. Describe how you would address each of the following security aspects as they relate to the technology solution you have proposed and explain why they are important for GER UMUC.
White Paper: Evaluation of IT Architectural Considerations Before you begin this assignment, be sure you have read the GER UMUC Case Study and completed the Case Study Stage One Project. IT Considerations for Proposed Technology Solution For your Stage 1 Project, you proposed a technology solution to improve a business process at GER UMUC. In evaluating an IT proposal, there are several areas that need to be considered. Some of these considerations are listed below. Depending on the specific technology solution you proposed, some of the considerations will be more important than others, or may need specific consideration prior to implementation. Purpose of this Assignment This assignment gives you the opportunity to apply your knowledge of the areas to be considered in planning and implementing a technology solution and demonstrate your understanding of the components of a technology solution. This assignment specifically addresses the following course outcomes to enable you to: • evaluate information systems and enterprise solutions to determine the best fit to enable the organization’s strategic outcomes • apply best practices and methodologies to develop enterprise level information system solutions• identify and evaluate trends and determine applicability to enterprise information system solutions Assignment Using the technology solution you proposed in Stage 1, you will write 3-5 page paper(plus illustration described below) that briefly explains your proposed solution and then addresses the IT architectural considerations listed below, explaining how each impacts or relates to the proposed IT solution, as it would be implemented for GER UMUC. The analysis that you provide for these considerations must be aligned to the specific solution you proposed and needs to be appropriate to the GER UMUC Case Study. You should use the textbook andat least one external resource. Select credible sources, avoiding Wikipedia, blogs, etc. Remember to correctly cite and reference your sources with APA format. Submit your paper via your Assignment Folder as a Microsoft Word document with your last name included in the filename. Your paper should include the following: 1. Brief explanation of proposed technology solution, providing just enough detail to set the stage for the discussion to follow. 2. IT Architectural Considerations a. Of the three enterprise solutions listed below, which one is most applicable to GER UMUC and your proposed solution and why (concepts for each can be found in Chapter 8 of the text)? i. Supply Chain Management ii. Customer Relationship Management iii. Enterprise Resource Planning b. Choose four of the following IT characteristics that are most important to consider for your proposed solution and GER UMUC. How does each of the four you selected meet the business requirements of GER UMUC and relate to your proposed technology solution? Note: It is not sufficient to just indicate that the solution should be scalable, for example. You need to explain specifically why the business requirements of GER UMUC would have a high need for scalability. i. Accessibility – use of the system is restricted to specific users for specific purposes ii. Availability – timeframes during which the system must be “up” for use iii. Maintainability – the system can be modified quickly to accommodate business changes iv. Portability – the system can operate on different devices or with different software v. Reliability – the system performs its functions correctly and provides accurate information vi. Scalability – the system can grow to accommodate more users or more transactions vii. Usability – the system is easy to learn to use c. Describe how you would address each of the following security aspects as they relate to the technology solution you have proposed and explain why they are important for GER UMUC. Note: Be specific in your explanations – for example, why is authentication and authorization needed and how would it apply to the users of your proposed solution. i. Authentication & Authorization ii. Prevention & Resistance iii. Detection & Response 3. Describe the technical components of your proposed solution. Creating a table is a clear and organized approach to presenting this information. Figure 1.19 on page 31 of your textbook, illustrates all of the components of an information system. There it says “All information systems use people, hardware, software, data, and network resources to perform input, processing, output, storage, and control activities that transform data resources into information products.” Describe the components of your proposed solution, to include: • resources: o people o hardware o software o data o network • and activities: o input o processing o output o storage o control You must create at least one original graphical representation of your specific solution. Examples showing the appropriate level of detail for your graphic may be found on the following pages in the textbook: 240 (fig. 6.14 & 6.15), 250 (fig. 6.20), 251 (fig. 6.21), 279 (fig. 7.6), 280 (fig. 7.7), 353 (fig. 9.2), 360 (fig. 9.6), 375 (fig. 9.15), and 560 (fig. 13.15). You may obtain symbols from the file “example_network_diagram” and you should include labels as to what the purpose of the component is, e.g. email server, database server, system administration PC, etc. (Note: I’ll be looking for whether you have provided a logical representation of your solution – components discussed in your solution description should appear in your diagram along with an appropriate flow of data between components.) You can utilize MS Word, MS PowerPoint, Dia (free): http://dia-installer.de/download/index.html (Windows-based) or http://dia-installer.de/download/macosx.html (Mac-based) to create your graphic. The “right” and “wrong” answers have to do with whether or not you correctly described each consideration as it relates to your proposed technology solution and the GER UMUC Case Study.