Description and understanding of a newict service

Assignment Help Computer Network Security
Reference no: EM13342973

The final blog entry is titled The Future of enterprise architecture and requires answers to the following question (Max 300 words). The main aim of this part is for you to reflect critically on the role of an enterprise architect in an organisation.

"(a) What is the difference between enterprise architecture and IT architecture? (b) Should enterprise architecture really be called "IT" architecture?"

When doing the above task, you should also:

Continue to store the same postings made to the blog each week, as defined in Assessment Item 1 previously.

Continue to engage in forum discussions with others and reply to other posts from your peers.

Many leading organizations and managers have raised concerns about Enterprise Architecture as an effective practice, you are required to do some research and reflect critically on the role of an enterprise architect in an organisation by doing a SWOT Analysis of a new ICT service in an organization.

Follow the same procedure as described in Assessment Item 1 and the use the same SWOT Analysis Template to analyse and evaluate a new ICT product or service.

Compare the SWOT Analysis results of the current ICT service (from Assessment Item 1) with the SWOT Analysis results of the new ICT service.

In your role as Enterprise Architect, write a report listing and evaluating the findings from your analysis and include your recommendations as per the SWOT template

Rationale

Assessment Item 2 is aligned with objectives 2, 3, 5 and 6 and measures your ability to undertake a role-play as an Enterprise Architect, who is able to investigate, analyse and evaluate the impact of new and current ICT services. In addition the EA must acquire an understanding of the importance of aligning strategic planning from both the IT and management perspectives.

Blogging is a good way to build a knowledge base, assist in developing business intelligence, project management and knowledge management and succession planning as well as discussing the issues of Enterprise Architect that may arise during the integration of new technology into a firm''s ICT infrastructure.

Good IT manager''s and EA's can reflect critically on their role and know how to analyse technology trends and synthesise the theory with the technical and management issues in ICT service delivery.

Learning Outcomes covered by Task 2B = 2,3

Criteria
HD => 85%
DI 75-84%
CR 65-74%
PS 50-64%

Description of the new ICT service under investigation

Provides a thorough and detailed description and understanding of a newICT service in the workplace, worthy of analysis.

Provides a comprehensive description and understanding of a new ICT service in the workplace, worthy of analysis.

Provides a good description and basic understanding of a current ICT service in the workplace, chosen for analysis.

Provides only a brief description or unclear understanding of a new ICT service in the workplace, as chosen for analysis.

Identifications of Strengths, Weaknesses, Opportunities and Threat (maximum of 5 each)

SWOT table items identified demonstrate a thorough and insightful understanding of the key concepts, principles and theories of SWOT analysis.

SWOT table items identified demonstrate considerable understanding of the key concepts, principles and theories of SWOT analysis.

SWOT table items identified demonstrate good understanding of the key concepts, principles and theories of SWOT analysis.

SWOT table items identified demonstrate limited understanding of the key concepts, principles and theories of SWOT analysis.

Summary of SWOT results, Critical Thinking & Recommendations

Summary and Recommendations demonstrates a high degree of critical thinking and ability to use specific strategies to gather information and generate recommendations for the ICT service under SWOT analysis.

Summary and Recommendations demonstrates considerable critical thinking ability to use specific strategies to gather information and generate recommendations for the ICT service under SWOT analysis.

Summary and Recommendations demonstrates some critical thinking ability to use specific strategies to gather information and generate recommendations for the ICT service under SWOT analysis.

Summary and Recommendations demonstrates limited critical thinking ability to use specific strategies to gather information and generate recommendations for the ICT service under SWOT analysis.

Stated review of goals and objectives in short, mid and long term plans

Review of goals and objectives demonstrates a high degree of ability as an EA to use an organizational pattern of results to structure ideas for planning and development.

Review of goals and objectives demonstrates considerable ability as an EA to use an organizational pattern to structure ideas for planning and development.

Review of goals and objectives demonstrates some ability as an EA to use an organizational pattern to structure ideas for planning and development.

Review of goals and objectives demonstrates limited ability as an EA to use an organizational pattern to structure ideas for planning and development.

Reference no: EM13342973

Questions Cloud

Compute earnings per share data : EPS (Earnings Per Share) Problem (Earnings Per Share) The stockholders' equity section of Sosa Corporation appears below as of December 31, 2010. 6% preferred stock.
Evaluate the mole fraction of helium in the container : You have a sealed 8.10 L container with a mixture of nitrogen and helium gas at 25.85 oC. The gas mixture contains 0.204 atm of nitrogen and 1.54 g of helium. Calculate the mole fraction of helium in the container.
Depict an energy-level diagram for the valence molecular : Draw an energy-level diagram for the valence molecular orbitals of CO. Include the relevant atomic orbitals in your diagram. Clearly label each molecular orbitals and fill in the appropriate number of electrons
What is the overall magnification of the microscope : The distance between the eyepiece and the objective lens in a certain compound microscope is 21.5 cm. What is the overall magnification of the microscope
Description and understanding of a newict service : Provides a thorough and detailed description and understanding of a newICT service in the workplace, worthy of analysis and provides a comprehensive description and understanding of a new ICT service in the workplace, worthy of analysis.
Find the distance of final image relative to converging lens : A diverging lens (f = -12 cm) is located 20.0 cm to the left of a converging lens (f = 35.0 cm). find the distance of the final image relative to the converging lens
Determine whether you agree with lois conclusion : For each identified obligation, determine whether you agree with LOI's conclusion and discuss the basis for your determination.
Explain the collisions become more elastic : When the external pressure on a balloon is decreased at constant temperature, what happens to the gas inside. A) The collisions become more elastic. B) the gas undergoes no changes.
Explain the specific heat of liquid ethanol c2h5oh(l) : The specific heat of liquid ethanol, C2H5OH(l), is 2.46 J/g·°C and the heat of vaporization is 39.3 kJ/mol. The boiling point of ethanol is 78.3 °C. The molecular weight of ethanol 46 g/mol.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Automating compliance with federal information security

Automating Compliance with Federal Information Security Requirements," on page 115 of the text Information Security: Contemporary Cases. Also, you will be creating a PowerPoint presentation that explains the information that you wrote in your p..

  Question about communication

Communication is valuable; a main part of this is the ability to provide management the information they required, when they require it.

  Consider the following authentication protocol

Using RSA, perform an encryption then a decryption of the message M=5 using p=3, q=11, and e=7. (please add explanation, Show all your work, not just the final answer.)

  Encrypt plaintext using vigenere cipher

Another variation of Additive cipher uses a keyword instead of a single key. This cipher is called Vigenere cipher. Both variations work exactly the same.

  What is the resulting cipher

What is the resulting cipher - Given your answer, is security of the a!ne cipher with a given modulus m increased if one encryption is followed by a second encryption with a different key?

  Use the stream cipher discused in class

Use ECB mode with block length 3 and the permutation cipher for the following operation.

  What is the value of your shared secret key

You begin the session by sending X your calculated value of TA. X responds by sending you the value TB = 167. What is the value of your shared secret key? Show all your work.

  Potential threats to a bank using mobile technology

Your goal is to identify the potential threats to a bank using mobile technology and rank them in terms of risk. To calculate risk, you will need to rank each threat in terms of severity and likelihood- ITECH3215-7215

  Uniform law for computer information transactions

After more than ten years of proposals, revisions and re-revisions, the National Conference of Commissioners on Uniform State Laws at long last voted to adopt the Uniform Computer Information Transactions Act on July 29.

  Explain security model of class using cnss model

suppose that the security model is required for protection of your class. Using CNSS model, examine each of the cells and write a short statement.

  Encrypt the plaintext by using vigenere cipher

Encrypt the following Plaintext using Vigenere cipher: Plaintext: stocks market is falling Key : one. Is Vigenere cipher monoalphabetic or polyalphabetic? Why?

  Denial of service and distributed denial of service attacks

US cryptography export restrictions: past, present, and future and biometrics for authentication: security and privacy implications.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd