Case Study 1: The Brazilian Federal Data Processing Service

Oct 16th, 2014
Anonymous
Category:
Engineering
Price: $15 USD

Question description

Read the case study titled, “Brazil to fortify government email system following NSA snooping revelations,” located in the online course shell and at http://www.networkworld.com/news/2013/101413-brazil-to-fortify-government-email-274802.html.


Use the Internet to research the architectures that other government organizations and intelligence agencies use for email privacy, if any.
Write a three to four (3-4) page paper in which you:
1. Examine the proposed business ethical problem that the Brazilian Federal Data Processing Service is presently experiencing. Determine whether you agree or disagree that Brazil’s problem is an ethical one that should be corrected. Provide a rationale for your response.
2. Assess the levels of security deficiencies inherent in the Brazilian Federal Data Processing Service original enterprise architecture. Conclude whether or not Brazil could have previously considered its current problem and built an original architecture that would have prevented the problem in question. Provide a rationale for your response.
3. Evaluate the quality of the Brazilian Federal Data Processing Service’s proposed architecture plan geared toward solving the security problem. Suggest two (2) other possible architecture solutions that the Brazilian Federal Data Processing Service should consider. Justify your response.
4. Determine whether or not one (1) of the governments or intelligence agencies that you researched has taken precautions to avoid a security breach similar to the one that the Brazilian Federal Data Processing Service had experienced. If this government organization or intelligence agency has taken precautions to avoid a similar security breach, provide one (1) example of such a precaution. If this government organization or intelligence agency has not taken precautions to avoid a similar security breach, recommend one (1) action that it can take in order to avoid a similar security breach.
5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Tutor Answer

(Top Tutor) Studypool Tutor
School: University of Maryland
PREMIUM TUTOR

Studypool has helped 1,244,100 students
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1826 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors