Analyze types of organizational and computer architectures

Assignment Help Management Information Sys
Reference no: EM131128776

Case Study 1: The Brazilian Federal Data Processing Service

Read the case study titled, "Brazil to fortify government email system following NSA snooping revelations," located here and at https://www.networkworld.com/news/2013/101413-brazil-to-fortify-government-email-274802.html.

Use the Internet to research the architectures that other government organizations and intelligence agencies use for email privacy, if any.

Write a three to four (3-4) page paper in which you:

Examine the proposed business ethical problem that the Brazilian Federal Data Processing Service is presently experiencing. Determine whether you agree or disagree that Brazil's problem is an ethical one that should be corrected. Provide a rationale for your response.

Assess the levels of security deficiencies inherent in the Brazilian Federal Data Processing Service original enterprise architecture. Conclude whether or not Brazil could have previously considered its current problem and built an original architecture that would have prevented the problem in question. Provide a rationale for your response.

Evaluate the quality of the Brazilian Federal Data Processing Service's proposed architecture plan geared toward solving the security problem. Suggest two (2) other possible architecture solutions that the Brazilian Federal Data Processing Service should consider. Justify your response.

Determine whether or not one (1) of the governments or intelligence agencies that you researched has taken precautions to avoid a security breach similar to the one that the Brazilian Federal Data Processing Service had experienced. If this government organization or intelligence agency has taken precautions to avoid a similar security breach, provide one (1) example of such a precaution. If this government organization or intelligence agency has not taken precautions to avoid a similar security breach, recommend one (1) action that it can take in order to avoid a similar security breach.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Analyze the types of organizational and computer architectures for integrating systems.

Develop an enterprise architecture plan to address and solve a proposed business ethical problem.

Use technology and information resources to research issues in enterprise architecture.

Write clearly and concisely about Advanced Computer Architecture topics using proper writing mechanics and technical style conventions.

Reference no: EM131128776

Questions Cloud

Identify three possible risks that exist in your workplace : Identify at least three possible risks that exist in your workplace or home. For each of the three or more risks. Describe the task being performed when the risk might occur (washing dishes, moving a desk, etc.).
Define price elasticity of demand : Kim Chui is a student. He has saved enough money to buy either a laptop computer or a second-hand motor bike. What is the opportunity cost if Kim decides to buy the laptop computer? Define price elasticity of demand
To bart perkins of computerworld : According to Bart Perkins ofComputerworld, "Every organization has some 'ducks.' Ducks are employees who have a detrimental effect on productivity. Their work is consistently substandard, they rarely meet deadlines, and their skills are out of dat..
Describe starbucks production-operations technology : Would you describe Starbucks’ production/operations technology in its retail stores as unit, mass, or process? Explain your choice. (Hint: You’ll probably need to review this material found in Chapter 5’s “From the Past to the Present” box.) How does..
Analyze types of organizational and computer architectures : Examine the proposed business ethical problem that the Brazilian Federal Data Processing Service is presently experiencing. Determine whether you agree or disagree that Brazil's problem is an ethical one that should be corrected. Provide a rationa..
Service times may be described by exponential distribution : Neve Commericial Bank is the only bank in the town of York, PA. On a typical Friday, an average of 8 customers per hour arrive at the bank to transact business. There is one teller at the bank, and the average time requied to transact business is 4 m..
Distinguish between the two types of payroll : Distinguish between the two types of payroll deductions and give examples of each.
Discuss the program and what led to its implementation : Briefly discuss the program and what led to its implementation. In general, what are the different types of program evaluation available to a manager? What are the advantages and disadvantages of each one?
Discuss business reasons for employee monitoring : Discuss the requirements of OSHA and how it is enforced. Distinguish between employee privacy in the public and private sectors. Discuss business reasons for employee monitoring. Explain an employer’s obligations to employees engaging in union activi..

Reviews

Write a Review

 

Management Information Sys Questions & Answers

  Describe any impact of the addition of the system analyst

Describe any impact(s) of The addition of the System Analyst to the User Acceptance Testing. Any changes in duration of Online User Manual development. Addition of resources to EduSydLMS 1.0 (activity 5).

  What steps need to be taken to implement your solution

What are indirect costs (time lost by personnel; health benefits; insurance for equipment; unexpected delays)? What will be the total cost? How do you arrive at the total?

  How are mobile computing web 2.0 changing

Write a 200- to 300-word short-answer response to the following: How are mobile computing, Web 2.0, and social media changing how IT systems are used

  Search for commercial idps systems

1.Using the Internet, search for commercial IDPS systems.  What classification systems and descriptions are used, and how can these be used to compare the features and components of each IDPS?  Which IDPS systems do you think are superior in their fe..

  Summarize legal process for cases involving digital crimes

Summarize the legal process for cases involving digital crimes and the affect you perceive that computer investigations can have on the process. Determine why it is important for a computer investigator to have Level 3 training to conduct an inves..

  Evaluating a top-rated web portal for executivesbody check

evaluating a top-rated web portal for executivesbody check out ceo express a top-rated web portal for busy executives.

  What should be your decision strategy for isurf

ou are a marketing manager for a newly developed tablet computer - ISurf. You are considering whether your company needs to produce this product or not. You estimate that the market for ISurf will be either strong or weak. What should be your deci..

  Describe system development life cycle

System Development Life Cycle (SDLC) - even though Myra is implementing a system that has already been developed and is in use by other small businesses, the phases of the SDLC still apply, as there are things Myra should consider or do in each ph..

  Implement an approach to convert project requirements

Develop and implement an approach to convert project requirements into a project plan that meets cost, schedule and performance requirements.

  Computer information systemwhat are important

computer information systemwhat are important considerations for an organization dispose of old computer equipment?

  Computer hardware industry analysis research paper

Computer hardware industry analysis research paper - need a computer hardware industry analysis including contents

  Major goals for the information technology strategic plan

Develop at least five (5) major goals for the information technology strategic plan. Justify your response. Speculate on three (3) positive organizational impacts of implementing the strategic plan. Justify your response

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd