Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Activity 01

Assuming the role of External Security Consultant, you need to compile a report focusing on following
elements to the board of EMC Cloud Solutions;

1.1 Identify types of security risks EMC Cloud is subject to, in its present setup and the impact, such
issues would create on the business itself.

1.2 Develop and describe security procedures for EMC Cloud to minimize the impact of issues discussed
in section (1.1) by assessing and treating the risks.

Activity 02

2.1 Discuss how EMC Cloud and its clients will be impacted by improper/ incorrect configurations which
are applicable to firewalls and VPN solutions.

2.2 Explain how following technologies would benefit EMC Cloud and its Clients by facilitating a ‘trusted
network'. (Support your answer with suitable illustrations).

i) DMZ

ii) Static IP

iii)NAT

2.3 Discuss the benefits of implementing network monitoring systems.

Activity 03

3.1 Formulate a suitable risk assessment procedure for EMC Cloud solutions to safeguard itself and its
clients.

3.2 Explain the mandatory data protection laws and procedures which will be applied to data storage
solutions provided by EMC Cloud. You may also highlight on ISO 3100 risk management methodology.

3.3 Comment on the topic, ‘IT Security & Organizational Policy'

Activity 04

4.1 Develop a security policy for EMC Cloud to minimize exploitations and misuses while evaluating the
suitability of the tools used in an organizational policy.
4.2 Develop and present a disaster recovery plan for EMC Cloud for its all venues to ensure maximum
uptime for its customers (Student should produce a PowerPoint-based presentation which illustrates the
recovery plan within 15 minutes of time including justifications and reasons for decisions and options
used).

4.3 ‘Creditors, directors, employees, government and its agencies, owners / shareholders, suppliers,
unions, and the other parties the business draws its resources' are the main branches of any
organization. Discuss the role of these groups to implement security audit recommendations for the
organization.

You might also like