FOR TECHNICAL LEADERSHIP THE MEMO IS ALL ABOUT PROVIDING AN OVERVIEW DESIGN PRINCIPLES FOR CLOUD APPLICATIONS ARE USED BY TECHNICAL LEADERSHIP TO IMPLEMENT THE SOFTWARE-AS-A-SERVICE. PRINCIPLES OF IMPLEMENTING SAAS • Monitoring prevents problem • Application management automates administration. • Tier-based design increases efficiency MONITORING PREVENTS PROBLEMS • MANAGEMENT ENSURES RISKS ASSOCIATED WITH SAAS IN CLOUD SERVICES ARE PROPERLY MONITORED. • THE SAAS ALLOWS TRANSPARENT AND TIMELY MONITORING AND REPORTING OF ANY RISKS RELATED TO CLOUD COMPUTING SERVICES. CONTINUATION • THE SAAS ALSO PROVIDES REGULAR ESCALATION AND INFORMATION THAT ORIGINATES FROM CLOUD SERVER PROVIDER. • SAAS APPLICATION IS ALSO USED TO UNDERTAKE PLANNING, INVOICING, ACCOUNTING, MONITORING AND EVALUATION, PROJECT TRACKING AND COMMUNICATION. • IT IS NO-LONGER A ONE-STOP PURCHASE SAAS DO HAVE AN UPFRONT COST. APPLICATION MANAGEMENT AUTOMATES ADMINISTRATION • A MANAGEMENT SHOULD ENSURE THAT ALL SAAS APPLICATIONS ARE WELL MANAGED TO ENHANCE COMPLIANT WITH ADMINISTRATION NEEDS. • THEREFORE SAAS IS USED TO ENSURE FULL AUTOMATION OF ORGANIZATION PROCESS AND APPLICATION AT ALL TIMES. • SAAS ALSO OBLIGES USER TO COMPLY WITH LEGAL, POLICY, REGULATION AND CONTRACTUAL OBLIGATION THAT COME WITH USE OF CLOUD COMPUTING SERVICES. • FOR ALL THE NECESSARY PROCESSES TO BE IN PLACE FOR COMPLIANCE PURPOSES IT IS THE MANAGEMENT OBLIGATION. CONTINUATION • THE SAAS APPLICATIONS ARE AUTOMATICALLY UPDATED ONLINE AND FIELD SAVED IN CLUB AS OPPOSED TO COMPUTER HARD DISK. • SAAS ALSO IS MADE TO GENERATE ITS PROCESSING POWER FROM THE CLOUD AND COMES WITH READY TO USE APPLICATION FOR SUBSCRIPTION. • SAAS IS BENEFICIAL FOR SHORT TIME USER AND CAN PROVIDE ADDITIONAL SERVICES AND STORAGE EVEN WITHOUT EXTRA INSTALLATION. • IT HAS FREE AUTOMATIC UPDATES, COMES WITH A CROSS-SERVICES COMPATIBILITY. • HAS NO RESTRICTION ON INTERNET OR LOCATION USED TO ACCESS FILES IN CLOUD SERVER. TIER-BASED DESIGN INCREASES EFFICIENCY SaaS conforms to the design principle of tier-based design. • • SaaS is used in increasing efficiency in cloud computing. • It also has a high level of facilitating a monitoring and management process of an integral significance to all investments of SaaS cloud services. CONTINUATION • SaaS architecture dimension will be tailored to enable the manager to get involved in all aspects of the initiative from procurement to commissioning. • Management is responsible for evaluation of various vendors and management of various aspect of SaaS. • A review of technology applicable to SaaS is undertaken to ass the design and security features before making final investment decision. Running head: AMI 1 AMI Bruce Nutter NTC 302 December 18, 2017 William Perales AMI 2 AMI Executive summary and business presentation The analysis of this paper is about technical leadership and how it is influenced by data security policies. The report will be about different technologies used in clouding which in other words is referred to as a shared pool of resources. Use of the shared pool is what enables the functionality of computing to be possible. It also helps in locating where information is coming from and the address of the sender. The most important part about computing is that through it, and all the technology used it has been easier to create computer clouding which is a technology that allows information to travel on a given channel to the designed destination without having to purchase the software. Another factor that has made computing more exciting today is that it does not matter the kind of system one is using but information can be transferred from one location to the other. It has even become more comfortable to monitor some of the risks that organization can encounter through the use of cloud services. The invention of software-as-a-service has been one of the vast inventory as it has made computing to change from its traditional format of saving information in hard disks and hard copies. What has enabled cloud computing to be successful it is because it has support from software-as-a-service. Through balancing of load high-performance, cloud-based solution can be created. It has also involved technology which has made it possible to develop visual hardware system. It is now applied by big data system or organizations like google in handling their data and also serving their clients. It has become possible through the use of SaaS which involves the AMI use of monitoring prevents a problem, application management automates administration, and tier-based design increases efficiency. 3
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: BUSINESS MEMO DETAILING SECURITY RECOMMENDATIONS

Business Memo Detailing Security Recommendations
Student Name:
Institution Affiliation:
Date:

BUSINESS MEMO DETAILING SECURITY RECOMMENDATIONS

2

TO: The Chief Information Officer
FROM: The Information Technology Manager
DATE: January 8, 2018
SUBJECT: Security Recommendations
Memo Overview
This is a security recommendation memorandum that highlights the crucial areas that the
organization should take caution. The implementation of the cloud-based infrastructure in the
organization's network has opened the business network to a new line of attack that needs to be
monitored and made sure that they do not pose any threat to the organizational data. For the
accurate delivery of the comprehensive protection in the organization network, the security must
be implemented into the network architecture.
Security concerns in the Software as a service
There are numerous issues that arise from the adopted Software as a service; most of
them arise due to the presence of the organizational data outside its intranet. They include:
Information Security
In the SaaS clo...


Anonymous
Awesome! Perfect study aid.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags