2 Assignments .Cloud Service Plan and Cloud Service Plan Presentation

Cloud Service PlanAssemble and submit the Learning Team deliverables from previous weeks to create an 8- to 10-page Cloud Service plan, including your final project budget, diagram, and project plan/timeline. Finalize any of the drafts the team created in previous weeks.Cloud Service Plan PresentationPrepare and submit a Microsoft® PowerPoint® presentation not more than 10 slides with speaker notes to present your Cloud Service plan to the stakeholders.
draft_budget_team_d.docx

week_3_lt_narrative.docx

Don't use plagiarized sources. Get Your Custom Essay on
2 Assignments .Cloud Service Plan and Cloud Service Plan Presentation
Just from $13/Page
Order Essay

week_4_lt_.docx

wk2_v4.docx

Unformatted Attachment Preview

Cloud Service Plan
1
Cloud Service Plan
Cloud Service Plan
2
MIGRATION DRAFT BUDGET
TASK
G Suite by Google Cloud
Enterprise Premium office suite with advanced controls and capabilities
BitTitan User Migration Bundle
COST
$25 per user
(Google, 2018)
$15 per user
(BitTitan, 2018)
Premium Support for Migration Assistance
(if required)
$200 per hour
Based on migration services provided by QLAN
Inc., CA
Cloud Service Plan
Reference:
Google. (2018). G Suite by Google Cloud. Retrieved from
https://gsuite.google.com/pricing.html?tab_activeEl=tabset-companies
BitTitan. (2018). User Migration Bundle. Retrieved from
https://www.bittitan.com/migrationwiz/user-migration-bundle/
3
Cloud Service Plan
Week 3 LT Narrative
The SaaS Cloud Service we chose is straightforward enough to build an entire business model
off of, not just the IT architecture. The key components to keep in mind are the network, the
infrastructure, databases and servers. Upon successfully migrating to cloud computing, all of
these components will be virtualized, minus the network hardware- router, switches, firewall,
etc. AWS is a great platform for interconnecting all components and centralizing our services
and needs. The Google G-Suite apps make SaaS and business needs cohesive and provides a
chance at reducing costs. This SaaS service is suitable to develop and deploy with cloud services
as AWS as resource and principle business requirements will all be met.
Cloud Service Plan (Security Plan Update)
Cloud Service Plan Draft
With the introduction and advancement in the field of technology, today’s organizations
may use the available local low-level infrastructures with the high-performance cloud
computing elements. Commonly used aspects today, per the cloud computing technologies
include Software as a Service (SaaS). SaaS works together with two more crucial models which
include Platform as a Service (PaaS) and also Infrastructure as a Service (IaaS). Software as a
Service consists of a subscription-based licenses for software being hosted in the cloud.
Some of the critical components of SaaS which also form the core of its overall
functioning include the cloud and the online servers. The cloud assists the users by delivering
the various computing services through a cloud hosted service. The commonly used platform
includes the internet. It then follows that all the various activities and transactions occur over
the public infrastructure. The cloud, in addition, offers to the respective users a chance to build
a customized infrastructure by using the provided software and services.
The components of an SaaS project we chose are a distribution model that is made up of
third party providers hosting all applications and their services but also allowing for customers
or businesses to access them through the internet. This licensing and delivery model is
commonly used in a thin web client and a prime example of SaaS is the G Suite.
G Suite is a suite of applications and productivity tools from Google that combines email, cloud
storage, productivity software, Calendar, Docs, Sites, Groups and Chat (Google, 2018).
Architecture
The SaaS Cloud Service we chose is straightforward enough to build an entire business
model off of, not just the IT architecture. The key components to keep in mind are the network,
the infrastructure, databases and servers. Upon successfully migrating to cloud computing, all
of these components will be virtualized, minus the network hardware- router, switches,
firewall, etc. AWS is a great platform for interconnecting all components and centralizing our
services and needs. The Google G-Suite apps make SaaS and business needs cohesive and
provides a chance at reducing costs. This SaaS service is suitable to develop and deploy with
cloud services as AWS as resource and principle business requirements will all be met.
Security Plan
With cloud computing, a lot of information is usually kept and managed by companies
on behalf of users. It is technology that is helpful in securing people’s and businesses’ data and
at the same time provide resources that would be quite expensive for individuals or even small
businesses (Privacy as Contextual Integrity, 2015).
There are lots of tools and processes that are required to keep our network and data
safe. Using a cloud implementation, not only do we have to secure our local offices and users,
we also have to secure the cloud we are using and confirming our vendor of choice, AWS and
Google, are compliant with all privacy and regulations globally. Tools that we will implement
locally and externally include:
Virus and End point protection
Two-Step Authentication
Identity Management
Physical Security (Network cameras, badge access)
Disaster Recovery
End-User Education
Access and control of information are very important. Nowadays various important
organizations require personal information from their users as a part of the service deal
between the parties. However, access to personal information should be based on the
agreement between the host and the individual. Therefore, other organizations have no rights
to the access and control of such information not unless the two sides have decided and agreed
to terms that would allow access (Personal data, 2015).
Security of information is a compassionate and important aspect, and self-regulation can
never be enough to safeguard people’s privacy. There are always people with negative motives
and would find ways to put people’s private information at risk of access. It is, therefore,
essential to adopt self-regulating mechanisms that would help people be able to safeguard
themselves from unauthorized access and control of information. This should, however, be
complemented with laws and regulations that would strengthen the system and increase
security. To support this, we will require Two-step authentication when accessing the cloud,
and virus and end point protection on all client computers.
Employee monitoring is a very common aspect of today’s world. It is considered as an
excellent tool to monitor the performance of employees to enhance business’s productivity.
Through various forms of technology, an employee’s behavior, performance, and attitude can
be analyzed over time. Reading employee’s emails is also one factor associated with this
process of monitoring employee performance (Workplace Privacy, 2015).
This process of monitoring and evaluation of employee should, however, be carried out
within the boundaries of policies and laws of a particular organization. Most of the time it
happens unregulated, but it needs to be done well within the specifications of the
organization’s policies and laws. In this way, there would be adequate awareness of such
activities there would be more regulation (Workplace Privacy, 2015).
In Summary, every organization has an elaborate privacy policy that has specified in
detail the various aspects of security the company is willing to offer to its customers and the
amount of personal information they would need from their customers. The privacy policy is
aimed at making the company’s clients have a good understanding of the information they will
collect from them and what the company is willing to do with it. Privacy policy is informative
and effective in explaining its need to protect its customers. However, the policy is not detailed
enough to specify how the information would be used and the amount of guarantee as to how
safe the information is also not quite clear.
A Virtual Private Network (VPN) can also be implemented to not only increase
accessibility but security in authorization and access control. VPN’s extend a private network
over a public network and gives the user access to the network and its resources without
having to physically be there. Given we are using a SaaS like Google’s GSuite, VPN’ing will allow
the administrators to limit and get very granular with the permissions and control who is on the
network. Appropriately configuring a VPN requires a lot of network security information and is
not easily accessible to the end user. Implementing VPN to efficiently work with our SaaS is a
great security mesure.
References
Internet Cookies. (n.d.). Retrieved November 9, 2015, from
http://www.spywareguide.com/articles/internet_cookies_spyware_or_ne_57.html
Personal data. (n.d.). Retrieved November 9, 2015, from http://ec.europa.eu/justice/dataprotection/
Privacy as Contextual Integrity. (2005, April 13). Retrieved November 9, 2015, from
http://www.michaelzimmer.org/2005/04/13/privacy-as-contextual-integrity-part-2norms-of-information-flow/
Workplace Privacy. (n.d.). Retrieved November 9, 2015, from
https://www.privacyrights.org/workplace-privacy-and-employee-monitoring
1
CLOUD SERVICE PLAN
Cloud Service Plan
CLOUD SERVICE PLAN
2
With the introduction and advancement in the field of technology, today’s organizations
may use the available local low-level infrastructures with the high-performance cloud computing
elements. Commonly used aspects today, per the cloud computing technologies include Software
as a Service (SaaS). SaaS works together with two more crucial models which include Platform
as a Service (PaaS) and also Infrastructure as a Service (IaaS). Software as a Service consists of a
subscription-based licenses for software being hosted in the cloud.
Some of the critical components of SaaS which also form the core of its overall
functioning include the cloud and the online servers. The cloud assists the users by delivering the
various computing services through a cloud hosted services. The commonly used platform
includes the internet. It then follows that all the various activities and transactions occur over the
public infrastructure. The cloud, in addition, offers to the respective users a chance to build a
customized infrastructure by using the provided software and services.
The components of an SaaS project we chose are a distribution model that is made up of
third party providers hosting all applications and their services but also allowing for customers or
businesses to access them through the internet. This licensing and delivery model is commonly
used in a thin web client and a prime example of SaaS is the G Suite.
G Suite is a suite of applications and productivity tools from Google that combines email, cloud
storage, productivity software, Calendar, Docs, Sites, Groups and Chat (Google, 2018).
CLOUD SERVICE PLAN
Reference:
Google. (2018). Features – G Suite. Retrieved from https://gsuite.google.com/features/
3

Purchase answer to see full
attachment

Order a unique copy of this paper
(550 words)

Approximate price: $22

Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency

Order your essay today and save 15% with the discount code DISCOUNT15