This assignment is two tasks of a general project and should be about two to three pages. Please review the attached scenario of the project and also the step one and two descriptions. TESTING AND INTEGRATION [Integrate information from step 7. Provide a plan for testing and integration that covers installation and implementation. Explain testing and integration. Include test plan and evaluation of methodologies. Ensure techniques are compatible with other systems. Include the following: 1) Transactions on data within the cloud; 2) Use of methods on data in transit outside the cloud; 3) Research and justification for applying data confidentiality and data integrity protection; 4) Consider examples of technologies and technologies that can be used to protect the data in transit; 5) Provide expected results from implementing these technologies and techniques. Consider addressing within the life cycle management report of data protection while in transit to and from the cloud computing environment. Include: a) Define the methods from protecting data in transit; b) How does technology and techniques protect data in transit; c) Define the methods for protecting the integrity of data in transit; d) How these technologies and techniques used to ensure data integrity; e) Develop a test plan based on test evaluation strategy; f) Determine if data could be compromised while in transit.] Step 7: Provide a Plan for Testing and Integration Now that you have explained the software development plan, the next step in the software development life cycle and the next section of the report covers installation and implementation. To be completed by a designated team member: Provide a three-page explanation for testing and integration. Include the test plan and the evaluation of methodologies. Whatever is designed, ensure that the techniques are compatible with other systems such as the user workstations and other entry devices. The test plan should include transactions on data within the cloud and use of methods on data in transit outside the cloud. Provide research and justification for the applying data confidentiality and data integrity protections. Consider examples of technologies and/or techniques that can be used to protect the data in transit. Provide the expected results from implementing these technologies and/or techniques. Consider these areas to address in your test plan, within the life cycle management report of data protection while in transit to and from the cloud computing environment:
•Define the methods for protecting data in transit. How does the technology and/or technique protect data in transit?
•Define the methods for protecting the integrity of data in transit. How are these technologies and/or techniques used to ensure data integrity? Explain.
•Develop a test plan based on your test evaluation strategy.
•Determine if data could be compromised while in transit. Include the plan in the final report. In the next step, the team will discuss how to tailor and deploy the technology as appropriate for software as a service (SaaS) in the cloud. DEPLOYMENT STRATEGY [Integrate information from step 8. Describe tailoring technology appropriate for software as a service (SaaS) in the cloud model. Include deployment strategy after tailoring of data protections for SaaS cloud infrastructure. Cover where in technology of the cloud would employ use of techniques. Also identify which components would use which techniques.]
Step 8: Describe How to Tailor the Technology Once the team has successfully explained testing and implementation methodologies, it’s time for tailoring of the technology as appropriate for software as a service (SaaS) in the cloud model. To be completed by a designated team member: Provide a description of this to include in the final report. Include a deployment strategy after the tailoring of the data protections for the SaaS cloud infrastructure. With respect to the deployment strategy, consider the following: Where in the topology of the cloud would you employ the use of techniques? Identify which components would use which techniques. Include this description in the final report.
Do you need help with this assignment or any other? We got you! Place your order and leave the rest to our experts.