Answered You can buy a ready-made answer or pick a professional tutor to order an original one.
Case Study Assignment: CHEVRON’S INFRASTRUCTURE EVOLUTION Discussion Points1. Do some Internet research on Chevron’s use of seismic imagingtechnology. Briefly explain how it works and how it has
Case Study Assignment: CHEVRON’S INFRASTRUCTURE EVOLUTION
Discussion Points1. Do some Internet research on Chevron’s use of seismic imagingtechnology. Briefly explain how it works and how it has helpedChevron discover new oil and gas reservoirs.C6-72. Do some Internet research on security vulnerabilities associated withSCADA and digital industrial control systems. Summarize the majorsecurity concerns associated with these systems and steps than can betaken to enhance their security.3. Discuss the pros and cons of moving enterprise-wide applications thathave traditionally been supported on premises to the cloud.4. Do some Internet research on identify management and single sign onsystems. Briefly explain how these work and why they are important inbusiness intranets and extranets.5. Why is it increasing most important for a CIO or IT executive whooversees geographically distributed enterprise networks to be businessliterate?
- @
- 55 orders completed
- ANSWER
-
Tutor has posted answer for $40.00. See answer's preview
********************** ****** *********** Infrastructure EvolutionStudent’s NameInstitutional ******************** Study: *********** Infrastructure Evolution1 ** **** ******** ******** on *********** *** ** ******* ******* ********** ******* explain how ** ***** and *** ** *** ****** ******* discover new *** and gas ********** *********** Imaging ********** **** ***** **** are ****** **** by ********* *** ************* to study the ******** ********** underneath *** earth’s ******* *** procedure seeks ** ******** ********** **** might **** ******* ***** *** crude **** *** ********** implements ************************** ******* **** ****** *** echo ** ***** ***** that generate **** ******* *** ***** ***** *** ****** are ******** ************ are done to find *** ** the ***** **** leads of ********* of natural *** ** ********* *** ** what ***** ** *** geologic ********* *********** ************ ************ has ******** **** ********** *** *** been using ** **** ** ************** *** * long ****** now In **** the ******* had * ********* **** ** 66 percent ** natural gas *** ***** *** ********** underground ** *** ** **** technology *********** scientists see ******* earth’s ******* better **** ********* ever **** *** **** thing ***** **** ********** ** **** discovery ** ***** natural ******** ** ***** **** ******** even in *** most *********** areas **** ** ** deep ****** ** *** **** ** Mexico in the *** *********** ** **** ********** *** **** ** **** ******** ***** *** ******** ****** **** **** made ** ** **** ************* *********** ************ ***** The ********** ** ************ **** **** no much ** manual **** is **** neither *** the ************ **** manually *** *********** ***** the speed of ****** ** seismic ***** ******* ****** ** rocks is ******** ******** ************** are used ** ********* *** processing *** **** *** ** able to for * visual *** ** graphics ** the *** image ******** ** * *** ************* especially ** ******* ***** ** ***** * ************** ********* of *** ************ ** **** ******** ******** ** ******** *************** ********** **** ***** and digital ********** ******* ******* ********* *** ***** ******** ******** ********** **** ***** ******* and ***** that *** be ***** ** enhance ***** ********** *********** ******* *** **** *********** ******* *** ********** ******* systems ******* they *** ***** **** ******* and *************** **** **** **** geeks ** *** Information ********** *** ******** ******* *** ******* ways ***** day on *** **** *** attach *** SCADA *** industrial ******* ******* (Ozturk ***** ***** ***** Adams ***** ********* *************** find ***** *** industrial control systems vulnerable ** **** *** ** *** ********** * The systems are *** monitored ** a ********* ***** **** makes ** impossible for ********* detection of ********** ********** *** ********* ******* ** *** ******* **** ****** the ******** more **** ** ** *** dirty work ** The **** *********** SCADA and industrial ******* ******* are ********* **** are leading ** ***** attacks *********** of ******** *** ******** ******* ************ ** updating ** ****** ***** ****** iii **** ** ********** knowledge about devices ** **** * ********* Even ****** ***** *** **** ********** control ******* ***** ********* ******* ** ** remotely ********* *** ******* ***** devices **** ** **** ***** ********* ************ ****** 2015) iv ****** ********** **** ** ******* ** ********* and *** ** **** ******** ******* may create authentication ***** ** **** ******** is ****** and *** be ****** hacked * **** ** ***** *** ********** ******* ******* **** ** understand *** network ******* ***** **** leads ** ******* of ************* ********* ******* *** ************ ******** organizations’ ****** management *** not **** ********* basically ******* they cannot monitor *************** solutions ** ***** *************** *** ******* ******** i ************** ** ********** and authentication ************ ****** the ******* **** can ** ******** through ************** ** ************* ******* *** ********** that must meet the **** ********* Examples include *** ******** ***** *** *** ******** ***** ii The ******** **** ** *** ******* must **** ***** ********* ***** include ******** *** personnel ******* with the ****** ******* ** ***** ******** ***** *** *** ******** assets ****** **** ******** ******** of *** system ** ****** ** ******* ***** ***** ***** Adams ***** Management *** ******* ** *** system ******** ** ********* ***** ******** identification ** *** ***** assets *** ****** ******** reporting *** ******** ******** ** *** in place3 ******* *** **** *** **** of ****** *************** applications **** **** ************* **** ********* *********** ** *** ******************** applications *** *** ** ***** the ******* of *** ***** ************ **** moving **** * ****** to the ***** ****** ***** part ** the organization However ***** *** advantages ******** **** **** ** well ** ************* **** ** *** ********** include *** ********** * *** ***** ** ****** ** ******** ***** ******* on *** ****** speed of the ******* ******** *** ******* ****** ii *********** ******* are ***** ** have a ******** ******* ***** limits ***** *********** ****** *** ****** ** *** ***** allows *** expansion ** future as the ******** ***** ***** *** ******* *** ************* ***** is larger iii The initial ********** ** ********** *** ***** no **** ** ******** ******** ** ******** ** ******* ** ******* *** ********* ** close ** ******* ***** cloud **** ******* **** ****** systems *** ********** ******** that are inbuilt ********* 2015) * ***** ** ****** on energy—especially ******** ****** *** *** ***** ******* *** ******** to *** *********** ***** *********** ****** ******** at times produce * lot ** **** *** ***** *** they consume * *** of power ** Storage ******** ** **************** **** disadvantages **** ***** **** ****** enterprise systems ** *** cloud which include: * The *********** ** ****** of ****** ****** ********* which can **** ********** in *** ************ *** ************ bring *** organization ** * **** ** ** **** * **** ***** ** ** *** ** *** ***** of *** organization owner *** *** ***** service ********* Thus ***** storage ********** ******** ***** ********* 2015) iii ***** users **** ** rely ** internet connection *** ******* ** ****** ** *** ************ ** ********** ** ** case *** ********** regulations ********* ***** ********* are put in ***** **** affect *** ******** *********** Do some ******** ******** ** *********** ********** *** single ******* ******* Briefly explain how ***** **** *** why **** *** ********* in ******** ********* *** *************** ******* ******* *** properties **** ** *********** software ******* **** *** *********** yet ******** ******* ******* *** *** **** ** access these ******* **** **** to enter ***** ************** ******* mostly ** **** they ** *** *** ** ** ******** **** *** ************** ** *** ** ** ******** ** ******** ********** as *** SSO which enables one to access resources **** *** ******** ******* the *** ** * ****** user ************** ******* Single ******* ****** *** **** ** access ********* *** systems ********* to ********* ************* **** ****** to *** system On *** ***** **** ******** *** is ***** ** be ************ This ****** for *** integration ** ******** ************* ************ *** ******* in ** ********** *********** ***************** ********** ****** ********** *** But ****** ** extranet the different systems **** use ********* ************** details5 *** ** ** increasing **** ********* for * CIO ** IT ********* *** ******** ************** distributed ********** ******** to be business literate?Geographically *********** ********** ******** **** * ***** ********* in ******* a ******** **** ***** with ********** ******* ***** ************** ** ********* of geographic ****** which implies that the networks cannot ** *** ** **** ******** *** *** *** ** *** IT ********* ** ** organization **** ** ***** ** *** ***** ************ can **** *** *** best ** * ***** ********** ******** ** *** network ************** in the ***** ** **** Technological literacy *** ** ** ***** ******* to * ******** ***** ** *** **** * great **** in earning * ******** *********************** D ***** December *** Common SCADA System Threats and *************** * ******* ************ Retrieved ******** 11 2018 from http://patriot-techcom/blog/2015/10/27/common-scada-system-threats-and-vulnerabilities/Chevron ****** Government and ****** ******* (2015 *** *** Seismic ******* Technology Retrieved ******** 11 **** **** *************************************************** M & ***** P ****** SCADA ********* ********** *** solutionsSchneider **************** * ***** ******** *** Moving to ***** ******** ** * ******* – **** and **** Retrieved ******** 11 **** from ******************************************************************************************************************************************************************** Enterprise ****** ******* **** Retrieved ******** 11 2018 **** ************************************************************