Analyze the security mechanisms needed to protect the dms


Read the case study titled "Florida Department of Management Services Part I" found at the end of Chapter 5.

Write a three to four (3-4) page paper in which you:

Analyze the security mechanisms needed to protect the DMS systems from both state employees and users accessing over the Internet.

Critique the transition process performed by the DMS in the case study. Then, recommend two (2) alternatives to the IP infrastructure or applications not already mentioned in the case study.

Critique the merits of the major services found on the DMS Website.

Recommend an additional service to add to the DMS Website.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required page length.

Case Study 1: Florida Department of Management Services, Part I

1. Analyze the security mechanisms needed to protect the DMS systems from both state employees and users accessing over the Internet.

Did not submit or incompletely analyzed the security mechanisms needed to protect the DMS systems from both state employees and users accessing over the Internet.

Partially analyzed the security mechanisms needed to protect the DMS systems from both state employees and users accessing over the Internet.

Satisfactorily analyzed the security mechanisms needed to protect the DMS systems from both state employees and users accessing over the Internet.

Thoroughly analyzed the security mechanisms needed to protect the DMS systems from both state employees and users accessing over the Internet.

2. Critique the transition process performed by the DMS in the case study and recommend two (2) alternatives to the IP infrastructure or applications not already mentioned in the case study.

Did not submit or incompletelycritiqued the transition process performed by the DMS in the case study and did not submit or incompletely recommended two (2) alternatives to the IP infrastructure or applications not already mentioned in the case study.

Partiallycritiqued the transition process performed by the DMS in the case study and partially recommended two (2) alternatives to the IP infrastructure or applications not already mentioned in the case study.

Satisfactorilycritiqued the transition process performed by the DMS in the case study and satisfactorilyrecommended two (2) alternatives to the IP infrastructure or applications not already mentioned in the case study.

Thoroughlycritiqued the transition process performed by the DMS in the case study and thoroughly recommended two (2) alternatives to the IP infrastructure or applications not already mentioned in the case study.

3. Critique the merits of the major services found on the DMS Website.

Did not submit or incompletely critiqued the merits of the major services found on the DMS Website.

Partiallycritiqued the merits of the major services found on the DMS Website.

Satisfactorilycritiqued the merits of the major services found on the DMS Website.

Thoroughlycritiqued the merits of the major services found on the DMS Website.

4. Recommend an additional service to add to the DMS Website.

Did not submit or incompletelyrecommended an additional service to add to the DMS Website.

Partiallyrecommended an additional service to add to the DMS Website.

Satisfactorilyrecommended an additional service to add to the DMS Website.

Thoroughlyrecommended an additional service to add to the DMS Website.

5. 3 references

No references provided

Does not meet the required number of references; some or all references poor quality choices.

Meets number of required references; all references high quality choices.

Exceeds number of required references; all references high quality choices.

6. Clarity, writing mechanics, and formatting requirements

More than 6 errors present

5-6 errors present

3-4 errors present

0-2 errors present

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Analyze the security mechanisms needed to protect the dms
Reference No:- TGS02864782

Now Priced at $50 (50% Discount)

Recommended (90%)

Rated (4.3/5)