SophiaPretty

(5)

$14/per page/Negotiable

About SophiaPretty

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Algebra See all
Accounting,Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Communications,Computer Science,Economics,Engineering,English,Environmental science,Essay writing Hide all
Teaching Since: Jul 2017
Last Sign in: 213 Weeks Ago, 5 Days Ago
Questions Answered: 15833
Tutorials Posted: 15827

Education

  • MBA,PHD, Juris Doctor
    Strayer,Devery,Harvard University
    Mar-1995 - Mar-2002

Experience

  • Manager Planning
    WalMart
    Mar-2001 - Feb-2009

Category > Computer Science Posted 03 Dec 2017 My Price 10.00

Architecting the Security Software Infrastructure

I choose To compete AMAZON ON-LINE RETAIL SALE. I need help to proceed

Here’s the scenario:

Each one of you will be in charge of of a large corporation. One different organization for each one of you. In other words, each of you will be architecting a separate corporation, therefore there will not be any two of you providing your services for the same corporation.

 

Each of the enterprises that you guys will work for is a pseudo company being created that is striving be a competitorof a knowncorporation. The list of organizations are that your companies will competeagainst are as follows:

 

 

Corporation

Type of Enterprise

Name of your

pseudo

corporation

Architect Name

•

The IRS

U.S. Federal Government Tax Collector

 

 

•

Comcast

Internet, Cable, Telephony Service

 

 

•

Home Depot Corp

Retail Sales

 

 

•

Golden Corral Restaurants

Food Service

 

 

•

Xcel Corporation

Utility Company

 

 

•

The Red Cross

Charity Organization

 

 

•

Cedar Sinai Hospital

Hospital/Health Care

 

 

•

Face Book

On-line chat network, etc.

 

 

•

Amazon

On-line retail sales

 

 

 

 

I choose AMAZON ON-LINE RETAIL SALES Topic

 

 

Topic

Comment

[1]

Security Architectural Approach

You will want to define your Security Organization and Infrastructure (e.g., which roles will be needed for your organization), the access points, the overall security controls, the threat/concern/risk matrix, a short version of your strategic IT plan, your security ,and w

[2]

Research

You will have to do your due diligence and perform the research on whichever organization/enterprise/corporation that is being assigned to you.

[3]

Report to your

Organization

You will have to prepare a report in order to inform your pseudo-company’s organization just what is their strengths and possible weaknesses. For example: does the hospital have an adequate system for processing their inpatients? Are their wait times acceptable? Is there something that can be done from stopping the huge amount of ID Theft cases from the IRS?? What is the throughput of deliveries to Home Depot in order to keep up with the seasonal demands??

[4]

SW Infrastructure Design

You will need to work on the architectural design of their software infrastructure - from a high level, of course.

[5]

Areas you will need to address for your org. to be a fierce competitor

Some of the areas you will have to address (and it is obviously depending on which organization you choose) are:

Database, cloud service, VMs, security, communications, networking, infrastructure, access controls, audit controls. logging, IAAS(?), SAAS(?), PAAS(?), back-up, recovery, Environmental security, remote access, Security Awareness Training freetc.

[6]

APA Format!

The report and research paper portions will be in APA format. C’mon! You guys are in grad school! Therefore, you will cite any of your references and format your paper.

[7]

Presentation

You will also prepare a presentation that will relay your work so that you can present it to the class. The presentation will notconsume lessthan8.5 minutes and morethan10 minutes. When you do bring your presentation to the class, you will have everything readytogo (e.g., on a thumb drive, CD, etc., that is ready to plug in to my machine). 

[8]

Stakeholders

Include a list of the stakeholders that you will be working with in that corporation.

[9]

Content

You should present the business drivers, your security architectural approach, The quality attributes, Availability, etc. What products you propose to use Sun, Microsoft, Cisco, etc.

 

 

 

 

 

 

 

 

 

 

 

Attachments:

Answers

(5)
Status NEW Posted 03 Dec 2017 05:12 AM My Price 10.00

-----------  ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly

Not Rated(0)