Get Instant Help From 5000+ Experts For
question

Writing Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Add File

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!

ITC568 Cloud Privacy And Security

20 Pages / 4,944 Words Published On: 05-04-2021
Question:

You are the principal consultant for a community based Charity. The Charity is involved in locating and providing accommodation, mental health services, training and support services to disadvantaged people in the community.

The Charity currently runs a small data centre that has some 50 x86 64 bit servers running mainly Windows Server 2008 R2 for desktop services, database and file services. It also has 10 Red Hat Enterprise Linux 5 servers to service public facing Web pages, Web services and support.

The Charity is considering joining a community cloud provided by a public cloud vendor in order to provide a number of applications to all 500 support staff and administrative users. A small number of the Charity's applications are mission critical and the data that those applications use is both confidential and time sensitive.

The community cloud would also be used to store the Charity's 200TB of data. The data would be held in a SaaS database run by the public cloud vendor. The Charity's data contains a considerable amount of confidential information about the people to whom the Charity provides services.

The Charity collects PII data on the clients who use its services so that it can assist them to manage their different service requirements. This PII data also includes holding some digital identity data for some of the more disadvantaged clients, particularly if they also have mental health issues.

The cloud vendor has made a presentation to management that indicates that operational costs will drop dramatically if the cloud model is adopted. However, the Board of the Charity is concerned with the privacy and security of the data that it holds on the people that it provides services to in the community. It is concerned that a data breach may cause considerable damage to substantially disadvantaged people in the community.

The Board asks that you prepare a report that proposes appropriate privacy and security policies for the Charity's data.

The charity has also decided to:

Purchase a HR and personnel management application from a US based company that provides a SaaS solution.

The application will provide the charity with a complete HR suite, which will also include performance management. The application provider has advised that the company's main database is in California, with a replica in Dublin, Ireland. However, all data processing, configuration, maintenance, updates and feature releases are provided from the application provider's processing centre in Bangalore, India.

Employee data will be uploaded from the charity daily at 12:00 AEST. This will be processed in Bangalore before being loaded into the main provider database.

Employees can access their HR and Performance Management information through a link placed on the Charity intranet. Each employee will use their internal charity digital ID to authenticate to the HR and Performance management system. The internal digital ID is generated by the charity's Active Directory instance and is used for internal authentication and authorisation.
Move the charity payroll to a COTS (Commercial Off The Shelf) application that it will manage in a public cloud;

Move the charity Intranet into a Microsoft SharePoint PaaS offering so that it can provide Intranet services to all agencies in the WofG.

Tasks
You have been engaged to provide a risk assessment for the planned moves to SaaS application offerings.

You are to write a report that assesses the risks to the charity for just their planned moves in the HR area:

Consider the data and information that the charity holds on its employees in the current HR system.
 
Establish the existing threats and risks to the security of that data and information contained in the in-house HR database.

Are there any additional risks and threats to employee data that may arise after migration to an SaaS application?

Assess the resulting severity of risk and threat to employee data.

Consider the privacy of the data for those employees who will move to an SaaS application.

Establish the existing threats and risks to the privacy of that data and information contained in the in house HR database.

Are there any additional risks and threats to the privacy of the employee data after migration to an SaaS application?

Assess the resulting severity of risk and threat to the privacy of employee data.

What are the threats and risks to the digital identities of charity employees from the move to SaaS applications?

Consider the operational solution and location(s) of the SaaS provider for HR management. Does either the operational solution, or the operational location, or both, increase or mitigate the threats and risks identified for the security and privacy of employee data?

Are there any issues of ethics, data sensitivity or jurisdiction that should be considered by the charity?

1.i. Existing threats to Security of employee data
 
Comprehensive exploration of threats and risks to security of data that includes well thought out reasoning

Thorough exploration of threats and risks to security of data that includes good reasoning

Detailed exploration of threats and risks to security of data that includes some good reasoning

Adequate exploration of threats and risks to security of data that includes some reasoning

Incomplete or irrelevant exploration of threats and risks to security of data that has little or no reasoning

ii. New threats to security of employee data

Comprehensive exploration of new threats and risks to security of data that includes well thought out reasoning

Thorough exploration of new threats and risks to security of data that includes good reasoning

Detailed exploration of new threats and risks to security of data that includes some good reasoning

Adequate exploration of new threats and risks to security of data that includes some reasoning

Incomplete or irrelevant exploration of new threats and risks to security of data that has little or no reasoning

iii. Severity of risk to security employee data

Comprehensive security risk assessment with excellent severity ratings

Thorough security risk assessment with very good severity ratings

Detailed security risk assessment with good severity ratings

Adequate security risk assessment with reasonable severity ratings

Incomplete or inadequate security risk assessment with poor or no severity ratings

2.i. Existing threats to privacy of employee data

Comprehensive exploration of threats and risks to privacy of data that includes well thought out reasoning

Thorough exploration of threats and risks to privacy of data that includes good reasoning

Detailed exploration of threats and risks to privacy of data that includes some good reasoning

Adequate exploration of threats and risks to privacy of data that includes some reasoning

Incomplete or irrelevant exploration of threats and risks to security of data that has little or no reasoning

ii. New threats to privacy of employee data

Comprehensive exploration of new threats and risks to privacy of data that includes well thought out reasoning

Thorough exploration of new threats and risks to privacy of data that includes good reasoning

Detailed exploration of new threats and risks to privacy of data that includes some good reasoning

Adequate exploration of new threats and risks to privacy of data that includes some reasoning

Incomplete or irrelevant exploration of new threats and risks to security of data that has little or no reasoning

iii. Severity of risk to privacy employee data

Comprehensive privacy risk assessment with excellent severity ratings

Thorough privacy risk assessment with very good severity ratings

Detailed privacy risk assessment with good severity ratings

Adequate privacy risk assessment with reasonable severity ratings

Incomplete or inadequate privacy risk assessment with poor or no severity ratings

3. Digital Identity issues
 
Comprehensive exploration of digital identity threats and risks that includes well thought out reasoning

Thorough exploration of digital identity threats and risks that includes good reasoning

Detailed exploration of digital identity threats and risks that includes some good reasoning

Adequate exploration of digital identity threats and risks that includes some reasoning

Inadequate or incomplete exploration of digital identity threats and risks that includes poor or no reasoning

4. Provider issues

Comprehensive exploration of provider operations issues that includes well thought out reasoning

Thorough exploration of provider operations issues that includes good reasoning

Detailed exploration of provider operations issues that includes some good reasoning

Adequate exploration of provider operations issues that includes some reasoning

Inadequate or incomplete exploration of provider operations issues that includes no or poor reasoning

5. Data sensitivity issues

Comprehensive exploration of data sensitivity issues that includes well thought out reasoning

Thorough exploration of data sensitivity issues that includes good reasoning

Detailed exploration of data sensitivity issues that includes some good reasoning
 
Adequate exploration of data sensitivity issues that includes some reasoning

Inadequate or incomplete exploration of data sensitivity issues that includes little or no reasoning

You are to provide a written report in Word format with the following headings:

Security of Employee Data
Privacy of Employee Data
Digital Identity Issues
Provider Solution Issues
Data Sensitivity
Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

up arrow icon

Upload
Unique Document

Clipboard Icon

Document
Under Evaluation

wallet

Get Money
into Your Wallet

Total 20 pages

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2021). ITC568 Cloud Privacy And Security. Retrieved from https://myassignmenthelp.com/free-samples/itc568-cloud-privacy-and-security/the-cloud-computing-security-and-privacy.html.

My Assignment Help (2021) ITC568 Cloud Privacy And Security [Online]. Available from: https://myassignmenthelp.com/free-samples/itc568-cloud-privacy-and-security/the-cloud-computing-security-and-privacy.html
[Accessed 07 June 2023].

My Assignment Help. 'ITC568 Cloud Privacy And Security' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/itc568-cloud-privacy-and-security/the-cloud-computing-security-and-privacy.html> accessed 07 June 2023.

My Assignment Help. ITC568 Cloud Privacy And Security [Internet]. My Assignment Help. 2021 [cited 07 June 2023]. Available from: https://myassignmenthelp.com/free-samples/itc568-cloud-privacy-and-security/the-cloud-computing-security-and-privacy.html.


Stuck on Any Question

Our best expert will help you with the answer of your question with best explanation.

question

Writing Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

loader
250 words
Error goes here

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Other Samples
icon
5% Cashback

On APP - grab it while it lasts!

Download app now (or) Scan the QR code

*Offer eligible for first 3 orders ordered through app!

screener
ribbon
callback request mobile
Have any Query?
close
Subtraction Payment required!

Only one step away from your solution of order no.