Expert answer:Software Development Lifecycle for Data in Cloud

Expert answer:See Attached Files
20171105195203project_4_transcript.pdf

project_4.docx

Unformatted Attachment Preview

CST620_Project 4: Software Development Life Cycle
for Data in the Cloud Computing Environment
[MUSIC PLAYING]
Each team member is a security software architect in a cloud service provider company, assigned
to a project to provide the client with data integrity and confidentiality protections for data in
transit that will be using applications in the cloud. Your client is an HR company that is moving
HR applications and HR data into a community cloud, sharing tenancy with other clients. Your
company has set up a software as a service, SAS, offering for its client base.
The data that the HR company will be pushing to and from the cloud will contain sensitive
employee information, such as personally identifiable information, PII. You will have to address
sensitive data and transit issues of the client data using the HR applications stored in the cloud,
and provide a lifecycle management report that includes solutions to the cloud computing
architect of your company.
The team will decide on a team leader, who may divide sections to complete by small groups of
team members. You decide to make an outline of the report, and to use the phases of the software
development lifecycle, SDLC, as a basis for the report. The outline includes the following:
examine the cloud computing environment and determine the protection techniques and how
they will be applied to components within the cloud to ensure end-to-end protection of data in
transit. Consider what security techniques and methods are applicable, and tailor the software
development lifecycle methodology for the cloud computing environment.
Select the best methods and techniques for protecting confidentiality and integrity of data in
transit, and apply principles to the whole study approach. These are the software development
life cycle phases to use as the report outline: initiating projects/defining scope, functional design,
analysis and planning, system design specifications, software development,
installation/implementation, tailoring, operation and maintenance, and disposal. Work in
partnership teams to create the report.
[MUSIC PLAYING]
This assignment is two tasks of a general project and should be about three to five pages. Please review
the attached scenario of the project and also step seven and eight descriptions.
TESTING AND INTEGRATION
[Integrate information from step 7. Provide a plan for testing and integration that covers installation and
implementation. Explain testing and integration. Include test plan and evaluation of methodologies.
Ensure techniques are compatible with other systems. Include the following: 1) Transactions on data
within the cloud; 2) Use of methods on data in transit outside the cloud; 3) Research and justification for
applying data confidentiality and data integrity protection; 4) Consider examples of technologies and
technologies that can be used to protect the data in transit; 5) Provide expected results from
implementing these technologies and techniques. Consider addressing within the life cycle management
report of data protection while in transit to and from the cloud computing environment. Include: a)
Define the methods from protecting data in transit; b) How does technology and techniques protect
data in transit; c) Define the methods for protecting the integrity of data in transit; d) How these
technologies and techniques used to ensure data integrity; e) Develop a test plan based on test
evaluation strategy; f) Determine if data could be compromised while in transit.]
Step 7: Provide a Plan for Testing and Integration
Now that you have explained the software development plan, the next step in the software
development life cycle and the next section of the report covers installation and implementation.
To be completed by a designated team member:
Provide a three-page explanation for testing and integration. Include the test plan and the evaluation of
methodologies. Whatever is designed, ensure that the techniques are compatible with other systems
such as the user workstations and other entry devices.
The test plan should include transactions on data within the cloud and use of methods on data in transit
outside the cloud. Provide research and justification for the applying data confidentiality and data
integrity protections.
Consider examples of technologies and/or techniques that can be used to protect the data in transit.
Provide the expected results from implementing these technologies and/or techniques.
Consider these areas to address in your test plan, within the life cycle management report of data
protection while in transit to and from the cloud computing environment:
•Define the methods for protecting data in transit. How does the technology and/or technique protect
data in transit?
•Define the methods for protecting the integrity of data in transit. How are these technologies and/or
techniques used to ensure data integrity? Explain.
•Develop a test plan based on your test evaluation strategy.
•Determine if data could be compromised while in transit.
Include the plan in the final report.
In the next step, the team will discuss how to tailor and deploy the technology as appropriate for
software as a service (SaaS) in the cloud.
DEPLOYMENT STRATEGY
[Integrate information from step 8. Describe tailoring technology appropriate for software as a service
(SaaS) in the cloud model. Include deployment strategy after tailoring of data protections for SaaS cloud
infrastructure. Cover where in technology of the cloud would employ use of techniques. Also identify
which components would use which techniques.]
Step 8: Describe How to Tailor the Technology
Once the team has successfully explained testing and implementation methodologies, it’s time for
tailoring of the technology as appropriate for software as a service (SaaS) in the cloud model.
To be completed by a designated team member:
Provide a description of this to include in the final report. Include a deployment strategy after the
tailoring of the data protections for the SaaS cloud infrastructure.
With respect to the deployment strategy, consider the following: Where in the topology of the cloud
would you employ the use of techniques? Identify which components would use which techniques.
Include this description in the final report.

Purchase answer to see full
attachment

How it works

  1. Paste your instructions in the instructions box. You can also attach an instructions file
  2. Select the writer category, deadline, education level and review the instructions 
  3. Make a payment for the order to be assignment to a writer
  4.  Download the paper after the writer uploads it 

Will the writer plagiarize my essay?

You will get a plagiarism-free paper and you can get an originality report upon request.

Is this service safe?

All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 20% with the discount code ESSAYHELP