Order # 12600

Title: Enterprise Architecture

Paper type Essay

Paper format APA

Course level Undergraduate

Subject Area Other (Not listed)

# pages 2   ( or 600 words Minimum)

Spacing Double Spacing

# sources 4

Paper Details

Note: Developing a business proposal requires specific steps that need to be executed in a sequence. The assessments in this course are presented in sequence and must be completed in order.

Preparation

•Review the Zachman framework for enterprise architecture. You can get a copy of this framework by checking the Internet resources identified as part of the Resources in this assessment. After reviewing the Zachman framework, have you considered everything necessary for the proposed project? For example, does the current architecture of the IT infrastructure within the company allow for ease of integration? Do you have the appropriate personnel to work on the project? Does a budget exist for the project? Can security standards be met? Can users be trained properly? What other IT systems need to be included as part of your proposal?

•Review the presentation that you created in Assessment 3. Using the Zachman framework, how can you strengthen the proposed solution to ensure that both the business and technology stakeholder needs are met?

Directions

Prepare a 3–5-page assessment in which you do the following:

•Identify the components of the Zachman framework that are going to be included in your proposed solution.

•Explain your rationale for including these other components from the Zachman framework.

•Evaluate the challenges you expect these additional components to add to your proposed solution.

•Add another slide to your PowerPoint presentation that succinctly identifies the components of the Zachman framework you are including, and your proposal for integrating these IT and business components to the proposed solution.

•Include any additional APA citations that support your rationale on the citation slide in your presentation.

Additional Requirements

Ensure that your assessment is professionally written and free of errors, and that APA formatting is applied throughout.

Ethical Decision Making

 

Assignment Content

  1. Resource: Decision Tree Example
    Your team of international developers will be developing a publicly accessible cloud-based application which may potentially house user PII data along with information about users’ behaviors and activities (e.g., physical locations, online sites they visit, searches, purchases, etc.), and user’s intellectual property (e.g., photos, artwork, videos, etc.).

    Based on your work in Weeks 3 and 4, develop an ethical decision-making illustration or decision tree that shows ways to address each risk if an actual incident occurs. Develop an ethical policy statement of the actions your team would take, keeping a global perspective in mind.

    Using the Decision Tree Example provided as a guide, create a PowerPoint presentation containing 4 to 6 slides. Provide 1 file for the team. This example will help you develop your individual assignment in Week 5.

    Note: You may use other applications like Adobe Spark, Microsoft Sway, or Mix instead of PowerPoint.

    Submit your assignment.

Question : Execution Program Practical Connection Assignment

Question : Execution Program Practical Connection Assignment 

 Please relate the document with roles and responsibilities. explain how the course is helpful for the mentioned roles and responsibilities

Roles and Responsibilities:

• Maintain in-depth knowledge of industry best practices, technologies, architectures and emerging technologies as well enforcing best practices for data management, governance and integration.

• Creates test plans, automation test scripts, execute regression testing, load testing and prepare performance metrics.

• Execute tests against written requirements, identify test defects – deviations track to closure.

• Support strategic planning on architecture and build of data ingestion / federation capabilities to

develop highly integrated data model / solutions

• Develop relevant artifacts including business requirements (BRD), use cases, process flow diagrams, target operating models to effectively rationalize business solutions and future work-streams

• Participate in data lake governance and compliance processes to ensure all areas of technology are implementing solutions consistent with the target architecture

• Develops and implement internal communication strategies, plans and tactics that support the business goals and objectives.

• Provides second line of defense risk oversight of the Operational risk program, including application of operational risk policies/standards, procedures, strategies, material risks, risk reporting routines and metrics

• Identifying, assessing and reporting progress on Risk and Control Self Assessments (RCSA), including process mapping, identification and assessment of risk, identification of controls, and assessments of control design and effectiveness, identification of themes.

• Support the design/implementation of advancing and delivering the governance, risk, compliance and oversight program

 • Active participation in high-profile information risk management initiatives.

• Enhances the financial understanding of business lines, products and segments to aid reporting,

forecasting and business decision making.

• Identify opportunities for business process improvements and develop solutions to promote the seamless delivery of services.

• Lead/participate in a variety of planned or ad-hoc program initiatives, including project management

• Responsible for identifying, analyzing, assessing financial impacts, and overseeing strategic results-

driven initiatives designed to improve operating efficiency and effectiveness.

Cloud computing

Discuss the “Edge” is in cloud computing. What is it? Why is it important? What impact will it have on the industry?

I am not looking for long posts. Eight or so sentences for each post of ORIGNAL writing will suffice. I do not want see paragraph after paragraph of copied material. Your post will be checked by SafAssign for similarity. 

If you use references they MUST include in text citations where the information is used. If the information is a direct quote from a source it MUST be in parentheses. Otherwise you are at risk of plagiarism. However, you do not have to use the APA Edition 6 format (template with fonts, heading, etc.) in the discussions.

Ignorance of APA Edition 6 citing and referencing is not acceptable in graduate level work. If you do not use it you may be accused of plagiarism. If you have not done so please familiarize yourself with it now. 

Corporate IT Security Audit Compliance

Describe how to establish compliance in a small health care clinic. 

The clinic could have 2 physicians, 5 nurses, and serve a thousand customers annually. Patients and healthcare provides can access patient data online/remotely.

Literature

 

The bonds between siblings are among the strongest. May-Lee Chai describes the relationship between two sisters in her short story, “Saving Sourdi.” 

After reading “Saving Sourdi,” discuss the following questions in 3–5 paragraphs:

  1. The story begins with a strong revealing statement from Nea, the narrator. How do you think Nea feels about her sister Sourdi based on this information? How does what happens at the beginning of the story foreshadow what happens later?
  2. This story is told from Nea’s point of view. How do you think the story would change if it were told from Sourdi’s point of view? Do you feel closer to the character than you would if this story were told in third person?
  3. Nea briefly mentions an experience she and Sourdi had in a minefield when they were younger. What impact do you think this had on the relationship between the sisters?
  4. Nea’s family is not originally from the United States. What are some clues the author gives to describe the origin of their ethnicity? Give 2 examples of characters who say things that are racially offensive, and discuss how this makes you feel about those characters. Can you relate to these experiences?
  5. How does the author describe Duke and Mr. Chhay? Do you get a sense of who these characters are based on these descriptions?
  6. As the story progresses, how does the relationship between Nea and Sourdi change? Why do you think it changes?
  7. What does the mother value, based on how reaction to updates she receives from Sourdi? Why do you think she might feel this way?

Discussion

In this scenario, hackers launch cyber attacks that affect several parts of the nation’s financial infrastructure over the course of several weeks. Specifically, sensitive credit card processing facilities are hacked and numbers are released to the Internet, causing 120 million cards to be canceled; automated teller machines (ATMs) fail nearly simultaneously across the nation; major companies report payroll checks are not being received by workers, and several large pension and mutual fund companies have computer malfunctions so severe that they are unable to operate for more than a week. Identify the countermeasures that need to be implemented to prevent these cyber attacks from occurring in the future. 

Contingency Planning

 

Contingency Planning

Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:

(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Need Response 2 to below discussion

please provide the two responses in 75 to 100 words for below discussion posts

Post#1

 COLLAPSE

Nowadays internet is growing very fast and more collaboration services are added to the internet like online payment, online data storage, social apps, and many more so everybody from the home user to a big organization is looking for secure data storage because cyber threats are growing increasingly. Cybercriminals plan strategies for data tempting by accessing the company’s private network after that asks money to save the organizational data, also this is not with a single company, but it is with any home user to any organization. “Although almost all cloud vendors claim that their clouds are safe, security concerns are still raised widely among cloud users” (Chen, Sharieh & Blainey, 2018). To Save from this hassle a business owner can devise the SECaaS i.e. Security as a Service.

SECaaS is based on cloud base platform where a user can save its all data over the cloud and can access it from anywhere in the world, also it is more secured than other platforms like to save locally. Nowadays CIO and CTO of the organizations having the preference for security as a service because of many reasons like cost-effective, easy to use, protection against new threats, Auto-updates and customizations, and many more. “Driven by the advances in sensing, processing, storage, and cloud technologies, sensor deployments are pervasive, and thus an increasing amount of information is available to devices in the Internet of Things (IoT)” (Chen & Zhu,2017). Some of them we will discuss below:

Cost-Effective: There is no special manpower is required to move data from one server to another and vice versa also it saves time as well while doing movement of data.

Ease of Use: There is no specialized training is required for any home user to any organizational IT also it is available to access instantly.

Save from latest cyber threats: As it is always up to date so a business owner can be stress-free as it can tackle to latest cyber threats as well.

Disaster Management: In event of a disaster your data will be saved on the cloud and security as a service ensures the same.

User Authentication & Encryption: This service is based on user authentication with the user’s password for access the data saved is encrypted as well. There are several reasons to choose security as a service.

Flexibility: These offer the particular service you want to choose for your organization instead of a whole package.

Availability: Your data is available 24x7x365 days without any issues. “In the Security-as-a-service model the focus is on security delivered as cloud services; i.e. security provided through the cloud instead of on-premise security solutions” (Sharma, Dhote, & Potey, 2016).

Report:- SECaaS is having the reporting management where you can check the significant security events, attack logs, and other significant data.

TCO:- Total cost of ownership helps to share the results between the traditional following method and new platform i.e. security as a service. Also along with this user can same the time by accessing the content even the user is sitting in any part of the world and last you will find the lower TCO while adapting SECaaS.

Post#2

 

“Security as a service (SECaaS) is an outsourced service wherein an outside company handles and manages your security”. (Brook, 2018). In the fundamental way, using anti-virus sound over the Internet is the best definition of security as a service. Security as a service no more offers security solutions centrally, where the IT department installs the virus detection software, spam filtering software and other security tools on each computer or network or server, upgrades the software or advises us to use it. The old way to do it is pricey as well. Hardware expenses and licensing costs continue to allow us to use the app. Instead, security as a service helps us to use only a web browser tool to make it direct and cost-effective.

For certain businesses, the security competence deficit is an urgent challenge and in-house protection practitioners have to be able to take their time on the most important business activities. By defining tasks that SECaaS or managed security services (MSS) suppliers can handle, such as program setup, repair, and disaster recovery, companies can prioritize their available time and resources.

In the past, the dominant assumption was that protection could be triggered and left to work, so a big security force wasn’t really necessary. But with the growth of the danger scene and the acceptance of cybersecurity as a continuously evolving war against ever more advanced cyber criminals, this mentality has changed. Companies need to determine whether they need to recruit more protection practitioners-a battle in a very competitive and skilful industry-or whether they need technologies and services. (Byrne, 2018).

Security as a service has many advantages. The most evident is that it includes a web interface to administer the business. It supports ongoing updates and helps outsource manual functions, such as log management. The need for expensive technology consultants and researchers may also be bypassed by using a cloud based security product. SECaaS providers are heavily dependent on their on-going defense and records are continually updated to provide up-to – date security coverage. This also eliminates the problem, instead of integrating all elements into a management scheme, that of providing different infrastructures. Yet SECaaS provides far more security experience, in addition to being an effective means of saving money and time than normally possible within an enterprise. (Panda, 2016).

The use of security as a service has many benefits. Those are:

1. People are working with the most updated and best available security software. To be accurate and useful, anti-virus software must work with the current descriptions of the virus so that risks can be stuffed out and with the latest. People always use software that have the newest risks and options modified with security as a service. This does not mean that the customers should not upgrade their anti-virus software and keep other applications up to date and make sure we use the new security updates. The same is true with email filtering upgrade and repair.

2. We have the right protection staff to work with us. IT security professionals are at our service and may have more expertise and ability than anyone on our IT squad.

3. Faster production. The beauty of the services is that we are able to provide our customers with immediate access to these resources. On request, SECaaS deals are presented so that we can measure up or down as desired and do so with agility and speed.

4. Employees should concentrate on the organisation’s most critical issues. Using a web interface or a management dashboard, it’s easier to administer and regulate our own IT team ‘s security processes in our business.

5. Allows management in-house smoother. It is not enough to keep data secure if we have secured data. We should be mindful whether a customer accesses this information when he or she has no clear business intent.

6. Cost reductions. No hardware or software licensing needs to be purchased or paid for. Instead, it is possible to substitute upfront capital at a discount rate relative to upside costs with contingent operating expenses.

7. Protection against cyber-attacks and threats. Hackers are actively designing ransomware and cyberattacking tactics. With cyber security professionals developing strategies for existing cyber challenges, cyber criminals are increasingly designing new and creative ways to escape detection and penetrate business networks effectively in stealing their data. Therefore, good cyber defense strategies should be good at adapting not only to the current established cyber threats; they should also be able to detect and counteract new threats and emerging threats. We are not only shielded from current threats by outsourcing to an SECaaS provider; we are also protected from new threats. The security company works to be completely mindful of any new risks to cybersecurity. Our provider also guarantees the complete configuration of the network security system to defend against novel cyber-attacks. (Elliott,2020).

Task6

Topic 1:   List and briefly define the key attributes of cognitive computing.

Topic 2 :  How does cognitive computing differ from ordinary AI techniques?   

Note:The work must be formatted with the APA 6th edition style (double spaced and references indented accordingly). 

All citations and references must be in the hanging indent format with the first line flush to the left margin and all other lines indented.

You need to cite your sources in your discussion post both in-text and in a references section. Minimum 500 -600 words. NO PLAGIARISM.