Reference no: EM13808554
Case Study: The Brazilian Federal Data Processing Service
Read the case study titled, "Brazil to fortify government email system following NSA snooping revelations.
Use the Internet to research the architectures that other government organizations and intelligence agencies use for email privacy, if any.
Write a three to four (3-4) page paper in which you:
1. Examine the proposed business ethical problem that the Brazilian Federal Data Processing Service is presently experiencing. Determine whether you agree or disagree that Brazil's problem is an ethical one that should be corrected. Provide a rationale for your response.
2. Assess the levels of security deficiencies inherent in the Brazilian Federal Data Processing Service original enterprise architecture. Conclude whether or not Brazil could have previously considered its current problem and built an original architecture that would have prevented the problem in question. Provide a rationale for your response.
3. Evaluate the quality of the Brazilian Federal Data Processing Service's proposed architecture plan geared toward solving the security problem. Suggest two (2) other possible architecture solutions that the Brazilian Federal Data Processing Service should consider. Justify your response.
4. Determine whether or not one (1) of the governments or intelligence agencies that you researched has taken precautions to avoid a security breach similar to the one that the Brazilian Federal Data Processing Service had experienced. If this government organization or intelligence agency has taken precautions to avoid a similar security breach, provide one (1) example of such a precaution. If this government organization or intelligence agency has not taken precautions to avoid a similar security breach, recommend one (1) action that it can take in order to avoid a similar security breach.
5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Cash inflows-what is the projects payback
: Project K costs $55,000, its expected cash inflows are $13,000 per year for 8 years, and its WACC is 12%. What is the project's payback? Round your answer to two decimal places.
|
The various practitioners of pop art
: Do you feel the place of art is secure in 21st century America? What works of art or architecture particularly struck you, either positively or negatively?
|
Principles of threat and risk assessment
: Write a 1,050- to 1,400-word paper regarding how security officials determine natural, human-made, and technological threats and risks. Include the following in your paper:
|
About the non annual compounding
: It is now January 1. You plan to make a total of 5 deposits of $600 each, one every 6 months, with the first payment being made today. The bank pays a nominal interest rate of 10% but uses semi annual compounding.
|
Brazilian federal data processing service
: Examine the proposed business ethical problem that the Brazilian Federal Data Processing Service is presently experiencing. Determine whether you agree or disagree that Brazil's problem is an ethical one that should be corrected. Provide a rationa..
|
Vulnerabilities associated with informational
: Write a 1,400- to 1,750-word paper that discusses how security officials determine vulnerabilities to natural, human-made, and technological threats. Apply these strategies to your selected organization.
|
What is advantage and drawback of using twitter for business
: What are the advantages and drawbacks of using Twitter for business? How can services such as Facebook be used to communicate business proposals, plans, and reports?
|
Capital budgeting criteria-ethical considerations
: A mining company is considering a new project. Because the mine has received a permit, the project would be legal; but it would cause significant harm to a nearby river. Calculate the NPV and IRR without mitigation. Round your answers to two decimal ..
|
Personnel protection proposal for opening of new site
: You have been tasked with creating a personnel protection proposal for the opening of a new site for your company, or for a company with which you are familiar. To complete this task, you must research policies and/or interview security management..
|