Answered You can hire a professional tutor to get the answer.

QUESTION

Read the case study titled, “Brazil to fortify government email system following NSA snooping revelations,” located in the attachment. Use  the Internet to research the architectures that other govern

Read the case study titled, “Brazil to fortify government email system following NSA snooping revelations,” located in the attachment.

Use  the Internet to research the architectures that other government  organizations and intelligence agencies use for email privacy, if any.

Write a three to four (3-4) page paper in which you:

  1. Examine  the proposed business ethical problem that the Brazilian Federal Data  Processing Service is presently experiencing. Determine whether you  agree or disagree that Brazil’s problem is an ethical one that should be  corrected. Provide a rationale for your response.
  2. Assess the  levels of security deficiencies inherent in the Brazilian Federal Data  Processing Service original enterprise architecture. Conclude whether or  not Brazil could have previously considered its current problem and  built an original architecture that would have prevented the problem in  question. Provide a rationale for your response.
  3. Evaluate the  quality of the Brazilian Federal Data Processing Service’s proposed  architecture plan geared toward solving the security problem. Suggest  two (2) other possible architecture solutions that the Brazilian Federal  Data Processing Service should consider. Justify your response.
  4. Determine  whether or not one (1) of the governments or intelligence agencies that  you researched has taken precautions to avoid a security breach similar  to the one that the Brazilian Federal Data Processing Service had  experienced. If this government organization or intelligence agency has  taken precautions to avoid a similar security breach, provide one (1)  example of such a precaution. If this government organization or  intelligence agency has not taken precautions to avoid a similar  security breach, recommend one (1) action that it can take in order to  avoid a similar security breach.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be  typed, double spaced, using Times New Roman font (size 12), with  one-inch margins on all sides; citations and references must follow APA  or school-specific format. Check with your professor for any additional  instructions.
  • Include a cover page containing the title of the  assignment, the student’s name, the professor’s name, the course title,  and the date. The cover page and the reference page are not included in  the required assignment page length.

Please attach the turnitin report with the post. Thank you

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question