Click On The Link Below to Purchase A+ Graded Material
Instant Download
Case Study 1: The Brazilian
Federal Data Processing Service
Due
Week 2 and worth 130 points
Read
the case study titled, “Brazil to fortify
government email system following NSA snooping revelations,” located in the
online course shell and at http://www.networkworld.com/news/2013/101413-brazil-to-fortify-government-email-274802.html.
Use the Internet to research the
architectures that other government organizations and intelligence agencies use
for email privacy, if any.
Write
a three to four (3-4) page paper in which you:
1.
Examine
the proposed business ethical problem that the Brazilian Federal Data
Processing Service is presently experiencing. Determine whether you agree or
disagree that Brazil’s problem is an ethical one that should be corrected.
Provide a rationale for your response.
2.
Assess
the levels of security deficiencies inherent in the Brazilian Federal Data
Processing Service original enterprise architecture. Conclude whether or not
Brazil could have previously considered its current problem and built an
original architecture that would have prevented the problem in question.
Provide a rationale for your response.
3.
Evaluate
the quality of the Brazilian Federal Data Processing Service’s proposed
architecture plan geared toward solving the security problem. Suggest two (2)
other possible architecture solutions that the Brazilian Federal Data
Processing Service should consider. Justify your response.
4.
Determine
whether or not one (1) of the governments or intelligence agencies that you
researchedhas taken precautions to avoid a security breach similar to the one
that the Brazilian Federal Data Processing Service had experienced. If this
government organization or intelligence agency has taken precautions to avoid a
similar security breach, provide one (1) example of such a precaution. If this
government organization or intelligence agency has not taken precautions to
avoid a similar security breach, recommend one (1) action that it can take in
order to avoid a similar security breach.
- Use at least
three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality
resources.
Your
assignment must follow these formatting requirements:
- Be typed,
double spaced, using Times New Roman font (size 12), with one-inch margins
on all sides; citations and references must follow APA or school-specific
format. Check with your professor for any additional instructions.
- Include a
cover page containing the title of the assignment, the student’s name, the
professor’s name, the course title, and the date. The cover page and the
reference page are not included in the required assignment page length.
No comments:
Post a Comment