Define the computing and network platforms

Assignment Help Computer Networking
Reference no: EM131028377

Question: As before, the Case for this module asks you to prepare an essay using the writing style, format and referencing methods described in the course Graded Activities and Writing Guides.

This Case is about how organizations can promote operational success while assimilating emerging technologies and e-commerce. The design of effective IT infrastructure has enabled organizations to accomplish their goals and strategies but remains a challenging task for IT management. The ability to execute IT operations requires a set of policies, procedures, and regulations that are critical for survival. While the IT infrastructure deals with technical aspects, IT architecture focuses on IT governance.

As an IT manager, you must continually question the process to understand what parts of IT operations are well-managed or, conversely, lacking effective control. Some of the main issues include:

IT Infrastructure: Define the computing and network platforms. Has the organization adopted industry standards? Is the necessary technical expertise and talent residing internally? Is there a formal system to acquire technology and track project development? Who leads the IT function and what is the reporting structure?

IT Architecture: What role does IT play within the organization? Are IT performance matrices in place? Is data properly stored and secured? Are IT platforms designed to enable the evolution of products and services and new development? Is there an information policy? Is information available for timely management reporting?

IT Governance: Does the CIO attend the technology governance board meetings? What are the accountabilities and system controls in place for internal auditing and regulation compliance? Are IT and organizational strategy properly aligned? In general, what are the security mechanisms in place to guard company information and assets

These concerns run through the required readings for this Case. They are:

Cantor, M., & Sanders, J. D. (2007, May 15). Operational IT governance. Retrieved from https://www.ibm.com/developerworks/rational/library/may07/cantor_sanders/

Zurich Help Point. (2010). The liability of technology companies for data breaches. Retrieved from https://www.advisen.com/downloads/Emerging_Cyber_Tech.pdf

Huhta, S. (2011). IT architecture for small & mid-sized organizations. Business Forum Journal. Retrieved from https://www.bizforum.org/Journal/www_journalSH002.htm

SlideShare. (2009). IT infrastructure (Part I). [Power Point slides]. Retrieved from https://www.slideshare.net/soetam/1-mis-it-infrastructure-part-i

Schwartz, K. D. (2007, May 22). IT governance definitions and solutions. CIO. Retrieved February 15, 2011, from https://www.cio.com/article/111700/IT_Governance_Definition_and_Solutions

Musthaler, L., & Musthaler, B. (2008, March 26). IT governance best practices are critical for business success. NetworkWorld. Retrieved from https://www.networkworld.com/newsletters/2008/052608techexec1.html?page=1

Kadivar, S. (2011, February 15). Green memories accelerate ROI for data centers. CIO. Retrieved from https://www.cio.com/article/665167/Green_Memories_Accelerate_ROI_for_Data_Centers?taxonomyId=3028

In addition, the optional readings expand on many of the central points; you may also want to do some independent research to clarify any issues.

Case Assignment

Once you have read through the articles and related material, compose a 4- to 6-page critical analysis on the following topic:

What dynamic role do IT managers play in IT governance? Why is IT governance necessary? What is the exposure if a company ignores IT governance? Illustrate the Case with the Sarbanes-Oxley (SOX) Act and the Bank Secrecy Act (BSA) federal regulations for compliance. What is the connection between regulations and IT?

Carefully explain and justify your conclusions.

Assignment Expectations

Length: Minimum 4 pages excluding cover page and references (since a page is about 300 words, this is approximately 1,200 or more words).

Your assignment will be evaluated based on the Rubric.

General Case and SLP Paper Writing Guidelines

Note: Do not use any government/military classified or corporate-sensitive information in the development of any TUI papers or in any Threaded Discussions.

Verified Expert

Reference no: EM131028377

Questions Cloud

State table of the set-dominant Flip-Flop : A set-dominant master-slave Flip-Flop has set and reset inputs. It differs from a conventional master-slave SR Flip-Flop in that, when both S and R are equal to 1, the Flip-Flop is set. (a) Obtain the state table of the set-dominant Flip-Flop.
What is the maximum number of six-letter words : The tribe has a taboo against using the same letter twice in the same word, it's never done. If each different sequence of letters constitutes a different word in the language, what is the maximum number of six-letter words that the language can e..
Identify the aacn bsn essential that you have selected : Identify the AACN BSN Essential that you have selected by name and number. Clearly and thoroughly explain why you selected this Essential
Write single straight arrow from element with smallest first : Make a simple sketch of the shape of the main part of the periodic table, as shown. Ignoring H and He, write a single straight arrow from the element with the smallest bonding atomic radius to the element with the largest.
Define the computing and network platforms : IT Infrastructure: Define the computing and network platforms. Has the organization adopted industry standards? Is the necessary technical expertise and talent residing internally?
Why does teen pregnancy and sexually transmitted diseases : Why does teen pregnancy and sexually transmitted diseases remain high in the U.S. What can healthcare providers do that decrease the rate of teen pregnancy and STD's in the US
How many license plates are possible : Car license plates in California take the form of 1RTY345. If zero cannot be used in the first position and repeats are allowed in the other 6 positions, how many license plates are possible?
Build an application based upon array processing application : Build an application based upon the Array Processing application demonstrated in this week's Presentation. Extend this application to have a total of 10 text boxes that will accept an integer only.
How many ways are there to choose 5 items from 7 : how many bit strings of length 10 contain either five consecutive 0s or five consecutive 1s.

Reviews

Write a Review

Computer Networking Questions & Answers

  Create a technical proposal for a network services

You will create a technical proposal for a Windows Server-based set of network services given the simplified RFP (Request for Proposal) provided below

  Explain the genesis of the grashof number gr what does it

1. explain the physical nature of natural convection. how does it differ from forced convection?2. explain the genesis

  Define packet switching and the benefits of packet switching

In the context of a communication system, define what a protocol is. Briefly discuss each of the following operating problems that protocols solve regarding framing, error control, and sequence control.

  Write security policy by nstissc model by analyzing cells

Write down the security policy document of less than 1000 words for business which operates web site which sells books.

  How rsa algorithm implemented if private key is unknown

What if private key is unknown? how would rsa algorithm be implemented then? Assume we have the algorithm which knows public key it is able to decrypt small amount of messages?

  Research various features that were added to ipv6 protocol

Take the time to research the various features that were added to the IPv6 protocol (compared to IPv4). Choose one feature and provide a brief explanation of its benefits.

  Crack encryption key using brute force attack

Was Charlie exaggerating when he gave Peter an estimate for the time that would be required to crack the encryption key using a brute force attack?

  What business objective does the proposed service

What business objective does the proposed service

  Compare the video voice and data formats recognize at least

compare video voice and data formats. identify at least three bandwidth techniques and how you would manage them with

  A large environmental organization

A large environmental organization that provides services suchs as water quality monitoring and geological surveys to businesses and government agencies across the nation, needs help designing its corporate WAN

  Explain approach to defeating the tiny fragment attack

Thus, an intermediate fragment may pass through the filter before the initial fragment is rejected. How can this situation be handled?

  Compare to the minimum recommendations for windows

Identify the professor type, processor speed, RAM, and hard disk space - How do these results compare to the minimum recommendations for Windows?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd