Discuss about the managing networks in the age of cloud

Assignment Help Management Information Sys
Reference no: EM131327899

QUESTION 1:

After reading the paper, Managing Networks in the Age of Cloud, SDN, and Big Data: Network Management Megatrends 2014, discuss at least two network management concepts you learned from the paper.

QUESTION 2:

After watching the video, Wireless Security - Information Security Lesson #8 of 12, discuss at least two wireless security concepts you learned from or found interesting in the video.

Wireless Security - Information Security

Dr. Soper discusses security for wireless networks. Topics covered include wireless network concepts, wireless communication, the 802.11 protocol suite,

QUESTION 3:

Network Security Paper: In this paper, you will define the security strategies of Defense in Depth and Layered Security along with comparing and contrasting the strategies by explaining, at least, two advantages and disadvantages of implementing each security strategy. Support your information and make sure all information sources are appropriately cited.

The paper must use APA 6th ed., 7th printing formatting and contain a title page, 2 pages of content, and a minimum of three peer-reviewed references

Your assignment will be graded based on the rubric, which can be viewed when clicking on the assignment submission link above.

Assignment Resource(s):

Layered Security: Why It Works - This article discusses why layered security works.

This video, the first of 12 by Dr. Soper, provides an introduction to computer security. Topics covered include dependence on technology, information assets, threats, vulnerabilities, controls, confidentiality, integrity, availability, types of attackers, methods of defense, and multi-layered security.

QUESTION 4: SHORT PAPER

RISK MANAGEMENT: Why Projects Fail: NASA's Mars Climate Orbiter Project

In 1999 a Mars space probe from NASA was ‘lost'. A number of the failures related to project management according to the report of the subsequent investigation.

The issues

There was one cause of the space probe loss that hit the headlines: two teams involved in the space probe development were using different systems of measurement - one was using meters, centimeters and kilograms, the other was using feet, inches and pounds.

However, the wide-ranging investigation into the failure came up with a number of other contributing

factors:

There had been inadequate consideration of the entire mission and its post-launch operation as a total system

Communications and training within the project had been inconsistent

There was no complete end-to-end verification of navigation software and related computer models

Actions taken

As a result, the culture of ‘Faster, Better, and Cheaper' was replaced with ‘Mission Success First'. Actions taken subsequently for another project, NASA's Mars Polar Lander, included:

A new senior management leader was assigned

Work plans were freshly reviewed and augmented

Detailed fault tree analyses took place for pending mission events

Daily teleconferences took place to evaluate technical progress and plan work yet to be done

The Deep Space Network for communications with the spacecraft was made available to more staff

Independent peer review of all operational and contingency procedures was introduced

Reasons for the failure

There was inadequate risk management and issue control. The report recommended that future projects should conduct continuous risk analysis and discussion of issues from start to end of the project. NASA needed to foster a climate in which issues could be easily raised.

Minimizing risk was also behind recommendations that in future NASA should plan long-term for a different type of technological innovation, focusing on smaller, low-risk products that could then be incorporated into wider projects.

Clearly in this type of scientific project, there is little leeway in project outcomes and margins of error are small. The project had failed to set clear success criteria for the project outcomes.

The scope of the project had not been matched to the funding, leading to inadequate funding for defined outcomes.

The project was judged to be lacking in good team working and adequate and appropriate staffing. The problem was found to be poor communication between, rather than within, different teams. In particular the report called for better monitoring of the work of contractors. Better trained personnel were required, and project management courses were part of this recommendation.

Discussion

Risks and their management are critical to the successful completion of any project. Briefly discuss the various types of risk as stated in your project management books and how they apply in this case.

i. What could have been done to prevent them occurring in the first place?

ii. If nothing, what could have been done to lessen their impact when they did occur?

Please sight your sources of information. You are not to copy and paste from your sources. Provide your own thoughts based off your sources.

Reference no: EM131327899

Questions Cloud

Find the average acceleration of the car : Find the average acceleration of the car over each of the first two seconds.
What is the alternate valuation date and how does it work : How can a family reduce their estate tax liability by gifting property? What is the difference between the gross and the taxable estate? What is the alternate valuation date and how does it work?
What are the infrastructure strengths and weaknesses : What are the infrastructure strengths and weaknesses? How does this data impact your response planning? What threats and vulnerabilities in Anytown could exist before and after the possible terrorist attack you selected
Graph the functions described below : Second derivative everywhere positive; first derivative everywhere negative
Discuss about the managing networks in the age of cloud : After reading the paper, Managing Networks in the Age of Cloud, SDN, and Big Data: Network Management Megatrends 2014, discuss at least two network management concepts you learned from the paper.After watching the video, Wireless Security - Informa..
Explain the basic steps in the planning process : In a four- to five-page paper (excluding the title and references pages), discuss the strategic planning process. In your paper: Explain the basic steps in the planning process. Describe the steps in the decision-making process, and predict how the ..
What are the types of plans : What are the types of plans? How are they distinguished from one another? Do you think plans with incremental objectives are more effective than those that contain stretch goals? Why or why not
Discuss the tools executive managers use : Read the journal article, "Executive Information Systems: Their impact on Executive Decision Making". Based on the information presented in the article, discuss the following: The tools executive managers use when making major decisions and The rel..
How would you summarize this article to articulate security : You are the newly hired IT Security Manager of a medium size business of 400 employees. You have 6 personnel in your security department. Your CIO just asked you for a 3 page summary of your Security Strategy for the company. How would you summ..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Implement to meet the mandate from management

We are developing a program for a group experience Supply Chain Managers and have drafted the questions below which we will include as a part of the program. Please assist by providing detailed responses to the following questions along with citat..

  Describe the key components of a data communication system

Describe the key components of a data communication system and Next, discuss the overall manner in which a company uses data communication in order to reduce its operations cost

  Information technology and decision making

Information Technology and Decision Making- Patient safety and care is reliant upon the quality of nurses' daily decision making

  Identify risks that result from implementing byod policy

Identify three risks that might result from implementing a BYOD policy. Suggest a method for mitigating each risk you have identified. Provide a rationale for your response.

  How technology affect our family

Write a summary of given article- How Technology Affect Our Family. Identified a research topic and did some searching to find credible information

  What are some it particular strategies for negotiating

As we look at the SDLC, what are some types and some phases that can require a more deft touch when it comes to proper management? What are some IT particular strategies for negotiating with all departments to get the proper resources and budget ..

  Function of every application of the computer system

Ensure that all hardware work together. Ensure that every function of every application of the computer system works and the system meets the functional requirements and the RFP specifications

  Analyze why you believe dos and ddos attacks have evolved

Analyze why you believe DoS and DDoS attacks have evolved in recent years to be more than simple annoyances to more targeted attacks involving extortion and other crimes. Explain the effect that you believe this has on large corporations and descr..

  Desirable and undesirable aspects of this fragmentation

Create a presentation in PowerPoint (using both the slides and instructor's notes sections) in which you address the following questions: What are the desirable and undesirable aspects of this fragmentation

  Organizational process analysis

Organizational Process Analysis-You are a senior member of the IT Management Team for SAI Toys, one of the leading manufacturers of products for Gifted Electrical Engineering Kids (GEEKs)

  Discuss current and emerging technology

Discussing Current and Emerging Technology - Develop and submit an Organizational Technology Plan paper. Provide a summary statement of key topics of the paper. Provide a summary of key points and examples,

  Identify what we can do to counter this biological attack

A terrorist threat has been made via phone against the water system. The caller stated that they would be releasing Tularemia into the water system in the next 4-6 hours. We are not certain of where this action may take place, but we must protect ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd