Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

This assignment is designed to stimulate critical thinking outside of the classroom by requiring students to write a formal academic report. You will need to follow the AREA process described in chapters 2 and 3 of Your Business Degree (prescribed textbook for COIT20233) to analyse the assessment task, research relevant information, evaluate the information you find and to write an academic report in which you present your findings or outcomes and make recommendations on future practice. This assessment task will assess your skills in critical thinking, researching information, forming an opinion, academic writing, logical ordering of ideas and your ability to support your arguments with quotes from literature. These objectives will be measured by the ‘closeness of fit' to meeting the assessment task, assessment requirements and assessment criteria listed below.

Please note that there is a wealth of material available on the Libguide website for this course that you should use to help you gather and evaluate relevant information for writing your report (http://libguides.library.cqu.edu.au/coit20233).

Assessment task

Students are required to write an academic report as per the format outlined in chapter 5 of the textbook. The report must follow Harvard citation and referencing guidelines. Please note that the prescribed textbook uses APA referencing guidelines. See also the Referencing Style subsection below.

The report is to be based on the following scenario about security and privacy in cloud computing.

Recently increased use of mobile devices and the growth of the Internet in current business practices have led to the provision of Cloud Computing which relies on sharing computing resources rather than having local servers or personal devices handle software applications. Cloud Computing can be thought of as many different computers pretending to be one computing environment. It provides the delivery of computer and storage resources as a service to end-users using the Internet.

There is a significant benefit to organisations in the leverage of Cloud Computing services, not least of which is the potential for significant cost savings. But security concerns have led organisations to be wary of moving critical resources to the Cloud. Businesses and individuals are concerned about how security and integrity of their data can be maintained in this new environment. Providers of Cloud Computing argue that they have in place security benefits which they offer to their customers who choose to move their data and information systems to the Cloud.

For more information on Cloud Computing watch this video entitled "Cloud Computing in Plain English":

http://www.youtube.com/watch?v=txvGNDnKNWw

You are the ICT manager of a large organisation (1000 employees) based in Melbourne. Your supervisor has asked you to research Cloud Computing and write a report to be presented at the next executive meeting. You are required to prepare a report that explores:

1. The advantages and disadvantages to an organisation of using Cloud Computing, for example, the potential to reduce costs, the risk of making the organisation's data more vulnerable to hacking.

2. The security implications for staff and customers of the organisation.

3. The opportunities to grow the business using Cloud Computing.

Your report should include recommendations that provide guidelines for the organisation with respect to implementing Cloud Computing practices.


Attachment:- assignment.docx

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9896747
  • Price:- $70

Priced at Now at $70, Verified Solution

Have any Question?


Related Questions in Computer Engineering

We can sort a given set of n numbers by first building a

We can sort a given set of n numbers by first building a BST containing these numbers (using insertion operations on each element one by one), and then printing the numbers by an inorder traversal. What are the worst cas ...

Computer sciencewhat is required of an organization to

Computer Science What is required of an organization, to implement and maintain IT Governance? What outside resources are available to assist technology managers in the implementation and maintenance process?

Question the states of california arizona new mexico utah

Question : The States of California, Arizona, New Mexico, Utah, and Nevada each send a team of 6 delegates to the Sounth Western States annual conference. A sub commitee of 9 is to be formed to discuss water rights. How ...

Question 1 where to be careful when using cloud services2

Question: 1. Where to be careful when using cloud services? 2. What are those cloud essential characteristics in "The U.S. NIST Definition of Cloud Computing"? The response must be typed, single spaced, must be in times ...

Describe how to discover cookies on web browsers what is a

Describe how to discover cookies on web browsers. What is a reverse DNS lookup and can it be used when attacking the network.

Please discuss the design principles that guide the authors

Please discuss the design principles that guide the authors of instruction sets in making the right balance. Provide examples of application of each of the three design principles while designing instruction sets.

Question two paragraphs eachseparate responds1 uml and omg

Question: TWO PARAGRAPHS EACH SEPARATE RESPONDS 1. "UML and OMG" Please respond to the following: Identify the benefits that UML brings to the software development industry. Speculate UML's development and its future inf ...

Reading the biographybook where the body meets memory by

Reading the Biography Book : "Where the Body Meets Memory" by David Mura Questions: The internment camps were a very painful experience for Japanese Americans. They were also a very important and awkward chapter in Ameri ...

Question 1conduct research to determine three types of

Question: 1. Conduct research to determine three types of computer crime. Please provide a detailed description for all crimes, and share an example of where an organization was impacted by each of the types. 2. Elaborat ...

In class i described the methods used to create gas and

In class, I described the methods used to create gas and gasoline from the carbon in coal. The other ingredients were water and heat energy. First we made 'coal gas' from the carbon in coal  C + H2O → H2 + CO  Then we us ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As