logo

IT Risk Management - Report (Doc)

23 Pages6055 Words34 Views
   

Added on  2020-03-16

IT Risk Management - Report (Doc)

   Added on 2020-03-16

ShareRelated Documents
Running head: IT RISK MANAGEMENT
IT Risk Management
Name of the Student
Name of the University
Author’s Note:
IT Risk Management - Report (Doc)_1
1IT RISK MANAGEMENT
Table of Contents
Introduction......................................................................................................................................3
Discussion........................................................................................................................................4
Migration of Database to Cloud..................................................................................................4
Financial Service Sectors.............................................................................................................5
Security Posture...........................................................................................................................6
Probable Security Risks and Threats...........................................................................................9
Conclusion.....................................................................................................................................14
References......................................................................................................................................17
IT Risk Management - Report (Doc)_2
2IT RISK MANAGEMENT
Executive Summary
The main aim of this report is to understand the case study of Aztek. Aztek is an organization
that does its task in the AFSS or Australian Financial Services Sector. The superior executives in
both the business divisions and technology within the organization have gathered a particular
collection of various projects or specifically have taken various decisions from the relevant
strategists, who would be extremely helpful for the company and funding can be easily done for
the deployment. These strategies or the decisions normally involve various projects like the
allowing of the employees for bringing their own typical devices. These particular devices
usually include the tablets, their laptops and the mobile phones in their particular workplace and
all the devices to be used as the main or the major devices for the completion of their tasks in the
work and attaining the goals and objectives of the organization. The second decision that the
company has taken is for the migration of databases, data sources or the applications to a specific
cloud hosting solution externally. The third decision that is undertaken by them is the
outsourcing of the main functions of information technology. These functions usually include the
management of desktop, the development of applications or the network to a particular third
party. The last project is the up gradation, update or introduction of the major technologies like
the platforms and applications of the mobile and the migration of the networking technology,
which is improved. The typical example is the IPv6 or Internet Protocol Version 6. Moreover, a
corporate wide email archive is to be created for the purpose and benefits of compliances, up
gradation and updating the operating systems of desktop and several applications. The objective
of this typical report is to recognize the relevant risks that can occur in the company when the
applications and databases are migrated to an external cloud service. Moreover, the following
IT Risk Management - Report (Doc)_3
3IT RISK MANAGEMENT
report also focuses on the measures that can be taken to reduce the security threats,
vulnerabilities and risks involved in information system of Aztek.
IT Risk Management - Report (Doc)_4
4IT RISK MANAGEMENT
Introduction
Cloud computing is the process or technique, which acts as the tool or technique for
transferring any type of confidential data or information or any type of services that are related to
computing. These various services of computing are of several types (Dinh et al., 2013). The
services include analytics, storage, servers, networking or even software. Several other services
are also present in cloud computing. The companies or organizations, which help in providing
the above mentioned services within the cloud, are called the cloud providers or the providers of
the cloud. These particular companies or organizations get money after providing the services of
cloud computing (Chaisiri, Lee & Niyato, 2012). This is most used technology in today’s world.
It is the best technology for transferring any data with security. The major advantage or benefit
of cloud computing is that it does not incur much cost and is affordable by all organizations. This
particular advantage makes cloud computing much popular and acceptable by almost all
organizations and companies. The second advantage of cloud computing is that it provides
security to the data that is to be transferred. Intrusion is prevented by the utilization of cloud
computing (Garg, Versteeg & Buyya, 2013). Aztek is an organization, which does its operation
in the Australian Financial Services Sector. The senior executives in both the technology and
business divisions within the company have collected a collection of several projects or rather
have taken certain decisions from the respective strategists that would be helpful for the
organization and could be easily funded for the deployment. The decisions or the strategies
include several projects such as the enabling the employees for bringing their own devices (Lee
& Zomaya, 2012). These devices include the laptops, their tablets and their mobile phones in
their respective workplace and the devices to be utilized as the major or the main devices in
completing their tasks in the work and achieving the organizational goals and objectives. The
IT Risk Management - Report (Doc)_5
5IT RISK MANAGEMENT
second decision undertaken by the company is to migrate their all of the applications, databases
or data sources to a cloud hosting solution externally. The third decision is to outsource the
major functionalities of information technology (Almorsy, Grundy & Müller, 2016). These
functionalities include the development of applications, management of desktop or the network
to a specific third party. The final project is to upgrade, update or introduce the main
technologies like the applications and platforms of mobile and to migrate to the networking
technology that is improved. The example is Internet Protocol Version 6. Moreover, a corporate
wide email archive is to be created for the purpose and benefits of compliances, up gradation and
updating the operating systems of desktop and several applications (Gampala, Inuganti &
Muppidi, 2012). These projects will help Aztek to achieve its organizational goals and
organizations.
The following report covers the project of migration of database to the cloud for Aztek.
They have decided to migrate their database to the cloud (Gupta, Seetharaman & Raj, 2013).
There are various cloud infrastructures and platforms present in the market and Aztek have
decided to select one of them. However, there are always some of the major risks and threats in
the cloud and cloud infrastructure (Lee & Zomaya, 2012). The report covers the effective
decision making for the migration of data. Moreover, security postures, the probable risks,
vulnerabilities and threats are also mentioned here. The data security is also given in the report.
Discussion
Migration of Database to Cloud
Migration of data to the cloud would be one of the best decisions for Aztek. Database
migration helps to reduce the overall risk or threat for risks related to data like the loss of data
IT Risk Management - Report (Doc)_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Risk Assessment Report for Aztek's Technology Decision
|2
|990
|458

Regulatory Measures and Best Practice
|20
|5821
|53

Bring your own device (BYOD) in workplace project Description: Aztek
|14
|6141
|64

Risk Assessment Plan for Aztek Financial Services
|19
|5174
|378

Cloud Security and Risk
|19
|5365
|373

IT Risks Management of an Organisation Assignment
|21
|4910
|35