New User? Start here.
Error goes here
Please upload all relevant files for quick & complete assistance.
The management of DSI based on cloud architecture evaluations has decided to implement ICT applications in their OSDS suite in SaaS model and in their hybrid cloud model. In the DSI cloud migration planning, SaaS delivery model is preferred for OSDS suite because it offers redundant resources for application implementation and can provide interoperability with any type of user operating systems. In hybrid model, private cloud is a highly secured infrastructure which is meant for internal users in government departments that make use of spatial information. This report focuses on assessment for deployment model, risk management and security issues for OSDS applications along with evaluating the technical management of cloud and service level agreements (SLA) agreed with the cloud provider. The management requirements are highlighted for the chosen cloud provider in terms of remote administration, resource provisioning, backup and disaster recovery (DR) and SLAs. The assessments are discussed in the next sections.
Since cloud service models are outsourced infrastructure and managed by a cloud service provider, the IT resources needed by DSI must be configured, administered and monitored for their usage. These management mechanisms in clouds facilitate control of IT resources as required by DSI and are the main elements of cloud technology architectures (Erl, Ricardo, & Zaigham, 2013) required for the OSDS suite of applications. Cloud management will cover the aspects of emote administration, resource management and SLA management.
The tools and UI for remote management can be used by DSI’s IT department to configure and monitor resources on the cloud. In order to have maximum benefit of cloud platform, the organization can make use of cloud operational checklists provided by Morad and Dhalbajan. The checklists can be used by DSI to support their cloud assessment needs. There are two types of checklists based on the maturity level and application development requirements. They are the basic operations checklist and the enterprise operations checklist (Morad & Dalbhanjan, 2013).
The basic operation checklist will allow DSI to the service model of SaaS and hybrid deployment model, the following assessment is made related to cloud DSI to evaluate their use of specific services needed for OSDS application suite before they are migrated to the cloud. The enterprise operations checklist will support to identify key elements related to DSI’s operational strategy and migration. The assessments performed by DSI related to cloud migration will include,
The enterprise operational checklist for DSI will cover the assessments for hybrid cloud usage to include,
The above checklists by Morad and Dhalbajan provide an assessment checklist which supports DSI in assessing and managing their cloud requirements and migration.
Resource management system allows DSI to perform IT resources, mostly the management of physical hardware. Some of the tasks for assessment here include management of servers, virtual servers, physical infrastructure management, and resilience and failover systems. These actions are jointly coordinated by both, DSI and cloud provider (Younge, Laszewski, Wang, Lopez-Alarcon, & Carithers, 2010).
SLA management (CSI, 2015) for DSI will include defined mechanisms for monitoring cloud deployment and provide features for administration, collection and storage, reporting and runtime notifications of SLA data.
The term disaster recovery (DR) has many forms and can occur unexpectedly. This is because IT systems are vulnerable to threats, both internal (human error), external (hackers) and hazards posed by natural environment (floods, earthquakes, etc.) (Krutz & Vines, 2010). A comprehensive DR plan is required by DSI must be aimed at protecting data and vital information from any type of vulnerability, and DR planning is unique for each organization. The DR planning and backup procedures must effectively restore critical functions in the event of any unplanned disruption. Morad and Dhalbajan checklist highlights the need for assessing backup procedures and disaster recovery measures (Kandukuri, Paturi, & Rakshit, 2009). In addition to this checklist, the key elements for DSI to consider in their disaster measures will include,
Normally, assessments for backup and DR for resilience will include the following areas:
Backup and disaster recovery is a critical area in cloud migration which must be considered by DSI prior to migration of OSDS applications.
SLAs come into play to make sure the services offered by a cloud provider are delivered as agreed with DSI. SLA has become a pre-requisite due to cloud business strategy and provides series of rules and directives (Hoehl, 2015) that must be taken by DSI to evaluate and agree on operating terms with service provider. SLAs will also include a set of non-functional requirements in cloud services. An example of SLA can be the return of operations (RTO) within 60 minutes in the event of any service failure in the cloud. SLAs in cloud must be assessed for their,
SLAs management normally follows the monitoring of SLA data based on already defined resource and performance metrics and reporting parameters. Cloud migrations for any type of business process must follow bet practices in risk management. The practices must also be in conformance to particular cloud service and business critical processes that deal with sensitive information. The SLA data can be made available on real time for cloud usage and administration through remote management in active cloud services. The SLA guideline provided by (Erl, Ricardo, & Zaigham, 2013) on cloud computing services includes the risk assessments in cloud migration and planning.
Assessments related to DSI enterprise risk management (CSA, 2009) will include,
SLA management and assessments are important for DSI because they provide the operational management aspects in day to day cloud usage. SLAs are important to note further that SLAs must focus more on reducing risks and protecting OSDS applications with the cloud provider.
The report highlights the importance of evaluation in cloud migration for DSI. Since cloud services are decided by the cloud provider it is important the SLAs are defined to suite the best interests of DSI. The assessments and methods for remote monitoring, backup and OSDS resiliency, and the importance of assessing SLAs prior to cloud migration are explored and discussed.
Alhazmi, O. H., & Malaya, Y. K. (2013). Evaluating Disaster Recovery Plans Using the Cloud . IEEE Computer society , 1-6.
AWS. (2016, June). Expanding Your Scaled and Load-Balanced Application to an Additional Availability Zone. Retrieved June 4, 2016, from Amazon Web Services: https://docs.aws.amazon.com/autoscaling/latest/userguide/as-add-availability-zone.html
CSA. (2009). Security Guidance for Critical Areas of Focus in Cloud Computing V2.1. Cloud Security Alliance.
CSI. (2015). Practical Guide to Cloud Service Agreements, Ver2.0. Cloud Standards Customer Council.
Erl, T., Ricardo, P., & Zaigham, M. (2013). Cloud Computing: Concepts, Technology & Architecture. USA: The Prentice Hall Service Technology Series.
Hoehl, M. (2015). Proposal for standard Cloud Computing Security SLAs – Key Metrics for Safeguarding Confidential Data in the Cloud. Security SLA for Cloud. The SANS Institute.
Jin, H.-Q., & Liang, M.-G. (2014). The Hierarchical Network Topology Management System based on Managed Object and View Mechanism. AASRI Conference on Circuit and Signal Processing (CSP 2014) (pp. 12-18). Elsevier B. V.
Kandukuri, B. R., Paturi, R. V., & Rakshit, A. (2009). Cloud Security Issues. IEEE International Conference on Services Computing, IEEE Computer Society , 517-520.
Krutz, R. L., & Vines, R. D. (2010). Cloud Security: A Comprehensive Guide to Secure Cloud Computing. New York: Wiley Publishing.
Martignoni, L., Poosankam, P., Zaharia, M., Han, J., McCamant, S., Song, D., et al. (2012). Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems. Report by University of California, Berkeley and Carnegie Mellon University.
Martin, B. C. (2002). Disaster Recovery Plan Strategies and Processes. SANS Institute, InfoSec Reading Room.
Morad, S., & Dalbhanjan, P. (2013). Operational Checklists for AWS. Amazon Web Services (AWS).
Nageswararao, & Khetmalas, M. B. (2014). Cross-Cloud Testing Strategies Over Cloud Computing . International Journal of Engineering Research and Applications , 79-82.
Ranjan, A., Gupta, S. K., & Sharma, G. (2015). Cloud Computing based Disaster Recovery: An Introduction. International Journal of Advanced Research in Computer Science and Software Engineering , 1015-1019.
Rouse, M. (2010, August). Provisioning. Retrieved June 3, 2016, from What is SOA? SearchSOA: https://searchsoa.techtarget.com/definition/provisioning
Steiner, T. (2012). An introduction to Securing a Cloud Environment. The SANS Institute.
Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications , 1-11.
Younge, A. J., Laszewski, G. v., Wang, L., Lopez-Alarcon, S., & Carithers, W. (2010). Efficient Resource Management for Cloud Computing Environments. Pervasive Technology Institute, Indiana University, Bloomington, USA and Rochester Institute of Technology, Rochester, NY USA.
To View this & another 50000+ free samples. Please put
your valid email id.
Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.
Get Moneyinto Your Wallet
Total 9 pages
*The content must not be available online or in our existing Database to qualify as
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2017). Management, Backup & DR. Retrieved from https://myassignmenthelp.com/free-samples/management-backup-dr.
"Management, Backup & DR." My Assignment Help, 2017, https://myassignmenthelp.com/free-samples/management-backup-dr.
My Assignment Help (2017) Management, Backup & DR [Online]. Available from: https://myassignmenthelp.com/free-samples/management-backup-dr[Accessed 19 May 2022].
My Assignment Help. 'Management, Backup & DR' (My Assignment Help, 2017) <https://myassignmenthelp.com/free-samples/management-backup-dr> accessed 19 May 2022.
My Assignment Help. Management, Backup & DR [Internet]. My Assignment Help. 2017 [cited 19 May 2022]. Available from: https://myassignmenthelp.com/free-samples/management-backup-dr.
The respective sample has been mail to your register email id
* $5 to be used on order value more than $50. Valid for
We have sent login details on your registered email.
MyAssignmenthelp.com is the only dissertation writing help provider in Australia that offers the combination of quality and affordability. Students can take expert advice in selecting suitable dissertation writing topics, structuring dissertation ideas, gathering relevant research material, revising the written paper or even dissertation methodology help. As a result, they don't need to search 'who can do my dissertation', they can straight come to us. They can easily pay our expert for their assignment instead typing 'who can write my dissertation' on search engines.
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Ransom ware virus had recently started a worldwide chaotic outbreak in May of 2017. The warehouse drawbacks and the recommendation for the threats and the ransom ware attacks on how to combat them have compiled in this report for the CFO of Motherboards and More Pty Ltd also discussing about the revenue cycle that is being followed.
Overview of the revenue cycle
The organization, Motherboards, and More Pty Ltd is ...
Risk Assessment Methodology
It is crucial for a leading company in the Information Technology industry to identify and devise the strategies for categorizing and mitigating the risks in order to maintain its position in the global market (Altuhhov, Matulevi?ius & Ahmed, 2013). Various frameworks are needed to be laid out for the minimization of the risks faced by Apple. The methodology for the assessment of risk faced by App...
The emergence and evolution of Information and Communication technology (ICT) has lead to the widespread use of information without much of restriction. People of any age group any demographics can enjoy its benefits without caring much about its adverse effects.
The ethical dilemma identified in the above scenario can be further analyzed with help of Doing Ethics Technique (DET) which allows better insight into the situation by aski...
Aztek has decided to shift to the cloud and they are hoping to shift to the IT can be a blessing for them, the IT services can offer the facilities that can help them to enrich their business activities, the IT services can help them to outsource their services to third-party company and can be largely benefitted, however, they should be mindful of all the risks associated with the IT services (Lam, 2014).
The report wil...
Q1. What's going on?
From the background scenario of the software project development details it has been found that, ethical response are the most important things those are very much necessary to be adopted by the management authority of an organization to satisfy their clients with appropriate services and products as well. Consumers of an organization are the most important asset for any business organization, however it is...
Get top notch assistance from our best tutors ! Excel in your academics & career in one easy click!
ACC539 Accounting Information Systems
ISSC481 IT Security: Planning And Policy
ITC506 Topics In Information Technology Ethics
ITC596 IT Risk Management
SEC 380 Cloud Computing
ENGR9742 Systems Engineering
BA 632 76 Information System Security
ISYS2056 Business Computing 1
ICSK3005 Introduction To Computer Skills
Just refer 5 friends to earn more than $2000.
If you are the original writer of this content and no longer wish to have your work published on Myassignmenthelp.com then please raise the
content removal request.
After the successfull payment you will be redirected to the detail page where you can see download full answer button over blur text.You can also download from there.
Or you can also download from My Library section once you login.Click on the My Library icon
My Library page open there you can see all your purchased sample and you can download from there.
That's our welcome gift for first time visitors
On APP - grab it while it lasts!
*Offer eligible for first 3 orders ordered through app!
ONLINE TO HELP YOU 24X7
OR GET MONEY BACK!
OUT OF 38983 REVIEWS
Received my assignment before my deadline request, paper was well written. Highly