Discuss the levels of security deficiencies inherent


Assignment

Case Study 1: The Brazilian Federal Data Processing Service

Read the case study titled, "Brazil to fortify government email system following NSA snooping revelations".

Use the Internet to research the architectures that other government organizations and intelligence agencies use for email privacy, if any.

Write a three to four page paper in which you:

1. Examine the proposed business ethical problem that the Brazilian Federal Data Processing Service is presently experiencing. Determine whether you agree or disagree that Brazil's problem is an ethical one that should be corrected. Provide a rationale for your response.

2. Assess the levels of security deficiencies inherent in the Brazilian Federal Data Processing Service original enterprise architecture. Conclude whether or not Brazil could have previously considered its current problem and built an original architecture that would have prevented the problem in question. Provide a rationale for your response.

3. Evaluate the quality of the Brazilian Federal Data Processing Service's proposed architecture plan geared toward solving the security problem. Suggest two other possible architecture solutions that the Brazilian Federal Data Processing Service should consider. Justify your response.

4. Determine whether or not one of the governments or intelligence agencies that you researched has taken precautions to avoid a security breach similar to the one that the Brazilian Federal Data Processing Service had experienced. If this government organization or intelligence agency has taken precautions to avoid a similar security breach, provide one example of such a precaution. If this government organization or intelligence agency has not taken precautions to avoid a similar security breach, recommend one action that it can take in order to avoid a similar security breach.

5. Use at least three quality resources in this assignment.

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also include a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also Include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Discuss the levels of security deficiencies inherent
Reference No:- TGS02096214

Now Priced at $40 (50% Discount)

Recommended (92%)

Rated (4.4/5)