Dalis Consultants Table of Contents Introduction...........................................................................................................................................2 High-level System Description..............................................................................................................2 Logical Representation of the Major Systems.......................................................................................2 Network Topology Diagram..................................................................................................................3 Use of Cloud Computing.......................................................................................................................4 Approach to Internet Connectivity........................................................................................................5 Hardware Procurement Policy...............................................................................................................6 Purpose..............................................................................................................................................6 Scope.................................................................................................................................................6 Guidelines..........................................................................................................................................6 List of Hardware to be procured........................................................................................................7 Roles & Responsibilities....................................................................................................................8 Software Applications Policy................................................................................................................8 Purpose..............................................................................................................................................8 Scope.................................................................................................................................................8 Guidelines..........................................................................................................................................8 List of Software Applications to be purchased..................................................................................9 Roles & Responsibilities....................................................................................................................9 Security Strategy.................................................................................................................................10 Administrative Controls...................................................................................................................10 Logical or Technical Controls.........................................................................................................10 Physical Security Controls...............................................................................................................11 References...........................................................................................................................................12 1
Dalis Consultants Introduction Dalis Consultants is a Wellington based small multi-media consultancy and is owned by Dave & Lisa Evans. The company was set up in the year 2010 to provide consultancy to the small and medium scale companies for improvement in the online digital presence. With the expansion of the business operations, it is now becoming difficult to manage the current human and non-human resources. The company has recently won a contract with a major tourism agency and there will be four new staff members required to be engaged for the project. The company has therefore decided to move to the town and the company will meet the new opportunities through Activity Based Working (ABW) strategy. High-level System Description The high-level system will be based on the cloud architecture and network. There will be data servers present on the cloud that will be synced with the virtual network. Gateway will be used to connect to the on-premises network of Dalis Consultants which will comprise of the virtual machines. Each of these virtual machines network will be connected to the router and these routers will be connected with a switch. The switch and the gateways will connect and communicate with each other to establish a connection between cloud and on-premises network. The virtual machines present on the on-premises network will include the hardware as Laptops, Computer Systems, Personal Digital Assistants (PDAs), and Printers. The operating systems that will be deployed on the laptops and computer systems in Dalis Consultants site will include Windows, Macintosh, Linus, and UNIX. There will be business applications as development tools, design tools, testing tools, Big Data tools, database engines, and implementation tools. Logical Representation of the Major Systems The database servers that will be used for the system will be Microsoft SQL Server, MySQL, and NoSQL databases, such as MongoDB. Apple Filing Protocol (APF) and Network File System (NFS) are the file servers that will be involved in the system. Microsoft Exchange Server is the exchange mail server that will be utilised in this case. The firewalls that will be used in this case will be packet filtering firewalls and application level gateways. Networking peripherals, such as routers, switches, and gateways will be involved. 2
Dalis Consultants Network Topology Diagram The network architecture and diagram has been shown below. There are various cloud models that have been developed, such as Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). The model that will be used in this case will be Software as a Service (SaaS) (Kulkarni, 2012). There will be data servers present on the cloud that will be synced with the virtual network. Gateway will be used to connect to the on- premises network of Dalis Consultants which will comprise of the virtual machines. Each of these virtual machines network will be connected to the router and these routers will be connected with a switch. The switch and the gateways will connect and communicate with each other to establish a connection between cloud and on-premises network. The virtual machinespresentontheon-premisesnetworkwillincludethehardwareasLaptops, Computer Systems, Personal Digital Assistants (PDAs), and Printers. 3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Dalis Consultants Use of Cloud Computing The cloud computing model that will be used in the case of Dalis Consultants shall be Software as a Service (SaaS). SaaS is defined as a model in which the software is owned and delivered by the cloud vendor. The delivery of the software code and services is made on the basis of common data definitions and codes. The pay per use or subscription pricing model is used in this case of cloud model. There are various reasons that are present behind the recommendation of SaaS as the cloud model for Dalis Consultants. The approach that Dave and Lisa have decided to go for will be Activity based Working. The requirements in this case will be dynamic and may change rapidly (Tan, Liu, Sun & Spence, 2013). The company therefore will not be required to purchase too many additional hardware tools and equipment as the applications and services will be hosted by the cloud vendor and providers. The vendor will arrange for the Application Programming Interface (APIs) to allow Dalis Consultants to carry out their activities. Pay per Use model will be involved as a pricing model that will make sure that the overall model and itsassociatedservicesarecost-effective(Palos-Sanchez,Arenas-Marquez&Aguayo- Camacho, 2017). The ready-to-use time involved in this case will be less. The tourism agency that is the new clientfor the company will want the development, deployment,and implementation activities to begin quickly. SaaS model will ensure that rapid demonstrations 4
Dalis Consultants and prototyping is quickly done. Technology is witnessing several changes with each passing day. The dynamic needs of Dalis Consultants along with the requirement of technology will be met by SaaS model as the updates and security patches will be released by the vendor at regular intervals. The management of these upgrades and security will be the responsibility of the vendor and any security occurrences will also be handled by the cloud provider. SaaS models also have higher adoption rates and lower learning curves as compared to PaaS and IaaS. Scalability is another primary reason and benefit that is associated with the SaaS model. It may be necessary to keep the applications and services scaled up or down as per the requirement (Garon, 2011). Approach to Internet Connectivity Virtual Private Networks (VPN) will be used for internet connectivity. It will provide long- distance and secure connections to allow Dalis Consultants to establish a secure network infrastructure. The primary reason behind the recommendation of VPN for the company is the enhanced security that comes along with it (Sobh & Aly, 2011). There are various security threats and attacks that are observed in associated with the cloud networks and architectures. The use of VPNs will make sure that the data and information sets are encrypted and are kept protected at all times. Remote access, monitoring, and control will be possible for Dave, Lisa, and other senior resources in the company with the aid of a VPN. It may also be required for the company to share files with the tourism agency and other clients for longer periods of time. Such utility will be securely made possible through a VPN. These networks will also provide enhanced performance and bandwidth along with anonymity that may be required in certain scenarios. The maintenance cost that is associated with VPNs is generally low as compared to the other network connections. In this case these networks will be implemented and managed by a third-party and therefore surveillance and network setup will not be an issue (Kim & Yang, 2010). High-speed fibre optic transmission will be used for transmitting the information. It will offer the benefits as: ๏ทExtremely High Bandwidth: The other transmission mediums, such as coaxial cables and twisted pair cables do not offer the bandwidth as high as the one offered with fibre optics. Transmit per unit time that comes along with these cables is the best. 5
Dalis Consultants ๏ทLonger Distance: There is low power loss that is associated with the fibre optics which indicates that the long distance transmissions can be easily carried out. ๏ทResistance to Electromagnetic Interference and virtually noise free. ๏ทLow Security Risk: There is a lot of concern regarding the data security risks and attacks and the use of fibre optics will provide alternate mechanism which will lead to the prevention and control of the data security risks as well. ๏ทSignal Transmission. There is a use of light in the transmission of data or signals through fibre optics. As a result, the chances of data leakage or breaches are nullified providing a highly secure infrastructure (Al-Lawati, 2015). ๏ทSmallSize:Thesecablescomewithanextremelysmalldiameter.Thesingle multimode fibre comes with a diameter of about 2mm which is way smaller as compared to that of coaxial copper cable. This leads to enhanced space savings and better utilization. Cisco Wi-Fi router will be used for establishing the network connectivity and it will be connected with the virtual machines as laptops, printers, computer systems, and other network peripherals. It will provide enhanced mobility and connections along with the improved responsiveness and better access to the information and data sets. Hardware Procurement Policy Purpose The purpose of the procurement policy is to highlight the terms, conditions, and matters of agreement that will be considered as legal guidelines during the purchase of hardware necessary for new set-up of Dalis Consultants. Scope The scope of the policy is limited to the purchase of hardware tools and equipment necessary for Dalis Consultants. Guidelines ๏ทThe head of IT will provide the list of the hardware that shall be procured and it would be essential to attach an IT Procurement Authorization form with each tool or equipment. The userโs line manager must sign and approve the same. 6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Dalis Consultants ๏ทA receipt of the form will be shared with the IT department and an acknowledgement of the same shall be shared followed by processing. ๏ทThe decision on the rejections or approvals of the requirements will be with the Head of IT. ๏ทThe decision of either acceptance or denial of a request by the Head of IT shall come along with a brief description and explanation behind the decision. ๏ทIn case of the change in quantity or type of the equipment then the IT needs to provide a confirmation on the changes to the suppliers. ๏ทThe preferred list of the suppliers for each of the equipment shall be shared with the procurement team. However, it must not be mandatory to go for the same set of suppliers. A market study shall be done as well (Hofstra, 2015). ๏ทThe equipment and tools procured shall be first sent to the IT department wherein it shallbecheckedintermsofadherencetotheorderedquantityandproduct specifications. Any sorts of damage will also be verified in this stage and the equipment will then be transferred to its designated unit. ๏ทThe delivery of the equipment from the IT department to the designated unit will be arranged by the IT department itself. ๏ทThe installation of the equipment and notification to the management regarding the completion of the delivery will be performed by the resources in the IT department. ๏ทThe set procedure will be followed in the process of configuration and installation and the security guidelines and protocols must also be followed during the process. ๏ทA third-party contractor shall also be present at the time of installation and shall assist the IT staff in the process. The regulatory, security, and quality standards and guidelines shall be followed. List of Hardware to be procured ๏ทGateway will be used to connect to the on-premises network of Dalis Consultants which will comprise of the virtual machines. ๏ทEach of these virtual machines network will be connected to the router and these routers will be connected with a switch. ๏ทThe switch and the gateways will connect and communicate with each other to establish a connection between cloud and on-premises network. ๏ทThe virtual machines present on the on-premises network will include the hardware as Laptops, Computer Systems, Personal Digital Assistants (PDAs), and Printers. 7
Dalis Consultants Roles & Responsibilities ๏ทHead of IT: Approval/Rejection of the purchase orders along with explanation of the decision that is made. ๏ทITManager&Staff:Assistanceintheconfigurationandinstallationprocess, verification of the equipment received ๏ทUserโs Line Manager: Assurance that the procurement processes adhere to the policy and the standards specified. ๏ทSupplierโs Head: Negotiations with the suppliers and contractors ๏ทMarket Analyst: Analysis of the market data and information on the hardware equipment performing the best and suitable for the company Software Applications Policy Purpose The purpose of the policy is to make sure that the software applications to be used and implemented in the organization are adequately done. Scope The scope of the policy is to provide the guidelines on the configuration, purchasing, licensing, and implementation of software applications. Guidelines ๏ทThe CIO will provide the list of the software that shall be purchased and it would be essential to attach an Software Requirements Form along with the same. ๏ทA receipt of the form will be shared with the IT department and an acknowledgement of the same shall be shared followed by processing. ๏ทThe decision on the rejections or approvals of the requirements will be with the CIO. ๏ทThe decision of either acceptance or denial of a request by the CIO shall come along with a brief description and explanation behind the decision. ๏ทIn case of the change in specifications or type of the software package then the IT needs to provide a confirmation on the changes to the suppliers. ๏ทThe preferred list of the suppliers for each of the software shall be shared with the procurement team. However, it must not be mandatory to go for the same set of suppliers. A market study shall be done as well. 8
Dalis Consultants ๏ทThe software packages purchased shall be first sent to the IT department wherein it shallbecheckedintermsofadherencetotheorderedquantityandproduct specifications.Anysortsofcompatibilityortechnicalissuesshallbereported immediately. ๏ทThe configuration of the software package from the IT department to the designated unit will be arranged by the IT department itself. ๏ทThe installation of the software application and notification to the management regarding the completion of the delivery will be performed by the resources in the IT department. ๏ทThe set procedure will be followed in the process of configuration and installation and the security guidelines and protocols must also be followed during the process. ๏ทA third-party contractor shall also be present at the time of installation and shall assist the IT staff in the process. The regulatory, security, and quality standards and guidelines shall be followed. ๏ทThe licensing and warranty details shall be validated. List of Software Applications to be purchased ๏ทDatabaseEnginesandServers:MicrosoftSQLServer,MySQLDatabase,and MongoDB NoSQL Cloud Database. ๏ทDevelopment&DesignTools:MicrosoftVisualStudio,AdobeDreamviewer, Microsoft Visio. ๏ทTesting Tools: HP Quality Centre, Bugzilla, TestLink ๏ทMicrosoft Project ๏ทOperating Systems: Windows, Macintosh, Linux, UNIX Roles & Responsibilities ๏ทCIO: Approval/Rejection of the purchase orders along with explanation of the decision that is made. ๏ทIT Department: Assistance in the configuration and installation process, verification of the software package received ๏ทSupplierโs Head: Negotiations with the suppliers and contractors ๏ทMarket Analyst: Analysis of the market data and information on the hardware equipment performing the best and suitable for the company ๏ทLegal Representative: Verification on the licensing and warranty requirements 9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Dalis Consultants Security Strategy There are a number of security risks and attacks that may take place with the decision that has been taken by Dave and Lisa. It is because the use and involvement of cloud architecture and networks will lead to the presence of a number of access points. These access points may be utilized by the malevolent entities to give shape to the security attacks. The common attacks that may occur include malware attacks, eavesdropping attacks, data breaches and leakage, exploitation of vulnerabilities, account hacking, man in the middle attacks, spoofing attacks, SQL injection attacks, denial of service attacks, distributed denial of service attacks, and phishing attacks (Rabai, Jouini, Aissa & Mili, 2013). The security strategy that the organization shall follow and implement has been explained using the three types of controls that shall be used. Administrative Controls These shall include the development of an Information Security Plan & Policy for the company. This document shall list out all the possible types of security attacks that may take place along with the control strategy that shall be used for dealing with the same. The information on the security roles and responsibilities shall also be specified so that there are no risks regarding the communication gaps and confusions among the resources. The Chief Information Security officer, Security Manager and senior advisors shall also carry out security audits and reviews. The adherence to the security protocols and standards shall be verified in this process (Julisch & Hall, 2010). Logical or Technical Controls There are a number of logical and technical controls that may be used and must be implemented to deal with the security risks and attacks. The primary set of tools include anti-malware and anti-denial tools to avoid and prevent the attacksby viruses, ransomware, adware, and other forms of malwarealong with the prevention against the denial of service attacks. There shall also be use of encryption mechanisms as well on the data and information sets. The proposed architecture makes use of Virtual Private Networks that will enhance the same. The use of encryption algorithms such as advanced encryption algorithm, hashing algorithms, multi-path asymmetric encryption, etc. shall be used. There are also multiple attacks that may take place due to network access points. These shall be avoided, detected, and controlled with the use of network-based 10
Dalis Consultants intrusion detection and prevention systems, network logs, automated network monitors and scanners (Srivastava & Kumar, 2015). The use of multi-fold authentication and advanced access control measures will be extremely essential. It is because the case of data breaches and leakages may occur because of the violation of the authorization principles. There are newer forms of access control measures such as role based and attribute based access control that shall be used along with the use of Biometric recognition and single sign on and one time passwords for authentication. There are scenarios that occur with the involvement of cloud computing that lead to the violation of security principles. There shall be disaster recovery schemes and plans that must be developed by the organization to be ready with the strategies for damage control and recovery. There shall also be backup plans and schemes ready along with automated backup of the data and information sets that are used. Physical Security Controls It is often seen that physical security is now disregarded with the advancement of technology. However, Dalis Consultants must place security guards and personnel at the entry and exit points to make sure physical security violation is not occurred. There shall also be measures that must be taken for physical security of the devices that are used along with the data centres and server rooms that will be set up in the new location. 11
Dalis Consultants References Al-Lawati, A. (2015). Fiber optic submarine cables cuts cost modeling and cable protection aspects.Optical Fiber Technology,22, 68-75. doi: 10.1016/j.yofte.2015.01.009 Garon, J. (2011). Navigating Through the Cloud รขโฌโ Legal and Regulatory Management for Software as a Service.SSRN Electronic Journal. doi: 10.2139/ssrn.2025246 Hofstra.(2015).InformationTechnologyProcurementPolicy.Retrievedfrom https://www.hofstra.edu/pdf/about/it/it_equipment_purchasing_policy.pdf Julisch, K., & Hall, M. (2010). Security and Control in the Cloud.Information Security Journal: A Global Perspective,19(6), 299-309. doi: 10.1080/19393555.2010.514654 Kim, K., & Yang, H. (2010). VPN (Virtual Private Network) SW's examination example analysis.Journal Of The Korea Academia-Industrial Cooperation Society,11(8), 3012-3020. doi: 10.5762/kais.2010.11.8.3012 Kulkarni, G. (2012). Cloud Computing-Software as Service.International Journal Of Cloud Computing And Services Science (IJ-CLOSER),1(1). doi: 10.11591/closer.v1i1.218 Palos-Sanchez, P., Arenas-Marquez, F., & Aguayo-Camacho, M. (2017). Cloud Computing (SaaS) Adoption as a Strategic Technology: Results of an Empirical Study.Mobile Information Systems,2017, 1-20. doi: 10.1155/2017/2536040 Rabai, L., Jouini, M., Aissa, A., & Mili, A. (2013). A cybersecurity model in cloud computingenvironments.JournalOfKingSaudUniversity-ComputerAnd Information Sciences,25(1), 63-75. doi: 10.1016/j.jksuci.2012.06.002 Sobh, T., & Aly, Y. (2011). Effective and Extensive Virtual Private Network.Journal Of Information Security,02(01), 39-49. doi: 10.4236/jis.2011.21004 Srivastava, H., & Kumar, S. (2015). Control Framework for Secure CloudComputing. Journal Of Information Security,06(01), 12-23. doi: 10.4236/jis.2015.61002 Tan, C., Liu, K., Sun, L., & Spence, C. (2013). A design of evaluation method for SaaS in cloud computing. Retrieved from http://dx.doi.org/10.3926/jiem.661 12