Federal data processing service

Assignment Help Basic Computer Science
Reference no: EM132361944

Read the case study titled, "Brazil to fortify government email system following NSA snooping revelations," located in the attachment.

Use the Internet to research the architectures that other government organizations and intelligence agencies use for email privacy, if any.

Write a three to four (3-4) page paper in which you:

Examine the proposed business ethical problem that the Brazilian Federal Data Processing Service is presently experiencing. Determine whether you agree or disagree that Brazil's problem is an ethical one that should be corrected. Provide a rationale for your response.

Assess the levels of security deficiencies inherent in the Brazilian Federal Data Processing Service original enterprise architecture. Conclude whether or not Brazil could have previously considered its current problem and built an original architecture that would have prevented the problem in question. Provide a rationale for your response.

Evaluate the quality of the Brazilian Federal Data Processing Service's proposed architecture plan geared toward solving the security problem. Suggest two (2) other possible architecture solutions that the Brazilian Federal Data Processing Service should consider. Justify your response.

Determine whether or not one (1) of the governments or intelligence agencies that you researched has taken precautions to avoid a security breach similar to the one that the Brazilian Federal Data Processing Service had experienced. If this government organization or intelligence agency has taken precautions to avoid a similar security breach, provide one (1) example of such a precaution. If this government organization or intelligence agency has not taken precautions to avoid a similar security breach, recommend one (1) action that it can take in order to avoid a similar security breach.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Attachment:- Brazil to fortify government email.rar

Reference no: EM132361944

Questions Cloud

Current disaster recovery plan : Does your company (or school) have a current disaster recovery plan? What are some of the activities involved in it?
The periodic table of visualization : The Periodic Table of Visualization. Choose one Data Visualization and one Compound Visualization by placing your mouse cursor over each option.
For cloud computing to become multi-jurisdictional : For cloud computing to become multi-jurisdictional, it must be separated from politics.
Discusses decision making using system modeling : Discusses decision making using system modeling. The author briefly mentions an open source software tool, EMA Workbench,
Federal data processing service : Assess the levels of security deficiencies inherent in the Brazilian Federal Data Processing Service original enterprise architecture.
Biometrics is invasion of privacy : Many people believe that the use of biometrics is an invasion of privacy. An eye scanning device records the inner structure of a person's eye
What are two risks of using spc in decision : What are two risks of using SPC in decision making for an organization?
What are two signals of special cause variation : What are two signals of special cause variation that can be detected on a SPC control chart?
What is the derivation of the center line and control limits : What is the derivation of the center line and control limits on a SPC control chart?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  When can prim''s and kruskal''s algorithms yield different mst

Write an algorithm to find a maximum cost spanning tree, that is, the spanning tree with highest possible cost.

  Explain how the company profit would likely change

Explain how the company's profit would likely change in the long term. Use a graph to illustrate your answer. Make relevant assumptions if necessary.

  Relevant fields that you think might be needed

Create One Report: Hospital List - this report should include any relevant fields that you think might be needed (In MS Access)

  Programming exercise-reverse the command line

Write a C program that will print out each command line argument on a separate line. However,you should print them out in reverse order. That is, the last command line argument is printedfirst. Do not have an off-by-one error. Make sure that your ..

  Explaining the features of ms powerpoint

Explaining the features of MS PowerPoint

  Identify one or few visualisations and infographics

Identify one or a few visualisations/infographics you think are especially ineffective. What design or content factors shaped your selection?

  Information assets to estimate for risk management purposes

If the organization has three information assets to estimate for risk management purposes which vulnerability must be estimated for additional controls first? Which vulnerability must be evaluated last?

  Define an array of record

Define an array (or a vector) of record (data structure) to save phone book. Each record has a name, phone number and address.

  A control character is sent at the beginning as well

A control character is sent at the beginning as well as at the end of each block in the synchronous-transmission in order to?

  Find the pep of the transmitter output

The output of the transmitter is connected to a 50-? dummy load that has a calibrated average reading wattmeter. The wattmeter reads 6.9 kW. Find the PEP of the transmitter output.

  Ports on the same network

1) Suppose a bridge has two of its ports on the same network. How might the bridge detect and correct this? 2) Having ARP table entries time out after 10 to 15 minutes is an attempt at a reasonable compromise. Describe the problems that can occur i..

  Computer science has embarked on a research project

A student majoring in anthropology and minoring in computer science has embarked on a research project to see if African baboons can be taught about deadlocks.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd