Discuss about the governments or intelligence agencies

Assignment Help Management Information Sys
Reference no: EM131806127

Article : Brazil to fortify government email system following NSA snooping revelations By Lucian Constantin, IDG News Service

Case Study : The Brazilian Federal Data Processing Service

Read the case study titled, "Brazil to fortify government email system following NSA snooping revelations,".

Use the Internet to research the architectures that other government organizations and intelligence agencies use for email privacy, if any.

Write a three to four (3-4) page paper in which you:

1. Examine the proposed business ethical problem that the Brazilian Federal Data Processing Service is presently experiencing. Determine whether you agree or disagree that Brazil's problem is an ethical one that should be corrected. Provide a rationale for your response.

2. Assess the levels of security deficiencies inherent in the Brazilian Federal Data Processing Service original enterprise architecture. Conclude whether or not Brazil could have previously considered its current problem and built an original architecture that would have prevented the problem in question. Provide a rationale for your response.

3. Evaluate the quality of the Brazilian Federal Data Processing Service's proposed architecture plan geared toward solving the security problem. Suggest two (2) other possible architecture solutions that the Brazilian Federal Data Processing Service should consider. Justify your response.

4. Determine whether or not one (1) of the governments or intelligence agencies that you researched has taken precautions to avoid a security breach similar to the one that the Brazilian Federal Data Processing Service had experienced.

If this government organization or intelligence agency has taken precautions to avoid a similar security breach, provide one (1) example of such a precaution. If this government organization or intelligence agency has not taken precautions to avoid a similar security breach, recommend one (1) action that it can take in order to avoid a similar security breach.

5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Analyze the types of organizational and computer architectures for integrating systems.

• Develop an enterprise architecture plan to address and solve a proposed business ethical problem.

• Use technology and information resources to research issues in enterprise architecture.

• Write clearly and concisely about Advanced Computer Architecture topics using proper writing mechanics and technical style conventions.

Reference no: EM131806127

Questions Cloud

Recommend a solution to the problem of choice : Compare and contrast several solutions and recommend a solution to the problem of your choice. Include a discussion of U.S. policies that should be considered.
What is known as absolute referencing : If feedback relationship exists between two separate variables, then in spreadsheet terms, relationship is indicated by what is known as absolute referencing.
Explain key determinant of the companys owner : After reviewing the ten principles that are the building blocks for GAAP, I find Revenue Recognition. Explain key determinant of the company's owner.
Arguments made by neoclassical and radical economists : Need help in writing a essay on key arguments made by neoclassical and radical economists.
Discuss about the governments or intelligence agencies : Determine whether or not one (1) of the governments or intelligence agencies that you researched has taken precautions to avoid a security breach.
Evaluation of the capitalism book from paul bowles : Evaluation of the Capitalism book from Paul Bowles. What exactly is Bowles' argument and how successful is he in explaining it.
Differences between appreciation and depreciation : Discuss the differences between appreciation and depreciation in detail demonstrate your examples.
Concepts such as scale effects and wishful thinking : The output bias includes concepts such as scale effects and wishful thinking.
What is exactly bowles argument : What is exactly Bowles argument and how sucessful is he explaining it in his book Capitalism by Paul Bowles?

Reviews

Write a Review

Management Information Sys Questions & Answers

  A system proposal to gain approval to proceed

The opportunity to explain and justify a system proposal to gain approval to proceed with the project.

  Description of integrated marketing communications

Description of INTEGRATED MARKETING COMMUNICATIONS - How can such a campaign invoke an emotional response with the target market, lower the market's sales resistance, and persuade the market to purchase the product?

  Kruzweil''s theory and artificial intelligence on singularity

Kruzweil's Theory and Artificial Intelligence on Singularity - What technological advancements have contributed to the progression of Artificial Intelligence over the past 10 years?

  Describe the open source software and how it works

In MS PowerPoint, create a presentation with slides that describe the open source software and how it works. Discuss the role this open source software has in management information systems.

  How to access team productivity

How to access team productivity? What conditions need to be in place for teams to excel and why?

  Management of information systems and itinformation systems

management of information systems and itinformation systems are typically thought of as being the responsibility and

  Compare manual tunneling with automatic tunneling methods

Examine the primary reasons why a network administrator would use NAT-PT as a translation technique. Suggest the primary reasons why a network administrator may choose this technique over other options.

  Discuss the value the new erp system brought to vodafone

Discuss the value the new ERP system brought to Vodafone as a company; and Summarize your findings in a two to three page paper.

  Define the contested boundaries among four business models

Define the contested boundaries among the four business models and For each contested boundary you defined in question 1, analyze how online business are built on top of other online businesses?

  Document for frequent shopper program

Technical architecture document for frequent shopper program and Implementation steps and procedures necessary to achieve operational status

  Develop and manage complex multi-media documents spreadsheet

Provide the appropriate APA formatted citationson the References page to avoid the perception of plagiarism. This includes citing all external sources including the vendor Web sites, assigned readings and videos, the mini case, and other sources,..

  What managemnet control system might guillermo use

What Managemnet control system might Guillermo use to help it achieve its organizational goals? Please list references. 300 Words

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd