It infrastructure management assessment item 2enterprise

Assignment Help Computer Network Security
Reference no: EM13573227

Assessment item 2 <br/>Enterprise Architect''s Bog & SWOT Analysis II <br/>Value: 35% <br/>Due date: 04-Oct-2014 <br/>Return date: 25-Oct-2014 <br/>Submission method options <br/>Alternative submission method <br/>Task <br/> WHAT TO DO FOR Task 2A (15%) <br/> <br/>Submit your Enterprise Architect blog as a single page with the Web address of your blog via EASTS for marking by the Due Date in the Study Schedule. <br/>The final blog entry is titled The Future of enterprise architecture and requires answers to the following question (Max 300 words). The main aim of this part is for you to reflect critically on the role of an enterprise architect in an organisation. <br/> <br/>"(a) What is the difference between enterprise architecture and IT architecture? (b) Should enterprise architecture really be called “IT” architecture?" <br/>When doing the above task, you should also: <br/> <br/>Continue to store the same postings made to the blog each week, as defined in Assessment Item 1 previously. <br/>Continue to engage in forum discussions with others and reply to other posts from your peers. <br/>WHAT TO DO FOR Task 2B (15%) <br/> <br/>Many leading organizations and managers have raised concerns about Enterprise Architecture as an effective practice, you are required to do some research and reflect critically on the role of an enterprise architect in an organisation by doing a SWOT Analysis of a new ICT service in an organization. <br/> <br/> <br/>Follow the same procedure as described in Assessment Item 1 and the use the same SWOT Analysis Template to analyse and evaluate a new ICT product or service. <br/>Compare the SWOT Analysis results of the current ICT service (from Assessment Item 1) with the SWOT Analysis results of the new ICT service. <br/>In your role as Enterprise Architect, write a report listing and evaluating the findings from your analysis and include your recommendations as per the SWOT template <br/> <br/>Rationale <br/>Assessment Item 2 is aligned with objectives 2, 3, 5 and 6 and measures your ability to undertake a role-play as an Enterprise Architect, who is able to investigate, analyse and evaluate the impact of new and current ICT services. In addition the EA must acquire an understanding of the importance of aligning strategic planning from both the IT and management perspectives. <br/> <br/>Blogging is a good way to build a knowledge base, assist in developing business intelligence, project management and knowledge management and succession planning as well as discussing the issues of Enterprise Architect that may arise during the integration of new technology into a firm''s ICT infrastructure. <br/> <br/>Good IT manager''s and EA’s can reflect critically on their role and know how to analyse technology <br/>trends and synthesise the theory with the technical and management issues in ICT service delivery. <br/> <br/>Marking criteria <br/> <br/> <br/> Learning Outcomes <br/> <br/> <br/>1. be able to describe the business value and processes of ICT services in an organisation and understand the knowledge and skills of an enterprise architect in the workplace; <br/>2. be able to investigate, analyse and evaluate the impact of new and current ICT services to an organisation; <br/>3. be able to understand that effective IT Infrastructure Management requires strategic planning with alignment from both the IT and business perspectives in an organisation; <br/>4. be able to demonstrate the technical and communications skills that contribute to ICT governance in an organisation; <br/>5. be able to reflect critically on the role of an enterprise architect in an organisation; <br/>6. be able to synthesise the key theoretical concepts with the technical and management issues in delivering ICT services to an organisation. <br/> <br/> <br/>Marking criteria & standards of performance <br/> <br/>Task 2A be able to reflect critically on the role of an enterprise architect in an organisation <br/>Value 15% <br/>Learning Outcomes covered by Task 2A = 1,4,5,6 <br/> <br/>Criteria <br/>HD => 85% <br/>DI 75-84% <br/>CR 65-74% <br/>PS 50-64% <br/> <br/>Enterprise Architect (EA) role and initial <br/>Posting as introduction <br/>2.00% <br/>Posts are conceptually <br/>advanced, engaged in a substantive way with the material. <br/>1.70 to 2.00% <br/>Comprehensive introduction and purpose of the blog as an EA. Blog posts are well developed and engaged with the material; lacks conceptual clarity. <br/>1.50 to 1.69% <br/>Good introduction and understanding of the EA role. Blog posts are adequate, but reflect superficial engagement with the material. <br/>1.30 to 1.49% <br/>Brief introduction and unclear about the EA role; very few <br/>Blog postings in early weeks, but a start has been made that can be improved in future. <br/>1.00 to 1.29% <br/>Frequency of Blog entries <br/>1.00% <br/>Participates frequently and consistently. <br/>0.85 to 1.00% <br/>Participates 1-2 a week, but <br/>Blog postings are not distributed. <br/>0.75 to 0.84% <br/>Participates once a week. <br/>0.65 to 0.74% <br/>Infrequent participation or all done in batch near the due date. <br/>0.50 to 0.64% <br/>Weekly content contribution via Blog and Forums <br/>2.00% <br/>Sophisticated and confident understanding of topics and both Blog and Forum posts draw directly upon the Module activities and Chapter assessment material to <br/>make a creative and <br/>substantive point that <br/>extends beyond the <br/>material. <br/>1.70 to 2.00% <br/>Content is factually accurate and adds to the forum discussion but does not include much conceptual understanding or development at times. <br/>1.50 to 1.69% <br/>Content follows the Module activities but does not add <br/>substantively to the discussion via forums. <br/>1.30 to 1.49% <br/>Posts just the basic information, may be working tangential to discussion on the Forum. <br/>1.00 to 1.29% <br/> <br/>Task 2B SWOT Analysis of a new ICT service <br/>Value 15% <br/>Learning Outcomes covered by Task 2B = 2,3 <br/> <br/>Criteria <br/>HD => 85% <br/>DI 75-84% <br/>CR 65-74% <br/>PS 50-64% <br/> <br/>Description of the new ICT service under investigation <br/>1.00% <br/>Provides a thorough and detailed description and understanding of a newICT service in the workplace, worthy of analysis. <br/>0.85 to 1.00% <br/>Provides a comprehensive description and understanding of a new ICT service in the workplace, worthy of analysis. <br/>0.75 to 0.84% <br/>Provides a good description and basic understanding of a current ICT service in the workplace, chosen for analysis. <br/>0.65 to 0.74% <br/>Provides only a brief description or unclear understanding of a new ICT service in the workplace, as chosen for analysis. <br/>0.50 to 0.64% <br/>Identifications of Strengths, Weaknesses, Opportunities and Threat (maximum of 5 each) <br/>5.00% <br/>SWOT table items identified demonstrate a thorough and insightful understanding of the key concepts, principles and theories of SWOT analysis. 4.25 to 5.00% <br/>SWOT table items identified demonstrate considerable understanding of the key concepts, principles and theories of SWOT analysis. 3.75 to 4.24% <br/>SWOT table items identified demonstrate good understanding of the key concepts, principles and theories of SWOT analysis.3.25 to 3.74% <br/>SWOT table items identified demonstrate limited understanding of the key concepts, principles and theories of SWOT analysis. 2.50 to 3.24% <br/>Summary of SWOT results, Critical Thinking & Recommendations <br/>2.00% <br/>Summary and Recommendations demonstrates a high degree of critical thinking and ability to use specific strategies to gather information and generate recommendations for the ICT service under SWOT analysis. <br/>1.70 to 2.00% <br/>Summary and Recommendations demonstrates considerable critical thinking ability to use specific strategies to gather information and generate recommendations for the ICT service under SWOT analysis. <br/>1.50 to 1.69% <br/>Summary and Recommendations demonstrates some critical thinking ability to use specific strategies to gather information and generate recommendations for the ICT service under SWOT analysis. <br/>1.50 to 1.69% <br/>Summary and Recommendations demonstrates limited critical thinking ability to use specific strategies to gather information and generate recommendations for the ICT service under SWOT analysis. <br/>1.00 to 1.29% <br/>Stated review of goals and objectives in short, mid and long term plans <br/>2.00% <br/>Review of goals and objectives demonstrates a high degree of ability as an EA to use an organizational pattern of results to structure ideas for planning and development. <br/>1.70 to 2.00% <br/>Review of goals and objectives demonstrates considerable ability as an EA to use an organizational pattern to structure ideas for planning and development. <br/>1.50 to 1.69% <br/>Review of goals and objectives demonstrates some ability as an EA to use an organizational pattern to structure ideas for planning and development. <br/>1.50 to 1.69% <br/>Review of goals and objectives demonstrates limited ability as an EA to use an organizational pattern to structure ideas for planning and development. <br/>1.00 to 1.29% <br/>

Reference no: EM13573227

Questions Cloud

Consider that while chinese and indian immigrants were : consider that while chinese and indian immigrants were arriving in the u.s. the british were arriving in china and
Why is it important for kids to be a challenged and fail : 2 pages in length double spaced. the font should be times new roman 12. we live in a culture that gives kids praise for
It infrastructure management pg assessment item 2enterprise : assessment item 2 ltbrgtenterprise architect3939s bog amp swot analysis ii ltbrgtvalue 35 ltbrgtdue date 04-oct-2014
Inflation what is : what is
It infrastructure management assessment item 2enterprise : assessment item 2 ltbrgtenterprise architect3939s bog amp swot analysis ii ltbrgtvalue 35 ltbrgtdue date 04-oct-2014
Assignment help would you be able to provide me with : would you be able to provide me with answers to my assignment homework in the next few hours? it3939s due at
Ireland and spain have been experiencing ireland and spain : ireland and spain have been experiencing deep economic crises. the crises were the results of the preceding booms with
Ireland and spain have been experiencing ireland and spain : ltbrgtireland and spain have been experiencing deep economic crises. the crises were the results of the preceding booms
Discreet mathemathics complete assignment to be completed : complete assignment. to be completed on pdf or .doc or .dox ltbrgt

Reviews

Write a Review

Computer Network Security Questions & Answers

  Create list of security issues which the firm must monitor

You decide to create security checklist for New Century. Create list of security issues which the firm must evaluate and monitor. Make sure to organize items into categories which match five security levels.

  How system with capabilities as access control mechanism

Consider how a system with capabilities as its access control mechanism could deal with Trojan Horses.

  Most of the organizations have now adopted or begun to

many organizations have now adopted or begun to offer cloud computing. this type of computing has advantages and

  Udp programs allowing two parties to establish a secure

Whenever Alice wants to send a message M to Bob, Alice first computes H = Hash(K||M), and then computes C = EK(M||H) and sends C to Bob

  Identify at least three different social media networks and

identify at least three different social media networks and describe how they are used.explain the advantages and

  Dissect an email

Dissect an email you have received. First, get the original, ASCII text of the email, including the headers, and the blank line separating the headers and the body of the email.

  Expected time to find user passwords by dictionary attack

Suppose that eight more characters were added to the password and that the DES algorithm was changed so as to use all 16 password characters. What would be the expected time to find all users' passwords using a dictionary attack?

  Which will encrypt each users data in a file

Acme Inc. is developing the next generation financial tracking program, and Alice has been given the task of writing the encryption component, which will encrypt each user's data in a file on the hard drive.

  Subnet masking and designing small networks

Users on wireless or the open nodes adjacent to the concierges desk should not be able to access the hotels corporate networks and corporate network should only be able to talk to the machine room using protocols DNS, DHCP, HTTP, HTTPS and SSH.

  What is cybersquatting

What is cybersquatting? (Chapter 4 MIS2) What does spoofing a website mean? (Class or online) What can a business do to prevent this from happening to it? Short answer (1 -2 paragraphs)

  Security goal if someone modifies critical information

If an attacker breaks into a corporate database, modifies some information and deletes critical files, against what security goal or goals is this attack aimed?

  Digital forensic investigation

computer security incident, Trojan Defence, anti-forensics technique, chain of custody, FAT file system, SQLOracleHacks.txt, SQLOracleAttacks.txt, SQLInjection.html

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd