SuperTutor

(15)

$15/per page/Negotiable

About SuperTutor

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Business & Finance See all
Accounting,Business & Finance,Economics,Engineering,HR Management,Math Hide all
Teaching Since: Apr 2017
Last Sign in: 327 Weeks Ago, 5 Days Ago
Questions Answered: 12843
Tutorials Posted: 12834

Education

  • MBA, Ph.D in Management
    Harvard university
    Feb-1997 - Aug-2003

Experience

  • Professor
    Strayer University
    Jan-2007 - Present

Category > Essay writing Posted 04 Jul 2017 My Price 20.00

IFSM 370 Project 2: White Paper Instructions Introduction

IFSM 370 Project 2: White Paper Instructions Introduction
This is an individual project. Each student must complete a White Paper that proposes
a telecommunications solution to address a communications problem for a business
organization. The target audience will be the organization’s Chief Information Officer
(CIO). The White Paper deliverable is an MS Word document. If you have never
written a white paper, you should conduct some research and review sample white
papers to understand the content and format associated with these professional
documents.
The completed White Paper deliverable is due by 11:59 PM Eastern Time on the due
date shown in the Course Schedule. See the Additional Information section of the
syllabus for the penalty for late or missed assignments and projects.
The White Paper is valued at 12% of the course grade. Scenario
Ullman, Manly, & Ulysses Corporation
With 75,000 customers worldwide, 250 employees working in four locations in the
United States and three European offices, and a catalog of more than 100,000 parts,
Ullman, Manly & Ulysses Corporation (UMUC) relies on its network for its survival. In
the past decade, UMUC has seen its business grow from just one location and a few
local customers to the worldwide supplier it is today. But in the process of growing
exponentially, it has overwhelmed its telecommunications network, which is currently
managed by an outside telecommunications network management company. The
network crashes frequently, resulting in customer service and e-mail interruptions that
are costly to the company. The network management company is not responsive to
UMUC, a relatively small customer, and often disagrees that there is even a problem.
Since the contract with the service provider is about to expire, UMUC has decided to
seek a better network solution.
The Chief Information Officer (CIO) has outlined the key requirements for a new network
for UMUC. He has explained to the executive board that a new network would have the
following characteristics:
1. Availability: Business operations require maximum uptime, and quick repairs
when needed.
2. Reliability: The network must function as designed and produce accurate
results.
3. Scalability: UMUC continues to grow at a rapid rate, and there are plans for
acquisition of several small parts suppliers; the network must support this growth.
4. Security: The confidentiality and integrity of UMUC's data is of great importance,
as is the protection of its customers' data. Page 1 of 4 5.
6.
7.
8. IFSM 370 Project 2: White Paper Instructions
Flexibility: The new network must be responsive to the changing needs of the
business.
Performance: The network must provide quick access for employees and
customers.
Manageability: The network must be designed and implemented so that it can
be managed by a small team of centrally located IT specialists.
Economic efficiency: The ongoing operations and maintenance costs should
offset the initial investment costs, reducing the long-term total cost of ownership
of the network. UMUC's executives have agreed that they need a business network with higher
reliability, security, and scalability, but with lower costs, than the existing externally
managed network. The CIO has proposed that UMUC design and implement its own
network, using advanced technologies for high availability, efficiency, and security
management, that can be operated by a very small IT department. He proposes to use
virtual private network technologies to connect remote offices and users securely and to
facilitate company expansion. The Deliverable
The CIO has asked you to develop a 3-page white paper that provides the following: definition of the business or technical problem discussion of the problem within the context of the scenario recommendation of the application of technology, processes, and policies that
solve the problem discussion of the impact or risks of the applied solution within the context of
business strategy and managerial perspective identification, analysis, and mitigation of risks of the recommended solution
Briefly define the business problem, and discuss it in the context of the scenario. Briefly
describe the proposed technology solution, processes, and policies to solve the
problem. You should demonstrate your critical thinking as you incorporate the course
concepts and explain the business needs and solutions. Then discuss the impact or
risks of the applied solution within the context of the business strategy and managerial
perspective. Then discuss the challenges and security risks that result from
implementing the proposed solution. Propose mitigation strategies for the challenges
and risks identified. The bolded attributes in the Scoring Rubric (see below) must be
used as the section headings in the white paper.
Your deliverable will be a white paper three pages in length, not counting the cover page
and references page. At least two (2) external sources (other than the assigned
readings and other course materials) must be used, and citations and references must
be in APA format. Your paper will be scored according to the Scoring Rubric below. Be
sure you have incorporated all required aspects of the assignment. Page 2 of 4 IFSM 370 Project 2: White Paper Instructions Scoring Rubric
Attribute
The business
problem Proposed
technology
solution Proposed
processes and
policies Business and
managerial
impacts and
risks Full points Partial points The business problem
is defined and
discussed in sufficient
depth to set the stage
for the proposed
solution, and
demonstrates critical
thinking and
understanding of the
course concepts.
The proposed
technology solution
appropriately
addresses the
business
scenario/problem, and
demonstrates
understanding of
course concepts,
analysis, and critical
thinking.
Processes and policies
relevant to the
proposed solution are
presented; work
demonstrates
understanding of
course concepts,
analysis, and critical
thinking.
Impact and risks
relevant to the
proposed solution and
the business strategy
are presented from a
managerial
perspective; work
demonstrates
understanding of
course concepts,
analysis, and critical
thinking. No points The business problem is partially The business
defined and/or discussed; it may problem is not
not adequately set the stage for
defined.
the proposed solution and/or
may not demonstrate critical
thinking and understanding of
course concepts. Possib
Point
1 The proposed technology
solution somewhat addresses
the business scenario/problem;
it may be lacking in
demonstration of understanding
of course concepts, analysis,
and/or critical thinking. No technology
solution is
proposed. 3 The processes and policies
somewhat address the business
scenario/problem; work may be
lacking in demonstration of
understanding of course
concepts, analysis, and/or
critical thinking. No proposed
processes or
policies are
presented. 2 Impact and risks are somewhat
relevant to the proposed solution
and/or the business strategy;
they may or may not be
presented from a managerial
perspective; and they may be
lacking in demonstration of
understanding of course
concepts, analysis, and/or
critical thinking. No impact or risks
are presented. 1 Page 3 of 4 IFSM 370 Project 2: White Paper Instructions
Attribute
Cybersecurity
challenges and
risks identified Mitigation
strategies External research Document format Full points Partial points Cybersecurity
challenges and risks of
the proposed solution
are appropriately
identified; work
demonstrates
understanding of
course concepts,
analysis, and critical
thinking.
Appropriate mitigation
strategies are provided
and thoroughly
explained. All risks of
the proposed solution
are addressed.
More than two sources
other than the assigned
readings and course
materials are
incorporated and used
effectively.
The document reflects
effective organization
and correct sentence
structure, grammar,
and spelling; it is
presented in a
professional format;
and references are
appropriately
incorporated and cited,
using APA style. No points Possib
Point
2 Cybersecurity challenges and
risks of the proposed solution
are partially identified and/or
explained; work may be lacking
in demonstration of
understanding of course
concepts, analysis, and/or
critical thinking. Cybersecurity
challenges and
risks are not
included, or do not
apply to the
proposed solution. Mitigation strategies are
somewhat appropriate and/or
partially explained. They may
only partially address the risks of
the proposed solution. No mitigation
strategies are
provided. 1 One or two sources other than
the assigned readings and
course materials, but they are
not properly incorporated or
used and/or are not effective or
appropriate.
The document is not wellorganized, and/or contains
grammar and/or spelling errors;
and/or it does not follow APA
style for references and
citations. No external
research is
incorporated. 1 The document is
extremely poorly
written and does
not convey the
information. 1 Total Points: Page 4 of 4 12

 

Attachments:

Answers

(15)
Status NEW Posted 04 Jul 2017 04:07 AM My Price 20.00

-----------

Attachments

file 1499143670-Solutions file.docx preview (51 words )
S-----------olu-----------tio-----------ns -----------fil-----------e -----------Hel-----------lo -----------Sir-----------/Ma-----------dam----------- T-----------han-----------k y-----------ou -----------for----------- yo-----------ur -----------int-----------ere-----------st -----------and----------- bu-----------yin-----------g m-----------y p-----------ost-----------ed -----------sol-----------uti-----------on.----------- Pl-----------eas-----------e p-----------ing----------- me----------- on----------- ch-----------at -----------I a-----------m o-----------nli-----------ne -----------or -----------inb-----------ox -----------me -----------a m-----------ess-----------age----------- I -----------wil-----------l b-----------e q-----------uic-----------kly----------- on-----------lin-----------e a-----------nd -----------giv-----------e y-----------ou -----------exa-----------ct -----------fil-----------e a-----------nd -----------the----------- sa-----------me -----------fil-----------e i-----------s a-----------lso----------- se-----------nt -----------to -----------you-----------r e-----------mai-----------l t-----------hat----------- is----------- re-----------gis-----------ter-----------ed -----------onÂ----------- th-----------is -----------web-----------sit-----------e -----------Tha-----------nk -----------you----------- -----------
Not Rated(0)