SlideShare a Scribd company logo
1 of 9
As an IT analyst for Ballot Online, a company providing voting
solutions to a global client base, you are working to convince
the organization to move the current infrastructure to the cloud.
Your supervisor and the director of IT, Sophia, has asked you to
summarize for the company executives the potential risks and
compliance issues that BallotOnline will have to contend with
in the transition to the cloud.
The final report will be seven to 10 pages that convey your
understanding and management of risks associated with cloud
computing, as well as ensuring compliance with legal
requirements involved in moving BallotOnline systems to the
cloud.
Step 1: Research Risks Associated With Cloud Adoption
The first step in
assessing risk in cloud computing
will be to identify and describe
risk concepts
and
cloud computing risk factors
associated with cloud adoption. As a software as a service
(SaaS) company considering an infrastructure as a service
(IaaS) cloud service provider for your hosting needs, consider
third party outsourcing issues
and the generally accepted best practices for cloud adoption and
review relevant
cloud risk case studies
. You should also consider
best practices for cloud adoption
.
As part of the
risk management process
, identify and describe other
types of risk
, such as risks associated with having a
service-level agreement (SLA)
. An example of a potential risk could be if your company is
obligated to protect personal information, and then the cloud
provider that you use suffers a security breach exposing that
personal information.
Here, identify and describe other types of risks or potential
liability issues that apply to BallotOnline.
Step 2: Identify the Most Appropriate Guidelines for Managing
Risks
In order to identify guidelines applicable to your company's
industry, you must have an understanding of the different types
of risk management guidelines that exist and are frequently
applicable in cloud environments.
There are several cybersecurity standards applicable to cloud
computing environments such as the
NIST Cybersecurity Framework,
ISO standards
, and US federal government standards (DoD/FIPS), as well as
several major sets of
risk guidelines
for dealing with the risks involved. Also, there are
organizations such as the
Cloud Security Alliance (CSA)
that recommend best practices for managing risks.
Review the different guidelines and determine which are most
appropriate for BallotOnline. For example, NIST has
responsibility for developing a number of
elections industry guidelines
within the United States.
Identify why those guidelines are most appropriate and compile
these items into a brief (one page or less) recommendation and
justification of your choice. Your recommendation will also be
incorporated into your final report in the final step.
Submit your recommendation to Sophia to review
before you present your final work.
Step 3: Identify Potential Privacy Issues and Mitigation
Measures
Now that you have identified the guidelines most applicable to
your organization, it is time to discuss privacy protections that
may apply.
BallotOnline is now a global organization and may need to
contend with several sets of
privacy laws
since these laws vary from country to country.
Sophia has recommended that you focus on European Union
(EU) privacy requirements for now, including the
General Data Protection Regulation (GDPR)
, since those are considered to be the most challenging for
compliance. Many companies opt to host data for their European
customers entirely within facilities in the European Union, and
the companies implement restrictions to prevent data for EU
citizens from crossing borders into non-EU zones. This is the
approach that you have been asked to take and where you
should focus your efforts. Note that some cloud providers, such
as Amazon, have received special approval from EU authorities
to permit data transfer outside of the EU.
Research EU privacy requirements, identify the requirements
that apply to your project, and why they apply and compile your
recommendations for complying with these requirements. These
will be incorporated into your final report.
Before moving on to the next step, discuss privacy issues in one
page or less, and
submit it separately before you submit your final work.
Step 4: Create Risk Management Matrix
Now that you have identified and described the types of risks
that may apply to your organization, create a
risk management matrix
to assess/analyze that risk, and make recommendations for risk
mitigation measures.
This
Sample Risk Assessment for Cloud Computing
will give you an example of a completed risk matrix.
Use the
risk management matrix template
to identify risks and write a brief summary explaining how to
understand the data. Submit it to Sophia for feedback
before you present your final work.
Step 5: Describe Cloud Security Issues
Now that you have completed the risk analysis, you can start to
identify
cloud and network security issues
that may apply in BallotOnline's operating environment,
including
data in transit vulnerabilities
and
multifactor authentication
.
Consider cloud computing risks,
network security design
,
information security
, data classifications, and
identity management issues
. Your findings will be incorporated into your final report.
Discuss these security issues in one page or less, and
submit it separately before you submit your final work.
Step 6: Examine the US Legal System and Intellectual Property
Laws
Now that you are familiar with security issues, examine and
review the
US legal and justice systems
. Since BallotOnline is a software as a service (SaaS) company
based in the United States and serving a customer base in the
United States, you need to understand how the legal and justice
systems work in the United States. Your basic understanding of
these systems is crucial for understanding the complexities of
the legal system in cyberspace, where cloud-based systems
reside.
As a practitioner working in the cloud computing field, you
should also have an understanding of the complexities of
intellectual property law
and
cyberspace law
, including how to identify different venues and methods for
resolving disputes (such as the court system, arbitration,
mediation), how to define and negotiate cloud hosting
agreements to avoid potential cyberspace law issues, how to
discuss the regulation of cyberspace, and how to handle
electronic agreements and digital signatures.
To gain a better understanding of how cyberspace laws are
applied to real issues, participate in the analysis of a relevant
legal case with your colleagues in a forum titled
Discussion: US Legal System and Cyberspace Law
.
In addition to the discussion board, your findings will also be
incorporated into your Final Risk and Compliance Report for
the BallotOnline executives.
Step 7: Use Frameworks to Analyze Complex Legal and
Compliance Issues
In the previous step, you examined the US legal and justice
systems as a building block for understanding the complexities
of the legal system in cyberspace, where cloud-based systems
reside.
There are several
frameworks for analyzing compliance issues
used to analyze these complex issues. To provide a manageable
set of recommendations to the executives, review the
frameworks and select the one that is most helpful to use for
analyzing these complex issues.
Step 8: Analyze General, Industry, Geographic, Data, and
Cloud-Specific Compliance Issues
In the previous step, you examined the complexities of law in
cyberspace. In this step, you will expand your understanding of
legal and compliance issues related to the cloud by investigating
industry-specific compliance
issues,
geographic-specific compliance issues
such as privacy, and
cloud-specific compliance issues
to determine which are applicable to BallotOnline.
You will also need to analyze
data compliance issues
applicable to companies operating in the European Union,
including the recent GDPR regulations, and determine how
BallotOnline can be compliant. The organization is concerned
about EU compliance issues because the laws there are the most
restrictive that BallotOnline will encounter.
Prepare a two- to three-page summary of the data compliance
issues that are applicable to BallotOnline and determine how
BallotOnline can be compliant. This will be part of your final
risk and compliance assessment report.
Step 9: Create a Proposal for a Compliance Program
In previous steps, you have identified potential legal and
compliance requirements that BallotOnline may face in
migrating to a cloud computing model. Now, you need to
determine how BallotOnline can comply with those
requirements.
Create a high-level proposal for a compliance program for
BallotOnline that enables the organization and its employees to
conduct itself in a manner that is in compliance with legal and
regulatory requirements. Management has asked you to model
the proposal on
existing compliance programs
for other companies that have migrated to the cloud.Note: Add
a high level outline and flowchart for the instructions.
.
Step 10: Write the Final Risk Assessment and Compliance
Report
As you have learned, there are a number of legal and
compliance requirements associated with shifting to a cloud
computing model.
It's time to put everything together in a seven- to 10-page report
for BallotOnline executives: summarizing the risk assessment
and mitigation as well as legal and compliance requirements
associated with moving to the cloud, outlining your
recommended action plans for meeting those requirements, and
developing a high-level proposal for a compliance program to
avoid breaches of the requirements.
Use the
final risk and compliance report template
to complete your report.
Use the following criteria to respond to the questions.
1.1:
Organize document or presentation clearly in a manner that
promotes understanding and meets the requirements of the
assignment.
1.2: Develop coherent paragraphs or points so that each is
internally unified and so that each functions as part of the whole
document or presentation.
2.1: Identify and clearly explain the issue, question, or problem
under critical consideration.
7.1: Examine legal and regulatory requirements.
7.2: Examine industry best-practices and standards.
8.1: Assess liability issues associated with cloud adoption.
8.2: Assess network security and privacy risks associated with
cloud infrastructure.
8.3: Assess management and operational risks associated with
cloud.
Please add references. l also need plagiarism report

More Related Content

Similar to As an IT analyst for Ballot Online, a company providing voting s.docx

Project 6 - Cloud Computing Security PolicyThis week you will pr.docx
Project 6 - Cloud Computing Security PolicyThis week you will pr.docxProject 6 - Cloud Computing Security PolicyThis week you will pr.docx
Project 6 - Cloud Computing Security PolicyThis week you will pr.docxanitramcroberts
 
Many companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxMany companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxtienboileau
 
PKI and Encryption at WorkLearning Objectives and Outcomes· De.docx
PKI and Encryption at WorkLearning Objectives and Outcomes· De.docxPKI and Encryption at WorkLearning Objectives and Outcomes· De.docx
PKI and Encryption at WorkLearning Objectives and Outcomes· De.docxJUST36
 
Sia Partners Insights when Considering a SaaS Solution
Sia Partners Insights when Considering a SaaS SolutionSia Partners Insights when Considering a SaaS Solution
Sia Partners Insights when Considering a SaaS SolutionDaniel Connor
 
Microsoft General - Checklist for Financial Institutions in Angola.pdf
Microsoft General - Checklist for Financial Institutions in Angola.pdfMicrosoft General - Checklist for Financial Institutions in Angola.pdf
Microsoft General - Checklist for Financial Institutions in Angola.pdfadanilsoafricanocarv
 
IEEE PHM Cloud Computing
IEEE PHM Cloud ComputingIEEE PHM Cloud Computing
IEEE PHM Cloud ComputingJoseph Williams
 
What cloud computing really means By Eric Knorr, Galen Gruman Crea.docx
What cloud computing really means By Eric Knorr, Galen Gruman Crea.docxWhat cloud computing really means By Eric Knorr, Galen Gruman Crea.docx
What cloud computing really means By Eric Knorr, Galen Gruman Crea.docxalanfhall8953
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is CloudWilliam Lam
 
Bus 421 Research Paper
Bus 421 Research PaperBus 421 Research Paper
Bus 421 Research PaperCrystal Torres
 
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Happiest Minds Technologies
 
ISE 620 Final Project Guidelines and Rubric Overview .docx
ISE 620 Final Project Guidelines and Rubric  Overview .docxISE 620 Final Project Guidelines and Rubric  Overview .docx
ISE 620 Final Project Guidelines and Rubric Overview .docxchristiandean12115
 
BMIS 664 Final Project.docx
BMIS 664 Final Project.docxBMIS 664 Final Project.docx
BMIS 664 Final Project.docxwrite31
 
Amazon Case Study Paper
Amazon Case Study PaperAmazon Case Study Paper
Amazon Case Study PaperOlga Bautista
 
19Question 1 4 4 pointsLO5 What is a packetQu.docx
19Question 1 4  4 pointsLO5 What is a packetQu.docx19Question 1 4  4 pointsLO5 What is a packetQu.docx
19Question 1 4 4 pointsLO5 What is a packetQu.docxaulasnilda
 
ENG 102 Unit Six Page 1 of 1 ENG 102 Composition II .docx
ENG 102 Unit Six Page 1 of 1  ENG 102 Composition II  .docxENG 102 Unit Six Page 1 of 1  ENG 102 Composition II  .docx
ENG 102 Unit Six Page 1 of 1 ENG 102 Composition II .docxSALU18
 
Delivering an Oral StatementYou will need to deliver an oral sta.docx
Delivering an Oral StatementYou will need to deliver an oral sta.docxDelivering an Oral StatementYou will need to deliver an oral sta.docx
Delivering an Oral StatementYou will need to deliver an oral sta.docxcuddietheresa
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woeleanorabarrington
 
Migrating to the cloud
Migrating to the cloudMigrating to the cloud
Migrating to the cloudIdeaca
 

Similar to As an IT analyst for Ballot Online, a company providing voting s.docx (20)

Project 6 - Cloud Computing Security PolicyThis week you will pr.docx
Project 6 - Cloud Computing Security PolicyThis week you will pr.docxProject 6 - Cloud Computing Security PolicyThis week you will pr.docx
Project 6 - Cloud Computing Security PolicyThis week you will pr.docx
 
Many companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docxMany companies and agencies conduct IT audits to test and assess the.docx
Many companies and agencies conduct IT audits to test and assess the.docx
 
PKI and Encryption at WorkLearning Objectives and Outcomes· De.docx
PKI and Encryption at WorkLearning Objectives and Outcomes· De.docxPKI and Encryption at WorkLearning Objectives and Outcomes· De.docx
PKI and Encryption at WorkLearning Objectives and Outcomes· De.docx
 
Sia Partners Insights when Considering a SaaS Solution
Sia Partners Insights when Considering a SaaS SolutionSia Partners Insights when Considering a SaaS Solution
Sia Partners Insights when Considering a SaaS Solution
 
The cloud: financial, legal and technical
The cloud: financial, legal and technicalThe cloud: financial, legal and technical
The cloud: financial, legal and technical
 
Microsoft General - Checklist for Financial Institutions in Angola.pdf
Microsoft General - Checklist for Financial Institutions in Angola.pdfMicrosoft General - Checklist for Financial Institutions in Angola.pdf
Microsoft General - Checklist for Financial Institutions in Angola.pdf
 
IEEE PHM Cloud Computing
IEEE PHM Cloud ComputingIEEE PHM Cloud Computing
IEEE PHM Cloud Computing
 
What cloud computing really means By Eric Knorr, Galen Gruman Crea.docx
What cloud computing really means By Eric Knorr, Galen Gruman Crea.docxWhat cloud computing really means By Eric Knorr, Galen Gruman Crea.docx
What cloud computing really means By Eric Knorr, Galen Gruman Crea.docx
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is Cloud
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
Bus 421 Research Paper
Bus 421 Research PaperBus 421 Research Paper
Bus 421 Research Paper
 
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
 
ISE 620 Final Project Guidelines and Rubric Overview .docx
ISE 620 Final Project Guidelines and Rubric  Overview .docxISE 620 Final Project Guidelines and Rubric  Overview .docx
ISE 620 Final Project Guidelines and Rubric Overview .docx
 
BMIS 664 Final Project.docx
BMIS 664 Final Project.docxBMIS 664 Final Project.docx
BMIS 664 Final Project.docx
 
Amazon Case Study Paper
Amazon Case Study PaperAmazon Case Study Paper
Amazon Case Study Paper
 
19Question 1 4 4 pointsLO5 What is a packetQu.docx
19Question 1 4  4 pointsLO5 What is a packetQu.docx19Question 1 4  4 pointsLO5 What is a packetQu.docx
19Question 1 4 4 pointsLO5 What is a packetQu.docx
 
ENG 102 Unit Six Page 1 of 1 ENG 102 Composition II .docx
ENG 102 Unit Six Page 1 of 1  ENG 102 Composition II  .docxENG 102 Unit Six Page 1 of 1  ENG 102 Composition II  .docx
ENG 102 Unit Six Page 1 of 1 ENG 102 Composition II .docx
 
Delivering an Oral StatementYou will need to deliver an oral sta.docx
Delivering an Oral StatementYou will need to deliver an oral sta.docxDelivering an Oral StatementYou will need to deliver an oral sta.docx
Delivering an Oral StatementYou will need to deliver an oral sta.docx
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
 
Migrating to the cloud
Migrating to the cloudMigrating to the cloud
Migrating to the cloud
 

More from alisondakintxt

You will be doing a Health Policy Analysis Power Point on a releva.docx
You will be doing a Health Policy Analysis Power Point on a releva.docxYou will be doing a Health Policy Analysis Power Point on a releva.docx
You will be doing a Health Policy Analysis Power Point on a releva.docxalisondakintxt
 
Which of the three major sociological approaches to understanding so.docx
Which of the three major sociological approaches to understanding so.docxWhich of the three major sociological approaches to understanding so.docx
Which of the three major sociological approaches to understanding so.docxalisondakintxt
 
Throughout the course we have examined that the African American com.docx
Throughout the course we have examined that the African American com.docxThroughout the course we have examined that the African American com.docx
Throughout the course we have examined that the African American com.docxalisondakintxt
 
UnderstandingCultureFood,Faith,&CultureDr.FredFoy.docx
UnderstandingCultureFood,Faith,&CultureDr.FredFoy.docxUnderstandingCultureFood,Faith,&CultureDr.FredFoy.docx
UnderstandingCultureFood,Faith,&CultureDr.FredFoy.docxalisondakintxt
 
The Elderly populationPowerPoint Presentation.Discuss the as.docx
The Elderly populationPowerPoint Presentation.Discuss the as.docxThe Elderly populationPowerPoint Presentation.Discuss the as.docx
The Elderly populationPowerPoint Presentation.Discuss the as.docxalisondakintxt
 
The leader of your organization just resigned because they were arre.docx
The leader of your organization just resigned because they were arre.docxThe leader of your organization just resigned because they were arre.docx
The leader of your organization just resigned because they were arre.docxalisondakintxt
 
The Star Model™The Star Model™ framework for organization .docx
The Star Model™The Star Model™ framework for organization .docxThe Star Model™The Star Model™ framework for organization .docx
The Star Model™The Star Model™ framework for organization .docxalisondakintxt
 
STUDENT REPLIESDISCUSSION 2STUDENT REPLY #1 Darlene Milan On.docx
STUDENT REPLIESDISCUSSION 2STUDENT REPLY #1 Darlene Milan On.docxSTUDENT REPLIESDISCUSSION 2STUDENT REPLY #1 Darlene Milan On.docx
STUDENT REPLIESDISCUSSION 2STUDENT REPLY #1 Darlene Milan On.docxalisondakintxt
 
the elderly populationIdentify a vulnerable population or a comm.docx
the elderly populationIdentify a vulnerable population or a comm.docxthe elderly populationIdentify a vulnerable population or a comm.docx
the elderly populationIdentify a vulnerable population or a comm.docxalisondakintxt
 
TECH460Module 2Organization Profile and Problem Statement.docx
TECH460Module 2Organization Profile and Problem Statement.docxTECH460Module 2Organization Profile and Problem Statement.docx
TECH460Module 2Organization Profile and Problem Statement.docxalisondakintxt
 
Step 1Select ONE of the following viral agents for your assignme.docx
Step 1Select ONE of the following viral agents for your assignme.docxStep 1Select ONE of the following viral agents for your assignme.docx
Step 1Select ONE of the following viral agents for your assignme.docxalisondakintxt
 
The Christianity ReligionAdiesa BurgessD.docx
The Christianity ReligionAdiesa BurgessD.docxThe Christianity ReligionAdiesa BurgessD.docx
The Christianity ReligionAdiesa BurgessD.docxalisondakintxt
 
Review the term Significance Test in the Statistics Visual Learner.docx
Review the term Significance Test in the Statistics Visual Learner.docxReview the term Significance Test in the Statistics Visual Learner.docx
Review the term Significance Test in the Statistics Visual Learner.docxalisondakintxt
 
Research Paper PresentationWith the information you gathered.docx
Research Paper PresentationWith the information you gathered.docxResearch Paper PresentationWith the information you gathered.docx
Research Paper PresentationWith the information you gathered.docxalisondakintxt
 
Step 1 You are a registered nurse who works with wound-care patien.docx
Step 1 You are a registered nurse who works with wound-care patien.docxStep 1 You are a registered nurse who works with wound-care patien.docx
Step 1 You are a registered nurse who works with wound-care patien.docxalisondakintxt
 
Objectives Unacceptable Below Average Acceptable Above Average.docx
Objectives Unacceptable Below Average Acceptable Above Average.docxObjectives Unacceptable Below Average Acceptable Above Average.docx
Objectives Unacceptable Below Average Acceptable Above Average.docxalisondakintxt
 
Marketing Plan Analysis and Presentation Part 1– Rese.docx
Marketing Plan Analysis and Presentation Part 1– Rese.docxMarketing Plan Analysis and Presentation Part 1– Rese.docx
Marketing Plan Analysis and Presentation Part 1– Rese.docxalisondakintxt
 
Learning Objectives By the end of this presentation, you will b.docx
Learning Objectives By the end of this presentation, you will b.docxLearning Objectives By the end of this presentation, you will b.docx
Learning Objectives By the end of this presentation, you will b.docxalisondakintxt
 
RACE, ETHNICITY, AND THE DEATH PENALTYConstitutionality.docx
RACE, ETHNICITY, AND THE DEATH PENALTYConstitutionality.docxRACE, ETHNICITY, AND THE DEATH PENALTYConstitutionality.docx
RACE, ETHNICITY, AND THE DEATH PENALTYConstitutionality.docxalisondakintxt
 
Part 1 Major Events DocumentationScenario You visit a retail.docx
Part 1 Major Events DocumentationScenario You visit a retail.docxPart 1 Major Events DocumentationScenario You visit a retail.docx
Part 1 Major Events DocumentationScenario You visit a retail.docxalisondakintxt
 

More from alisondakintxt (20)

You will be doing a Health Policy Analysis Power Point on a releva.docx
You will be doing a Health Policy Analysis Power Point on a releva.docxYou will be doing a Health Policy Analysis Power Point on a releva.docx
You will be doing a Health Policy Analysis Power Point on a releva.docx
 
Which of the three major sociological approaches to understanding so.docx
Which of the three major sociological approaches to understanding so.docxWhich of the three major sociological approaches to understanding so.docx
Which of the three major sociological approaches to understanding so.docx
 
Throughout the course we have examined that the African American com.docx
Throughout the course we have examined that the African American com.docxThroughout the course we have examined that the African American com.docx
Throughout the course we have examined that the African American com.docx
 
UnderstandingCultureFood,Faith,&CultureDr.FredFoy.docx
UnderstandingCultureFood,Faith,&CultureDr.FredFoy.docxUnderstandingCultureFood,Faith,&CultureDr.FredFoy.docx
UnderstandingCultureFood,Faith,&CultureDr.FredFoy.docx
 
The Elderly populationPowerPoint Presentation.Discuss the as.docx
The Elderly populationPowerPoint Presentation.Discuss the as.docxThe Elderly populationPowerPoint Presentation.Discuss the as.docx
The Elderly populationPowerPoint Presentation.Discuss the as.docx
 
The leader of your organization just resigned because they were arre.docx
The leader of your organization just resigned because they were arre.docxThe leader of your organization just resigned because they were arre.docx
The leader of your organization just resigned because they were arre.docx
 
The Star Model™The Star Model™ framework for organization .docx
The Star Model™The Star Model™ framework for organization .docxThe Star Model™The Star Model™ framework for organization .docx
The Star Model™The Star Model™ framework for organization .docx
 
STUDENT REPLIESDISCUSSION 2STUDENT REPLY #1 Darlene Milan On.docx
STUDENT REPLIESDISCUSSION 2STUDENT REPLY #1 Darlene Milan On.docxSTUDENT REPLIESDISCUSSION 2STUDENT REPLY #1 Darlene Milan On.docx
STUDENT REPLIESDISCUSSION 2STUDENT REPLY #1 Darlene Milan On.docx
 
the elderly populationIdentify a vulnerable population or a comm.docx
the elderly populationIdentify a vulnerable population or a comm.docxthe elderly populationIdentify a vulnerable population or a comm.docx
the elderly populationIdentify a vulnerable population or a comm.docx
 
TECH460Module 2Organization Profile and Problem Statement.docx
TECH460Module 2Organization Profile and Problem Statement.docxTECH460Module 2Organization Profile and Problem Statement.docx
TECH460Module 2Organization Profile and Problem Statement.docx
 
Step 1Select ONE of the following viral agents for your assignme.docx
Step 1Select ONE of the following viral agents for your assignme.docxStep 1Select ONE of the following viral agents for your assignme.docx
Step 1Select ONE of the following viral agents for your assignme.docx
 
The Christianity ReligionAdiesa BurgessD.docx
The Christianity ReligionAdiesa BurgessD.docxThe Christianity ReligionAdiesa BurgessD.docx
The Christianity ReligionAdiesa BurgessD.docx
 
Review the term Significance Test in the Statistics Visual Learner.docx
Review the term Significance Test in the Statistics Visual Learner.docxReview the term Significance Test in the Statistics Visual Learner.docx
Review the term Significance Test in the Statistics Visual Learner.docx
 
Research Paper PresentationWith the information you gathered.docx
Research Paper PresentationWith the information you gathered.docxResearch Paper PresentationWith the information you gathered.docx
Research Paper PresentationWith the information you gathered.docx
 
Step 1 You are a registered nurse who works with wound-care patien.docx
Step 1 You are a registered nurse who works with wound-care patien.docxStep 1 You are a registered nurse who works with wound-care patien.docx
Step 1 You are a registered nurse who works with wound-care patien.docx
 
Objectives Unacceptable Below Average Acceptable Above Average.docx
Objectives Unacceptable Below Average Acceptable Above Average.docxObjectives Unacceptable Below Average Acceptable Above Average.docx
Objectives Unacceptable Below Average Acceptable Above Average.docx
 
Marketing Plan Analysis and Presentation Part 1– Rese.docx
Marketing Plan Analysis and Presentation Part 1– Rese.docxMarketing Plan Analysis and Presentation Part 1– Rese.docx
Marketing Plan Analysis and Presentation Part 1– Rese.docx
 
Learning Objectives By the end of this presentation, you will b.docx
Learning Objectives By the end of this presentation, you will b.docxLearning Objectives By the end of this presentation, you will b.docx
Learning Objectives By the end of this presentation, you will b.docx
 
RACE, ETHNICITY, AND THE DEATH PENALTYConstitutionality.docx
RACE, ETHNICITY, AND THE DEATH PENALTYConstitutionality.docxRACE, ETHNICITY, AND THE DEATH PENALTYConstitutionality.docx
RACE, ETHNICITY, AND THE DEATH PENALTYConstitutionality.docx
 
Part 1 Major Events DocumentationScenario You visit a retail.docx
Part 1 Major Events DocumentationScenario You visit a retail.docxPart 1 Major Events DocumentationScenario You visit a retail.docx
Part 1 Major Events DocumentationScenario You visit a retail.docx
 

Recently uploaded

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 

Recently uploaded (20)

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 

As an IT analyst for Ballot Online, a company providing voting s.docx

  • 1. As an IT analyst for Ballot Online, a company providing voting solutions to a global client base, you are working to convince the organization to move the current infrastructure to the cloud. Your supervisor and the director of IT, Sophia, has asked you to summarize for the company executives the potential risks and compliance issues that BallotOnline will have to contend with in the transition to the cloud. The final report will be seven to 10 pages that convey your understanding and management of risks associated with cloud computing, as well as ensuring compliance with legal requirements involved in moving BallotOnline systems to the cloud. Step 1: Research Risks Associated With Cloud Adoption The first step in assessing risk in cloud computing will be to identify and describe risk concepts and cloud computing risk factors associated with cloud adoption. As a software as a service (SaaS) company considering an infrastructure as a service (IaaS) cloud service provider for your hosting needs, consider third party outsourcing issues and the generally accepted best practices for cloud adoption and review relevant cloud risk case studies . You should also consider best practices for cloud adoption .
  • 2. As part of the risk management process , identify and describe other types of risk , such as risks associated with having a service-level agreement (SLA) . An example of a potential risk could be if your company is obligated to protect personal information, and then the cloud provider that you use suffers a security breach exposing that personal information. Here, identify and describe other types of risks or potential liability issues that apply to BallotOnline. Step 2: Identify the Most Appropriate Guidelines for Managing Risks In order to identify guidelines applicable to your company's industry, you must have an understanding of the different types of risk management guidelines that exist and are frequently applicable in cloud environments. There are several cybersecurity standards applicable to cloud computing environments such as the NIST Cybersecurity Framework, ISO standards , and US federal government standards (DoD/FIPS), as well as several major sets of risk guidelines for dealing with the risks involved. Also, there are organizations such as the Cloud Security Alliance (CSA) that recommend best practices for managing risks.
  • 3. Review the different guidelines and determine which are most appropriate for BallotOnline. For example, NIST has responsibility for developing a number of elections industry guidelines within the United States. Identify why those guidelines are most appropriate and compile these items into a brief (one page or less) recommendation and justification of your choice. Your recommendation will also be incorporated into your final report in the final step. Submit your recommendation to Sophia to review before you present your final work. Step 3: Identify Potential Privacy Issues and Mitigation Measures Now that you have identified the guidelines most applicable to your organization, it is time to discuss privacy protections that may apply. BallotOnline is now a global organization and may need to contend with several sets of privacy laws since these laws vary from country to country. Sophia has recommended that you focus on European Union (EU) privacy requirements for now, including the General Data Protection Regulation (GDPR) , since those are considered to be the most challenging for compliance. Many companies opt to host data for their European customers entirely within facilities in the European Union, and the companies implement restrictions to prevent data for EU citizens from crossing borders into non-EU zones. This is the approach that you have been asked to take and where you should focus your efforts. Note that some cloud providers, such
  • 4. as Amazon, have received special approval from EU authorities to permit data transfer outside of the EU. Research EU privacy requirements, identify the requirements that apply to your project, and why they apply and compile your recommendations for complying with these requirements. These will be incorporated into your final report. Before moving on to the next step, discuss privacy issues in one page or less, and submit it separately before you submit your final work. Step 4: Create Risk Management Matrix Now that you have identified and described the types of risks that may apply to your organization, create a risk management matrix to assess/analyze that risk, and make recommendations for risk mitigation measures. This Sample Risk Assessment for Cloud Computing will give you an example of a completed risk matrix. Use the risk management matrix template to identify risks and write a brief summary explaining how to understand the data. Submit it to Sophia for feedback before you present your final work. Step 5: Describe Cloud Security Issues Now that you have completed the risk analysis, you can start to identify cloud and network security issues that may apply in BallotOnline's operating environment,
  • 5. including data in transit vulnerabilities and multifactor authentication . Consider cloud computing risks, network security design , information security , data classifications, and identity management issues . Your findings will be incorporated into your final report. Discuss these security issues in one page or less, and submit it separately before you submit your final work. Step 6: Examine the US Legal System and Intellectual Property Laws Now that you are familiar with security issues, examine and review the US legal and justice systems . Since BallotOnline is a software as a service (SaaS) company based in the United States and serving a customer base in the United States, you need to understand how the legal and justice systems work in the United States. Your basic understanding of these systems is crucial for understanding the complexities of the legal system in cyberspace, where cloud-based systems reside. As a practitioner working in the cloud computing field, you should also have an understanding of the complexities of intellectual property law and cyberspace law
  • 6. , including how to identify different venues and methods for resolving disputes (such as the court system, arbitration, mediation), how to define and negotiate cloud hosting agreements to avoid potential cyberspace law issues, how to discuss the regulation of cyberspace, and how to handle electronic agreements and digital signatures. To gain a better understanding of how cyberspace laws are applied to real issues, participate in the analysis of a relevant legal case with your colleagues in a forum titled Discussion: US Legal System and Cyberspace Law . In addition to the discussion board, your findings will also be incorporated into your Final Risk and Compliance Report for the BallotOnline executives. Step 7: Use Frameworks to Analyze Complex Legal and Compliance Issues In the previous step, you examined the US legal and justice systems as a building block for understanding the complexities of the legal system in cyberspace, where cloud-based systems reside. There are several frameworks for analyzing compliance issues used to analyze these complex issues. To provide a manageable set of recommendations to the executives, review the frameworks and select the one that is most helpful to use for analyzing these complex issues. Step 8: Analyze General, Industry, Geographic, Data, and Cloud-Specific Compliance Issues In the previous step, you examined the complexities of law in
  • 7. cyberspace. In this step, you will expand your understanding of legal and compliance issues related to the cloud by investigating industry-specific compliance issues, geographic-specific compliance issues such as privacy, and cloud-specific compliance issues to determine which are applicable to BallotOnline. You will also need to analyze data compliance issues applicable to companies operating in the European Union, including the recent GDPR regulations, and determine how BallotOnline can be compliant. The organization is concerned about EU compliance issues because the laws there are the most restrictive that BallotOnline will encounter. Prepare a two- to three-page summary of the data compliance issues that are applicable to BallotOnline and determine how BallotOnline can be compliant. This will be part of your final risk and compliance assessment report. Step 9: Create a Proposal for a Compliance Program In previous steps, you have identified potential legal and compliance requirements that BallotOnline may face in migrating to a cloud computing model. Now, you need to determine how BallotOnline can comply with those requirements. Create a high-level proposal for a compliance program for BallotOnline that enables the organization and its employees to conduct itself in a manner that is in compliance with legal and regulatory requirements. Management has asked you to model the proposal on existing compliance programs
  • 8. for other companies that have migrated to the cloud.Note: Add a high level outline and flowchart for the instructions. . Step 10: Write the Final Risk Assessment and Compliance Report As you have learned, there are a number of legal and compliance requirements associated with shifting to a cloud computing model. It's time to put everything together in a seven- to 10-page report for BallotOnline executives: summarizing the risk assessment and mitigation as well as legal and compliance requirements associated with moving to the cloud, outlining your recommended action plans for meeting those requirements, and developing a high-level proposal for a compliance program to avoid breaches of the requirements. Use the final risk and compliance report template to complete your report. Use the following criteria to respond to the questions. 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment. 1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation. 2.1: Identify and clearly explain the issue, question, or problem
  • 9. under critical consideration. 7.1: Examine legal and regulatory requirements. 7.2: Examine industry best-practices and standards. 8.1: Assess liability issues associated with cloud adoption. 8.2: Assess network security and privacy risks associated with cloud infrastructure. 8.3: Assess management and operational risks associated with cloud. Please add references. l also need plagiarism report