Illustrate the general architecture

Assignment Help Management Information Sys
Reference no: EM132243290

Assignment

Assume you have just accepted the position as CIO for a small but growing firm and are tasked with developing a plan for your organizations' existing telecommunication structures and computer networks.

The organization needs to protect the valuable information it has but be flexible enough to accommodate employees as they go about executing their jobs and getting business done. It needs to address security aspects such as remote data access, enterprise mobility, and internal communications such as email.

In a minimum five page APA formatted paper (excluding title and reference pages) using the lecture, supplemental resources, and your research, discuss the following elements.

Illustrate the general architecture (centralized or distributed) to support the goals of the organization.

Using information from the course and your research, develop an outline of your security policy and plans that address the areas identified such as remote data access, smartphone access, and internal communications. Be as specific as possible.

Examine and compare the security policy differences between users who work remotely to users who work on-site in a traditional office environment.

Evaluate the elements critical for a successful implementation of such communication systems. Are they more technical such as hardware, software, network infrastructure, security, and cloud computing or more managerial such as project management, change management, logistics, and user involvement? Your list can be different from the list above. Provide the reasons for your arguments.

Include a minimum of five resources, one of which may be the textbook. Of these sources, three must be from the Ashford Library or IT industry standard periodicals.

The Final Paper: Computer Network

Must be five to eight double-spaced pages in length (not including title and references pages) and formatted according to APA style as outlined in the Ashford Writing Center.

Must include a separate title page with the following:

Title of paper

Student's name

Course name and number

Instructor's name

Date submitted

Must use at least five scholarly, peer reviewed, and other credible sources in addition to the course text.

The Scholarly, Peer Reviewed, and Other Credible Sources table offers additional guidance on appropriate source types.

If you have questions about whether a specific source is appropriate for this assignment, please contact your instructor. Your instructor has the final say about the appropriateness of a specific source for a particular assignment.

Must document all sources in APA style as outlined in the Ashford Writing Center.

Must include a separate references page that is formatted according to APA style as outlined in the Ashford Writing Center.

Reference no: EM132243290

Questions Cloud

Describe with examples symmetric encryption : Describe with examples, symmetric encryption. Describe with examples asymmetric encryption.
How do the teams manage their team boundaries : What are the trade-offs between internal cohesion and external ties within each type of team?
How can we use hash functions in real-life : Describe in detail and with examples, how hash functions work and what they are used for? How can we use hash functions in real-life?
What are the total budgeted costs for each activity : For the month, the division expects to make 11,000 deliveries to deliver 1,100,000 cartons to customers. What are the total budgeted costs for each activity
Illustrate the general architecture : Examine and compare the security policy differences between users who work remotely to users who work on-site in a traditional office environment.
Should every threat be planned for : In regards to information security, discuss how threat identification should be performed within your organization or university.
Determining the weighted graph : Give a linear time (O(|E| + |V|)) algorithm to decide if an input edge e = (u, v) in E with weight c(e) is part of some MST of G or not.
What is machine learning : Select one of the following research areas: Cloud Computing (Intranet, Extranet, and Internet), Machine Learning, Artificial Intelligence.
Forgotten password functionality : How would you suggest using forgotten Password functionality in a secured manner? Illustrate with 2 real world safe practices.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Examine the impact to the it support personnel

Examine the impact to the IT support personnel when an organization embarks on the strategy stated in Question 1. Use at least three quality resources.

  Research the effects of software piracy on the economy

Choose to discuss/research the effects of software piracy on the economy over the last 10 years, etc.

  Usa today technologyyou and your partner go out to lunch in

usa today technologyyou and your partner go out to lunch. in a quiet restaurant where no one can hear your conversation

  Describe a use for rfm analysis for fox lake

Describe a use for RFM analysis for Fox Lake. Consider golf, tennis, the restaurant, or the pro shop as candidates.

  Evaluate the need for denormalization within an organization

Identify at least two factors that should be considered in order to produce an optimal normalized set of tables when performing normalization.

  Describe the nature of information system you have selected

Describe the nature of the information system you have selected. Describe the organization that owns and maintains the information system. Describe the existing business process that this system will address.

  Develop a strategy for periodically testing your inventory

Assume that you are employed by Sahara, Inc. Sahara Inc is an up-and-coming on-line reseller of books, video games, and small household appliances. Projections for 2016 sales are looking up, and expected to be in the $750,000,000 dollar range, wit..

  Leading departmental changeq1 leading departmental

leading departmental changeq1 leading departmental changewho should lead the migration plan from an existing process to

  Changes to a supply chain1 what independent variables

changes to a supply chain1 what independent variables should you consider when recommending changes to a supply chain

  Moving from a 10baset to a 100baset networkyour company is

moving from a 10baset to a 100baset networkyour company is in the process of upgrading the network infrastructure which

  What tools would you use to assist in your planning efforts

Discuss some of the key considerations in designing a network design strategy. What approaches have worked for you in your present role or would you propose in a future systems planning role for an organization?

  Advantages of using cloud-based enterprise application

What are the advantages and disadvantages of using cloud-based enterprise application

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd