Perform independent research Project involves business move to the cloud Consider what one needs to do to cover software and security life cycle elements Step 1: Provide a plan for testing and integration Step 2: Describe how to tailor the technology

Perform independent research Project involves business move to the cloud Consider what one needs to do to cover software and security life cycle elements Step 1: Provide a plan for testing and integration Step 2: Describe how to tailor the technology 150 150 Affordable Capstone Projects Written from Scratch

Project 4

  1. Perform independent research
    1. Project involves business move to the cloud
    2. Consider what one needs to do to cover software and security life cycle elements
  2. Step 1: Provide a plan for testing and integration
    1. Covers installation and implementation
    2. Explain testing and integration
      1. Include test plan and evaluation of methodologies
      2. Ensure techniques are compatible with other systems
  • Include
    1. Transactions on data within the cloud
    2. Use of methods on data in transit outside the cloud
    3. Research and justification for applying data confidentiality and data integrity protection
    4. Consider examples of technologies and technologies that can be used to protect the data in transit
    5. Provide expected results from implementing these technologies and techniques
  1. Consider addressing within the life cycle management report of data protection while in transit to and from the cloud computing environment
    1. Define the methods from protecting data in transit
    2. How does technology and techniques protect data in transit?
  • Define the methods for protecting the integrity of data in transit
  1. How these technologies and techniques used to ensure data integrity?
  2. Develop a test plan based on test evaluation strategy
  • Step 2: Describe how to tailor the technology
    1. Describe tailoring technology appropriate for software as a service (SaaS) in the cloud model
    2. Include deployment strategy after tailoring of data protections for SaaS cloud infrastructure
      1. Where in technology of the cloud would employ use of techniques?
      2. ID which components would use which techniques
  • Determine if data could be compromised while in transit

 


 

TO GET THIS OR ANY OTHER ASSIGNMENT DONE FOR YOU FROM SCRATCH, PLACE A NEW ORDER HERE