SlideShare a Scribd company logo
11/29/21, 12:15 PM Devil's Canyon: A Role-Playing Simulation
on Designing the Enterprise Architecture for a Mountain Resort
https://pe-xl-
prod.knowdl.com/content/atm_sims/Wallace/Sim3/index.html
1/1
Designing the Enterprise Architecture for Devil's Canyon: Cost
Estimates
QTY One Time Start up* Ongoing Monthly expense** Total 1
year cost Total 3 years cost
Phase 1 : Software Choices
Enterprise Systems
Software as a Service/Cloud computing 1 $- $10,000 $120,000
$360,000
Individual Productivity Software
Microsoft Suite 100 $200 $5 $26,000 $38,000
Phase 2: Hardware Choices
Microcomputers-Laptops 100 $1,600 $40 $208,000 $304,000
Smartphones 100 $99 $45 $54,099 $162,099
Phase 3: Network and Telecom Choices
Cabling
Mix of �ber and twisted pair 1 $15,000 $100 $16,200 $18,600
Wi� and Cellular Access
Wi� Hot Spots 30 $250 $25 $16,500 $34,500
Cell towers (with pine tree disguise) 3 $20,000 $100 $63,600
$70,800
Voice Calls
Virtual PBX (Voice over IP, hosted by service) 1 $- $300
$3,600 $10,800
Main Internet Connection
Maximum bandwidth for highest speeds and
traffic
1 $2,000 $250 $5,000 $11,000
Phase 4: Special Purpose Systems Choices
Security system (video cameras, motion
sensors)
1 $80,000 $100 $81,200 $83,600
Web Cam System on Slopes with Large
Display in Lodge
1 $25,000 $50 $25,600 $26,800
Totals $619,799 $1,120,199
*
One time start up costs include expenses such as licenses,
purchases, installation,
adaptation, customization, etc.
* * Ongoing monthly expense includes maintenance,
subscriptions, training, etc.
Dq1
For this assignment you will have 2 headings:
Heading 1: Describe the relevance of performance standards for
today’s knowledge-directed
workers
Heading 2: How their use will result in a more competitive
compensation and benefit strategy.
Guided Response: Use at least two sources, in addition to the
course text, in your references. I
will deduct points if you fail to include 2 full references and
fail to cite each one a minimum of
once in your in-text narrative.
Dq2
You will have 2 headings for this assignment.
Heading 1: Compare when it would be preferable to motivate
employee performance through
short-term incentives versus long-term incentives, and vice-
versa.
Heading 2: Contrast when it would be preferable to motivate
employee performance through
short-term incentives versus long-term incentives, and vice-
versa.
Guided Response: Use at least two sources, in addition to the
course text in your references. I
will deduct points for failure to include 2 full references and to
cite from each a minimum of 1
time each in your in-text narrative.
Week 4 - Exercise
After viewing “Lyft, Uber, and Sidecar” and the “EatWith”
videos, predict the problems that will
continue to plague innovators in the flexible workforce. Use at
least two sources in addition to
the text to support your position.
The Reason Foundation. (Producer). (2014). Lyft, Uber and
Sidecar [Video file]. Retrieved from
the Films on Demand database.
• Traditional cab drivers need licenses for both themselves and
their cars. Alternative car
services connect drivers with passengers via mobile apps and
allows reviews of the
drivers. The taxi industry is fighting for government regulation
of these services.
Accessibility Statement does not exist.
Privacy Policy (Links to an external site.)
The Reason Foundation. (Producer). (2014). EatWith [Video
file]. Retrieved from the Films on
Demand database.
• Accessibility Statement does not exist.
https://ashford.instructure.com/courses/93836/external_tools/ret
rieve?display=borderless&url=https%3A%2F%2Flibrary.ashford
.edu%2FAccount%2FLtiLogin.aspx%3Fcustom_redirectresource
%3Dhttps%3A%2F%2Flibrary.ashford.edu%2Fezproxy.aspx%3
Furl%3Dhttp%253A%2F%2Ffod.infobase.com%2FPortalPlaylist
s.aspx%3FwID%3D100753%252526xtid%3D93730%252526loid
%3D373417
http://www.films.com/ecPrivacyPolicy.aspx
https://ashford.instructure.com/courses/93836/external_tools/ret
rieve?display=borderless&url=https%3A%2F%2Flibrary.ashford
.edu%2FAccount%2FLtiLogin.aspx%3Fcustom_redirectresource
%3Dhttps%3A%2F%2Flibrary.ashford.edu%2Fezproxy.aspx%3
Furl%3Dhttp%253A%2F%2Ffod.infobase.com%2FPortalPlaylist
s.aspx%3FwID%3D100753%252526xtid%3D93730%252526loid
%3D373418
• Privacy Policy
http://www.films.com/ecPrivacyPolicy.aspxWeek 4 - Exercise
CMGT582 v9
Transcript Devil’s Canyon
CMGT582 v9
Page 2 of 2
Transcript: Devil’s Canyon – A Role-Playing Simulation on
Designing the Enterprise Architecture for a Mountain Resort by
Patricia Wallace
In this simulation, the learner will understand how to design an
enterprise architecture for a Mountain Resort by using the
interactive map tools and get a sense of their vision and
estimate their expenses.
The simulation will allow the learner to interact with the
decision-makers of the enterprise through the following tools:
Email, Voicemail, Instant message, Architecture Designer, and
Web meeting.
Upon logging in to the application, the learner will have access
to the following tools: Email, Voicemail and the documents.
These are seen on the home screen of the application.Interaction
1
The learner will be using various means of interaction in the
simulation, which shall be divided into stages as the interaction
proceeds.
Email:
Once the learner clicks on the email icon, he/she will be able to
see three emails, two are replies to the email sent by Ed, one
from Se Jong and the other reply is from Ariane.
The subject of the email from Ed is “Devil’s Canyon ICT”. In
the email Dan says that the maps of the resort are ready for the
development, he wants to be sure that everything is right before
investing on the computers, networks, and software. He plans on
having all the cables underground so that people have wireless
access throughout the resort. He warns about the storms during
which the internet would be down. He says that electricity will
not be an issue, as they have their own generators which would
make a small data center feasible for them.
Ed informs that he has placed the cost estimates made for the
software, data center construction, servers, training,
maintenance and other things in the document folder to work
out a budget. The budget needs to be around $750K for a year,
which should include all the startup costs. He wishes for the
costs to be around $1.2 million for three years.
After reading the mail from Ed, the learner then closes the mail
and goes to read the reply made by Se Jong to Ed’s email.
Se Jong goes on to say that she has added a map of the resort to
the folder and is working on the installation of the Architecture
designer software for the user. She says that since they do not
have a legacy software to fall upon, it would be of advantage to
choose a software that would be suitable for the resort. She
wants a thought on the cloud computing and software as a
service and thinks of using it, as it would mean that there would
be no requirement for the data center. She goes on to say that if
they go in as an infrastructure-as-a-service they would not have
the need to buy bigger hard drives.
After reading the mail from Se Jong, the learner then closes the
mail and goes on to read the reply made by Ariane to Ed’s mail.
Ariane says that she has been thinking about the hardware side.
And asks for opinions regarding the usage of optical scanners at
the base of the lifts to keep the lines moving faster or using the
RFID to track the charges of the customers so that they could
avoid carrying their wallets. She thinks that it is costly to imply
RFID’s but would be helpful to track the customers during bad
weather in the slopes. She goes to mention that Se Jong is pretty
good at developing a mobile app which is costly as well.
After reading the emails, the learner exits from the email folder
and reaches the home page where he/she can find that the
voicemail has been highlighted.
The learner clicks on the voicemail icon.
Voicemail:
There is a voicemail from Ed. In the voicemail Ed says that he
has so much expectations for the resort and wants his customers
to have a top notch experience, he wants his customers to have
easy access to Wi-Fi to use their laptops and tablets, he also
wants smartphones to work well in the resort as there is the
issue of dropped calls which he plans to avoid from happening.
After listening to the voicemail, the learner exits from the
voicemail folder and reaches the homepage where the Instant
Message pane pops up.
Instant Message:
Se Jong has sent a message saying that the Architect Designer
application is up and running.
The learner can then type in a response and press return to read
through the documents that has been attached in the documents
folder
Documents:
On opening the documents folder, the learner can find two
documents titled “Map of the Resort” and “Estimated Costs of
Architecture Components”.
On clicking the document titled “Map of the Resort” the learner
can find a map of the resort.
After going through the map of the resort the learner closes the
document and selects the document named “Estimated Costs of
Architecture Components”.
On opening the document, the estimated costs for the
Architecture Components for Devil’s Canyon are given. The
document has the components divided into phases. Phase I:
Software Choices, which has two parts: Enterprise Systems and
Individual Productivity Software; Phase II: Hardware Choices;
Phase III: Network and Telecom Choices which has four parts:
Cabling, Wi-Fi and Cellular Access and Main Internet
Connection; Phase IV: Special Purpose Systems Choices.
After going through the documents in the folder, the user can
exit and reach the home page where the learner can find that the
Architecture Designer icon is highlighted.
Architecture Designer:
The learner on selecting the Architecture Designer icon can see
the map of the resort. There are three panes. One pane has the
map of the resort, the second pane has the Enterprise
Architecture Design Panel Running Expenses where the amount
gets filled in once the learner selects the options in Phase I:
Software Choices for the Enterprise Systems and the Individual
Productivity Software. The learner must keep in mind the
expenditure that is to be made.
The learner can click on the submit button if he/she is satisfied
with the response or reset the form and select the option that
he/she thinks is suitable and then submit the form.
The learner can then exit the Architecture Designer and return
to the homepage where the learner can find the Email and the
Voicemail icons to be highlighted.Interaction 2
Email:
The reader can find two emails in the email folder, one is from
Ed and the other mail is from Se Jong replying to Ed’s email
which has the subject “Phase I – Software Selections”.
Both the emails put forth the opinions and concerns of Se Jong
and Ed on the choices that have been made for the Phase I of
Software Choices for the Enterprise Systems and Individual
Productivity Software.
The user can then exit the email folder and reach the homepage
to see the Voicemail folder to be highlighted.
Voicemail:
On selecting the voicemail icon, the learner can find three new
voicemails from Ariane, Justin and Ed. The reader can then
listen to the individual voicemails where all the three of them
provide their view on the choices that has been made.
The reader then can exit the voicemail and reach the homepage
where Se Jong has sent a message on the Instant message saying
that she has loaded the data for Phase II on the hardware
architecture in the Architecture Designer. The homepage now
has the highlight on the Architecture Designer.
Architecture Designer:
Upon selecting the application, the learner can see the map of
the resort, with the selections that have been made in Phase I.
There are three panes as before, but at this point the user has to
make the decision by selecting the Hardware Choices of Phase
2, the learner can then submit after making the selection or reset
and then select the option that he/she thinks is right. The learner
must keep in mind the budget that has been allotted by Ed in the
beginning. The learner can notice that there is the option of
“Exit without Submitting”, keep in mind that the activity will
not proceed until the choice is made.
Exiting the Architecture Designer, the learner can see that the
voicemail and the email icons have been highlighted.
Voicemail:
Opening the voicemail first, the learner can find two new
voicemails from Justin and Ariane. Both of them provide their
feedback and concerns on the choices that have been made for
the Hardware.
Exiting the voicemail, the learner can now find the Email icon
in the homepage to be highlighted.Interaction 3
Email:
Selecting the email folder, the learner can find 2 emails. One is
from Ed and the other is from Se Jong.
The mail from Ed has the subject “Phase 2- Hardware
Selections”, where he puts forth his views on the selections that
have been made and the concerns that he has regarding the
choices.
The mail from Se Jong has the subject “Smartphones”, where
she shares her concern of operating systems for smartphones
and source codes.
The learner can then exit from the email folder and return to the
homepage to find the Architecture Designer to be highlighted.
Architecture Designer:
On selecting the Architecture Designer, the learner is put forth
with the map of the resort now containing the choices made for
both Phase I and Phase II. The learner now has to make the
decision regarding the Network and Telecom Choices for
Cabling, Wi-Fi and Cellular Access, Voice calls, Main Internet
Connection of Phase III. The learner should keep in mind the
budget allotted and that he/she can submit the selection made or
reset and make the correct choice. Keep in mind that the learner
cannot proceed further without making the selection for the
Phase III.
The learner can now exit from the Architecture Designer and go
to the homepage where he/she can see that the Instant Message
has popped up and has a message from Ed instructing to try out
the Web software where the team would be meeting up to
discuss what has been done so far.
Web Meeting:
On selecting the Web Meeting icon, the learner can see the
Screen Area with the map of the Resort. All the members are
present in the meeting, Ed is on the video call while the team
members Ariane, Se Jong, Justin and the learner talk to each
other using the chat box. There is a pane with notes that
explains the various concepts on technical words. The meeting
has the members discussing the Wi-Fi, Cell Towers, Landline
Voice calls and the Bandwidth choices. The meeting ends with
the members moving forward to make choices for Phase IV.
Note that the learner cannot proceed further without completing
the web meeting.
After exiting the Web Meeting, the user reaches the homepage
to find the Instant Message with messages from Ed.
Instant Message:
The Instant message has Ed saying that the budget needs to be
put forth and he needs recommendations for the Special purpose
systems. He also goes to put a reminder of the budget being
$750,000 for the first year and $1.2 million for total 3 years
cost.
2 The user can see that the Documents folder has been
highlighted in the homepage.
Documents:
On selecting the documents folder, the learner can find a new
document titled “Devil’s Canyon Architecture Map (draft)”.
Opening the document, the learner can see the draft model of
the Resort with the selections that have been made so far for the
resort.
The learner can close the document and exit from the document
folder.
Upon exiting the document folder and reaching the homepage,
the learner can find the Architecture Design to be highlighted.
The learner then selects the Application.
Architecture Designer:
On opening, the learner can see the map of the Resort with all
the selected options from Phase I, II, and III. The learner has
now to make the decision regarding the Special Purpose
Systems Choices of Phase IV. On selecting the options, the
learner can submit and then exit or reset the form and modify
the choices and submit.
The learner on returning to the homepage can find the email
icon to be highlighted.Interaction 4
Email:
The learner can find four new emails, two from Ed; one from Se
Jong and the last one from Justin. The emails have different
issues and concerns being discussed like the need for security,
smart lift ticket systems with optical scanners, the budget and
the web cam systems on the slopes.
The learner can exit from the email folder and reach the
homepage to find the Documents folder to be highlighted.
Documents:
On opening the documents folder, the learner can find the two
new documents that have been added to the folder. One is titled
“Devil’s Canyon Architecture Map (final) and the other being
“Devil’s Canyon Budget”.
“Devil’s Canyon Architecture Map (final)” has the final set up
of all the selections that have been made for the resort.
“Devil’s Canyon Budget” has the cost estimates for designing
the Enterprise Architecture for Devil’s Canyon. It shows all the
expenses and the total cost for 1 year and the total cost that has
occurred for 3 years.
The reader can then exit from the document to the folder and
then exit the document folder to return to the homepage where a
pop-up will say that the simulation has been completed.
End of simulation exercise
Copyright 2021 by University of Phoenix. All rights reserved.
Copyright 2021 by University of Phoenix. All rights reserved.
Running Head: SECURITY 1
SECURITY 2
Enterprise Security Architecture
Patrick Carrasquillo
University of Phoenix
CMGT/582
Dr. Ellen M. Gaston
12/01/2021
The goal of a security plan is to improve and maintain the
security within the organization by identifying potential threats,
creating ways to address them by using guidelines provided or
sometimes inventing new ways of addressing these issues, and
the formalization of response and reporting procedures
(Landoll, 2020). A security plan provides an overview of any
organization security as well as assessment methodology,
strategies, objectives, programs, and processes.
A security policy is a set of guidelines that guide users on how
to avoid as well as respond to certain security incidents. This
policy ensures that everyone within an organization adhere to
certain rules related to information security. Security policy
plays a huge role in enhancing information security within an
organization. Policy provides a set of guidelines to be used in
risk mitigation, by having a set of instructions on what to do in
an event of a security incident organizations operations are
guaranteed to return to normalcy within the shortest time
possible.
One of the key elements for any security plan is the set of
controls or guidelines used to prevent any security incident
(Chilamkurti, 2017). An office normally shows up safer during
the day than in the evening on the grounds that only few
criminals can commit a crime during the day. Operational
security addresses the most widely recognized form of safety
and, when appropriately executed, is frequently the best.
An experienced and recognized security staff committed to the
objectives of the organization is hard to find and on top of that
expensive to hire. After identifying security measures using the
best methodology, the next thing is to document these
guidelines in a security plan book or all-inclusive strategy,
which shows exact planning for the controls and measures being
proposed. Accepting the requirement for a thoroughly examined
security plan book can have the effect in acquiring resources
once a security event occurs.
Devil’s Canyon Security Related Risks/Threats
Phishing Attacks: Phishing attacks involve hackers tricking
users to provide their credential through social engineering and
other tricks. To avoid this form of attack, organization must use
phishing protection software and on top of that train their staff
on how to detect these attacks.
Remote Administration Tool (RAT) virus: These allow someone
to fully control your computer. They can view your desktop,
listen through your microphone, see through your webcam,
browse your files, copy files in both directions, steal passwords,
record everything you type, etc. These are also the easiest
viruses to create. Anybody could make one if they knew where
to get the installer file. RAT viruses must be installed on your
computer to become active.
Denial of Service (DOS) attack: This is where hackers overload
a website or other device to the point that it can no longer
process any more incoming information. After that time, all new
incoming connections will time out because the server or device
is busy trying to deal with all the packets sent to it in the DOS
attack.
Data Tampering: There are some Firefox and chrome plugins
available that let you look at all the data being sent to a website
before it leaves your computer. They also let you change this
information. This can be a big threat to Devil’s Canyon Security
as hackers can use these plugins to edit content to their
advantage.
Cookie Spoofing: Someone may be able to steal cookies from
your computer, or construct a fake cookie, and install it i nto
their own web browser to trick a website into thinking that it is
already signed in as you.
Risk Probability
Risk/Threat
Impact
Low
Medium
High
Phishing
Cookie Spoofing
Data Tampering
Denial of Service
Remote Administration Tool
An architecture is only as good as the data that supports it, and
the only way to keep that data current is to have the people who
own it help keep it current (Kigel, 2019). They won't do that
unless they see some real value in doing so, specific things like
documenting what specific activities are supported by IT
systems so that if something breaks you know exactly who's
impacted and can prioritize recovery actions.
A good security architecture will assure your stakeholders that
you have considered a wide array of specific attacks and
mitigated for each one to the extent that the organization is
comfortable. Security concerns typically surround the
unauthorized release of information or access to something (like
a vault or data center), but it can also mean protection of a
computing asset from malicious use (a DDOS attack is
malicious use).
Reference
Landoll, D. J. (2020). Information security policies, procedures,
and standards: A practitioner's reference. Auerbach
Publications.
Kigel, E. (2019). Using social Semantic Web data for privacy
policies. diplom.de.
Chilamkurti, N. (2017). Security, design, and architecture for
broadband and wireless network technologies. IGI Global.

More Related Content

More from SantosConleyha

11Me Talk Pretty One Day # By David Sedaris From his b
11Me Talk Pretty One Day # By David Sedaris From his b11Me Talk Pretty One Day # By David Sedaris From his b
11Me Talk Pretty One Day # By David Sedaris From his b
SantosConleyha
 
11Program analysis using different perspectives
11Program analysis using different perspectives11Program analysis using different perspectives
11Program analysis using different perspectives
SantosConleyha
 
11Factors that Affect the Teaching and Learning Process
11Factors that Affect the Teaching and Learning Process11Factors that Affect the Teaching and Learning Process
11Factors that Affect the Teaching and Learning Process
SantosConleyha
 
11Criminal Justice Racial discriminationStudent’s Nam
11Criminal Justice Racial discriminationStudent’s Nam11Criminal Justice Racial discriminationStudent’s Nam
11Criminal Justice Racial discriminationStudent’s Nam
SantosConleyha
 
11Communication Plan for Manufacturing PlantStud
11Communication Plan for Manufacturing PlantStud11Communication Plan for Manufacturing PlantStud
11Communication Plan for Manufacturing PlantStud
SantosConleyha
 
11CapitalKarl MarxPART I. COMMODITIES AND MONEYCHAPTER I.
11CapitalKarl MarxPART I. COMMODITIES AND MONEYCHAPTER I. 11CapitalKarl MarxPART I. COMMODITIES AND MONEYCHAPTER I.
11CapitalKarl MarxPART I. COMMODITIES AND MONEYCHAPTER I.
SantosConleyha
 
11Criminal Justice SystemShambri Chill
11Criminal Justice SystemShambri Chill11Criminal Justice SystemShambri Chill
11Criminal Justice SystemShambri Chill
SantosConleyha
 
11American Government and Politics in a Racially Divid
11American Government and Politics in a Racially Divid11American Government and Politics in a Racially Divid
11American Government and Politics in a Racially Divid
SantosConleyha
 
11Cancer is the uncontrollable growth of abnormal cells
11Cancer is the uncontrollable growth of abnormal cells11Cancer is the uncontrollable growth of abnormal cells
11Cancer is the uncontrollable growth of abnormal cells
SantosConleyha
 
11SENSE MAKING Runze DuChee PiongBUS 700 L
11SENSE MAKING Runze DuChee PiongBUS 700 L11SENSE MAKING Runze DuChee PiongBUS 700 L
11SENSE MAKING Runze DuChee PiongBUS 700 L
SantosConleyha
 
119E ECUTIVE BAR AININ CEOS NE OTIATIN THEIR PAWITH EM
119E ECUTIVE BAR AININ  CEOS NE OTIATIN THEIR PAWITH EM119E ECUTIVE BAR AININ  CEOS NE OTIATIN THEIR PAWITH EM
119E ECUTIVE BAR AININ CEOS NE OTIATIN THEIR PAWITH EM
SantosConleyha
 
11CALIFORNIA MANAGEMENT REVIEW VOL. 51, NO. 4 SUMMER 2009 C
11CALIFORNIA MANAGEMENT REVIEW  VOL. 51, NO. 4  SUMMER 2009  C11CALIFORNIA MANAGEMENT REVIEW  VOL. 51, NO. 4  SUMMER 2009  C
11CALIFORNIA MANAGEMENT REVIEW VOL. 51, NO. 4 SUMMER 2009 C
SantosConleyha
 
11Insert Title HereInsert Your Name HereI
11Insert Title HereInsert Your Name HereI11Insert Title HereInsert Your Name HereI
11Insert Title HereInsert Your Name HereI
SantosConleyha
 
11822, 1017 AM Estimating and Managing Costshttpsleo
11822, 1017 AM Estimating and Managing Costshttpsleo11822, 1017 AM Estimating and Managing Costshttpsleo
11822, 1017 AM Estimating and Managing Costshttpsleo
SantosConleyha
 
1191268 - Pearson Education Limited ©13 System Implementat
1191268 - Pearson Education Limited ©13 System Implementat1191268 - Pearson Education Limited ©13 System Implementat
1191268 - Pearson Education Limited ©13 System Implementat
SantosConleyha
 
1185880 - McGraw Hill Education ©PProjectrojectnetnetwor
1185880 - McGraw Hill Education ©PProjectrojectnetnetwor1185880 - McGraw Hill Education ©PProjectrojectnetnetwor
1185880 - McGraw Hill Education ©PProjectrojectnetnetwor
SantosConleyha
 
11822, 1157 PM Building a Business Case for Cloud Computing
11822, 1157 PM Building a Business Case for Cloud Computing11822, 1157 PM Building a Business Case for Cloud Computing
11822, 1157 PM Building a Business Case for Cloud Computing
SantosConleyha
 
11821, 245 PM Nurses Touch Video Interaction Family in a S
11821, 245 PM Nurses Touch Video Interaction Family in a S11821, 245 PM Nurses Touch Video Interaction Family in a S
11821, 245 PM Nurses Touch Video Interaction Family in a S
SantosConleyha
 
116[6]W O R K W I T H   H U M A N   N AT U R EIn
116[6]W O R K  W I T H   H U M A N   N AT U R EIn 116[6]W O R K  W I T H   H U M A N   N AT U R EIn
116[6]W O R K W I T H   H U M A N   N AT U R EIn
SantosConleyha
 
11821, 1030 AM Straight Photographyhttpscoastdistric
11821, 1030 AM Straight Photographyhttpscoastdistric11821, 1030 AM Straight Photographyhttpscoastdistric
11821, 1030 AM Straight Photographyhttpscoastdistric
SantosConleyha
 

More from SantosConleyha (20)

11Me Talk Pretty One Day # By David Sedaris From his b
11Me Talk Pretty One Day # By David Sedaris From his b11Me Talk Pretty One Day # By David Sedaris From his b
11Me Talk Pretty One Day # By David Sedaris From his b
 
11Program analysis using different perspectives
11Program analysis using different perspectives11Program analysis using different perspectives
11Program analysis using different perspectives
 
11Factors that Affect the Teaching and Learning Process
11Factors that Affect the Teaching and Learning Process11Factors that Affect the Teaching and Learning Process
11Factors that Affect the Teaching and Learning Process
 
11Criminal Justice Racial discriminationStudent’s Nam
11Criminal Justice Racial discriminationStudent’s Nam11Criminal Justice Racial discriminationStudent’s Nam
11Criminal Justice Racial discriminationStudent’s Nam
 
11Communication Plan for Manufacturing PlantStud
11Communication Plan for Manufacturing PlantStud11Communication Plan for Manufacturing PlantStud
11Communication Plan for Manufacturing PlantStud
 
11CapitalKarl MarxPART I. COMMODITIES AND MONEYCHAPTER I.
11CapitalKarl MarxPART I. COMMODITIES AND MONEYCHAPTER I. 11CapitalKarl MarxPART I. COMMODITIES AND MONEYCHAPTER I.
11CapitalKarl MarxPART I. COMMODITIES AND MONEYCHAPTER I.
 
11Criminal Justice SystemShambri Chill
11Criminal Justice SystemShambri Chill11Criminal Justice SystemShambri Chill
11Criminal Justice SystemShambri Chill
 
11American Government and Politics in a Racially Divid
11American Government and Politics in a Racially Divid11American Government and Politics in a Racially Divid
11American Government and Politics in a Racially Divid
 
11Cancer is the uncontrollable growth of abnormal cells
11Cancer is the uncontrollable growth of abnormal cells11Cancer is the uncontrollable growth of abnormal cells
11Cancer is the uncontrollable growth of abnormal cells
 
11SENSE MAKING Runze DuChee PiongBUS 700 L
11SENSE MAKING Runze DuChee PiongBUS 700 L11SENSE MAKING Runze DuChee PiongBUS 700 L
11SENSE MAKING Runze DuChee PiongBUS 700 L
 
119E ECUTIVE BAR AININ CEOS NE OTIATIN THEIR PAWITH EM
119E ECUTIVE BAR AININ  CEOS NE OTIATIN THEIR PAWITH EM119E ECUTIVE BAR AININ  CEOS NE OTIATIN THEIR PAWITH EM
119E ECUTIVE BAR AININ CEOS NE OTIATIN THEIR PAWITH EM
 
11CALIFORNIA MANAGEMENT REVIEW VOL. 51, NO. 4 SUMMER 2009 C
11CALIFORNIA MANAGEMENT REVIEW  VOL. 51, NO. 4  SUMMER 2009  C11CALIFORNIA MANAGEMENT REVIEW  VOL. 51, NO. 4  SUMMER 2009  C
11CALIFORNIA MANAGEMENT REVIEW VOL. 51, NO. 4 SUMMER 2009 C
 
11Insert Title HereInsert Your Name HereI
11Insert Title HereInsert Your Name HereI11Insert Title HereInsert Your Name HereI
11Insert Title HereInsert Your Name HereI
 
11822, 1017 AM Estimating and Managing Costshttpsleo
11822, 1017 AM Estimating and Managing Costshttpsleo11822, 1017 AM Estimating and Managing Costshttpsleo
11822, 1017 AM Estimating and Managing Costshttpsleo
 
1191268 - Pearson Education Limited ©13 System Implementat
1191268 - Pearson Education Limited ©13 System Implementat1191268 - Pearson Education Limited ©13 System Implementat
1191268 - Pearson Education Limited ©13 System Implementat
 
1185880 - McGraw Hill Education ©PProjectrojectnetnetwor
1185880 - McGraw Hill Education ©PProjectrojectnetnetwor1185880 - McGraw Hill Education ©PProjectrojectnetnetwor
1185880 - McGraw Hill Education ©PProjectrojectnetnetwor
 
11822, 1157 PM Building a Business Case for Cloud Computing
11822, 1157 PM Building a Business Case for Cloud Computing11822, 1157 PM Building a Business Case for Cloud Computing
11822, 1157 PM Building a Business Case for Cloud Computing
 
11821, 245 PM Nurses Touch Video Interaction Family in a S
11821, 245 PM Nurses Touch Video Interaction Family in a S11821, 245 PM Nurses Touch Video Interaction Family in a S
11821, 245 PM Nurses Touch Video Interaction Family in a S
 
116[6]W O R K W I T H   H U M A N   N AT U R EIn
116[6]W O R K  W I T H   H U M A N   N AT U R EIn 116[6]W O R K  W I T H   H U M A N   N AT U R EIn
116[6]W O R K W I T H   H U M A N   N AT U R EIn
 
11821, 1030 AM Straight Photographyhttpscoastdistric
11821, 1030 AM Straight Photographyhttpscoastdistric11821, 1030 AM Straight Photographyhttpscoastdistric
11821, 1030 AM Straight Photographyhttpscoastdistric
 

112921, 1215 PM Devils Canyon A Role-Playing Simulation o

  • 1. 11/29/21, 12:15 PM Devil's Canyon: A Role-Playing Simulation on Designing the Enterprise Architecture for a Mountain Resort https://pe-xl- prod.knowdl.com/content/atm_sims/Wallace/Sim3/index.html 1/1 Designing the Enterprise Architecture for Devil's Canyon: Cost Estimates QTY One Time Start up* Ongoing Monthly expense** Total 1 year cost Total 3 years cost Phase 1 : Software Choices Enterprise Systems Software as a Service/Cloud computing 1 $- $10,000 $120,000 $360,000 Individual Productivity Software Microsoft Suite 100 $200 $5 $26,000 $38,000 Phase 2: Hardware Choices Microcomputers-Laptops 100 $1,600 $40 $208,000 $304,000 Smartphones 100 $99 $45 $54,099 $162,099
  • 2. Phase 3: Network and Telecom Choices Cabling Mix of �ber and twisted pair 1 $15,000 $100 $16,200 $18,600 Wi� and Cellular Access Wi� Hot Spots 30 $250 $25 $16,500 $34,500 Cell towers (with pine tree disguise) 3 $20,000 $100 $63,600 $70,800 Voice Calls Virtual PBX (Voice over IP, hosted by service) 1 $- $300 $3,600 $10,800 Main Internet Connection Maximum bandwidth for highest speeds and traffic 1 $2,000 $250 $5,000 $11,000 Phase 4: Special Purpose Systems Choices Security system (video cameras, motion sensors) 1 $80,000 $100 $81,200 $83,600 Web Cam System on Slopes with Large Display in Lodge
  • 3. 1 $25,000 $50 $25,600 $26,800 Totals $619,799 $1,120,199 * One time start up costs include expenses such as licenses, purchases, installation, adaptation, customization, etc. * * Ongoing monthly expense includes maintenance, subscriptions, training, etc. Dq1 For this assignment you will have 2 headings: Heading 1: Describe the relevance of performance standards for today’s knowledge-directed workers Heading 2: How their use will result in a more competitive compensation and benefit strategy. Guided Response: Use at least two sources, in addition to the course text, in your references. I will deduct points if you fail to include 2 full references and fail to cite each one a minimum of once in your in-text narrative.
  • 4. Dq2 You will have 2 headings for this assignment. Heading 1: Compare when it would be preferable to motivate employee performance through short-term incentives versus long-term incentives, and vice- versa. Heading 2: Contrast when it would be preferable to motivate employee performance through short-term incentives versus long-term incentives, and vice- versa. Guided Response: Use at least two sources, in addition to the course text in your references. I will deduct points for failure to include 2 full references and to cite from each a minimum of 1 time each in your in-text narrative. Week 4 - Exercise After viewing “Lyft, Uber, and Sidecar” and the “EatWith” videos, predict the problems that will continue to plague innovators in the flexible workforce. Use at least two sources in addition to the text to support your position. The Reason Foundation. (Producer). (2014). Lyft, Uber and
  • 5. Sidecar [Video file]. Retrieved from the Films on Demand database. • Traditional cab drivers need licenses for both themselves and their cars. Alternative car services connect drivers with passengers via mobile apps and allows reviews of the drivers. The taxi industry is fighting for government regulation of these services. Accessibility Statement does not exist. Privacy Policy (Links to an external site.) The Reason Foundation. (Producer). (2014). EatWith [Video file]. Retrieved from the Films on Demand database. • Accessibility Statement does not exist. https://ashford.instructure.com/courses/93836/external_tools/ret rieve?display=borderless&url=https%3A%2F%2Flibrary.ashford .edu%2FAccount%2FLtiLogin.aspx%3Fcustom_redirectresource %3Dhttps%3A%2F%2Flibrary.ashford.edu%2Fezproxy.aspx%3 Furl%3Dhttp%253A%2F%2Ffod.infobase.com%2FPortalPlaylist s.aspx%3FwID%3D100753%252526xtid%3D93730%252526loid %3D373417 http://www.films.com/ecPrivacyPolicy.aspx https://ashford.instructure.com/courses/93836/external_tools/ret rieve?display=borderless&url=https%3A%2F%2Flibrary.ashford .edu%2FAccount%2FLtiLogin.aspx%3Fcustom_redirectresource %3Dhttps%3A%2F%2Flibrary.ashford.edu%2Fezproxy.aspx%3
  • 6. Furl%3Dhttp%253A%2F%2Ffod.infobase.com%2FPortalPlaylist s.aspx%3FwID%3D100753%252526xtid%3D93730%252526loid %3D373418 • Privacy Policy http://www.films.com/ecPrivacyPolicy.aspxWeek 4 - Exercise CMGT582 v9 Transcript Devil’s Canyon CMGT582 v9 Page 2 of 2 Transcript: Devil’s Canyon – A Role-Playing Simulation on Designing the Enterprise Architecture for a Mountain Resort by Patricia Wallace In this simulation, the learner will understand how to design an enterprise architecture for a Mountain Resort by using the interactive map tools and get a sense of their vision and estimate their expenses. The simulation will allow the learner to interact with the decision-makers of the enterprise through the following tools: Email, Voicemail, Instant message, Architecture Designer, and Web meeting. Upon logging in to the application, the learner will have access to the following tools: Email, Voicemail and the documents. These are seen on the home screen of the application.Interaction 1 The learner will be using various means of interaction in the simulation, which shall be divided into stages as the interaction proceeds. Email: Once the learner clicks on the email icon, he/she will be able to
  • 7. see three emails, two are replies to the email sent by Ed, one from Se Jong and the other reply is from Ariane. The subject of the email from Ed is “Devil’s Canyon ICT”. In the email Dan says that the maps of the resort are ready for the development, he wants to be sure that everything is right before investing on the computers, networks, and software. He plans on having all the cables underground so that people have wireless access throughout the resort. He warns about the storms during which the internet would be down. He says that electricity will not be an issue, as they have their own generators which would make a small data center feasible for them. Ed informs that he has placed the cost estimates made for the software, data center construction, servers, training, maintenance and other things in the document folder to work out a budget. The budget needs to be around $750K for a year, which should include all the startup costs. He wishes for the costs to be around $1.2 million for three years. After reading the mail from Ed, the learner then closes the mail and goes to read the reply made by Se Jong to Ed’s email. Se Jong goes on to say that she has added a map of the resort to the folder and is working on the installation of the Architecture designer software for the user. She says that since they do not have a legacy software to fall upon, it would be of advantage to choose a software that would be suitable for the resort. She wants a thought on the cloud computing and software as a service and thinks of using it, as it would mean that there would be no requirement for the data center. She goes on to say that if they go in as an infrastructure-as-a-service they would not have the need to buy bigger hard drives. After reading the mail from Se Jong, the learner then closes the mail and goes on to read the reply made by Ariane to Ed’s mail. Ariane says that she has been thinking about the hardware side. And asks for opinions regarding the usage of optical scanners at the base of the lifts to keep the lines moving faster or using the RFID to track the charges of the customers so that they could avoid carrying their wallets. She thinks that it is costly to imply
  • 8. RFID’s but would be helpful to track the customers during bad weather in the slopes. She goes to mention that Se Jong is pretty good at developing a mobile app which is costly as well. After reading the emails, the learner exits from the email folder and reaches the home page where he/she can find that the voicemail has been highlighted. The learner clicks on the voicemail icon. Voicemail: There is a voicemail from Ed. In the voicemail Ed says that he has so much expectations for the resort and wants his customers to have a top notch experience, he wants his customers to have easy access to Wi-Fi to use their laptops and tablets, he also wants smartphones to work well in the resort as there is the issue of dropped calls which he plans to avoid from happening. After listening to the voicemail, the learner exits from the voicemail folder and reaches the homepage where the Instant Message pane pops up. Instant Message: Se Jong has sent a message saying that the Architect Designer application is up and running. The learner can then type in a response and press return to read through the documents that has been attached in the documents folder Documents: On opening the documents folder, the learner can find two documents titled “Map of the Resort” and “Estimated Costs of Architecture Components”. On clicking the document titled “Map of the Resort” the learner can find a map of the resort. After going through the map of the resort the learner closes the document and selects the document named “Estimated Costs of Architecture Components”. On opening the document, the estimated costs for the Architecture Components for Devil’s Canyon are given. The document has the components divided into phases. Phase I: Software Choices, which has two parts: Enterprise Systems and
  • 9. Individual Productivity Software; Phase II: Hardware Choices; Phase III: Network and Telecom Choices which has four parts: Cabling, Wi-Fi and Cellular Access and Main Internet Connection; Phase IV: Special Purpose Systems Choices. After going through the documents in the folder, the user can exit and reach the home page where the learner can find that the Architecture Designer icon is highlighted. Architecture Designer: The learner on selecting the Architecture Designer icon can see the map of the resort. There are three panes. One pane has the map of the resort, the second pane has the Enterprise Architecture Design Panel Running Expenses where the amount gets filled in once the learner selects the options in Phase I: Software Choices for the Enterprise Systems and the Individual Productivity Software. The learner must keep in mind the expenditure that is to be made. The learner can click on the submit button if he/she is satisfied with the response or reset the form and select the option that he/she thinks is suitable and then submit the form. The learner can then exit the Architecture Designer and return to the homepage where the learner can find the Email and the Voicemail icons to be highlighted.Interaction 2 Email: The reader can find two emails in the email folder, one is from Ed and the other mail is from Se Jong replying to Ed’s email which has the subject “Phase I – Software Selections”. Both the emails put forth the opinions and concerns of Se Jong and Ed on the choices that have been made for the Phase I of Software Choices for the Enterprise Systems and Individual Productivity Software. The user can then exit the email folder and reach the homepage to see the Voicemail folder to be highlighted. Voicemail: On selecting the voicemail icon, the learner can find three new voicemails from Ariane, Justin and Ed. The reader can then listen to the individual voicemails where all the three of them
  • 10. provide their view on the choices that has been made. The reader then can exit the voicemail and reach the homepage where Se Jong has sent a message on the Instant message saying that she has loaded the data for Phase II on the hardware architecture in the Architecture Designer. The homepage now has the highlight on the Architecture Designer. Architecture Designer: Upon selecting the application, the learner can see the map of the resort, with the selections that have been made in Phase I. There are three panes as before, but at this point the user has to make the decision by selecting the Hardware Choices of Phase 2, the learner can then submit after making the selection or reset and then select the option that he/she thinks is right. The learner must keep in mind the budget that has been allotted by Ed in the beginning. The learner can notice that there is the option of “Exit without Submitting”, keep in mind that the activity will not proceed until the choice is made. Exiting the Architecture Designer, the learner can see that the voicemail and the email icons have been highlighted. Voicemail: Opening the voicemail first, the learner can find two new voicemails from Justin and Ariane. Both of them provide their feedback and concerns on the choices that have been made for the Hardware. Exiting the voicemail, the learner can now find the Email icon in the homepage to be highlighted.Interaction 3 Email: Selecting the email folder, the learner can find 2 emails. One is from Ed and the other is from Se Jong. The mail from Ed has the subject “Phase 2- Hardware Selections”, where he puts forth his views on the selections that have been made and the concerns that he has regarding the choices. The mail from Se Jong has the subject “Smartphones”, where she shares her concern of operating systems for smartphones and source codes.
  • 11. The learner can then exit from the email folder and return to the homepage to find the Architecture Designer to be highlighted. Architecture Designer: On selecting the Architecture Designer, the learner is put forth with the map of the resort now containing the choices made for both Phase I and Phase II. The learner now has to make the decision regarding the Network and Telecom Choices for Cabling, Wi-Fi and Cellular Access, Voice calls, Main Internet Connection of Phase III. The learner should keep in mind the budget allotted and that he/she can submit the selection made or reset and make the correct choice. Keep in mind that the learner cannot proceed further without making the selection for the Phase III. The learner can now exit from the Architecture Designer and go to the homepage where he/she can see that the Instant Message has popped up and has a message from Ed instructing to try out the Web software where the team would be meeting up to discuss what has been done so far. Web Meeting: On selecting the Web Meeting icon, the learner can see the Screen Area with the map of the Resort. All the members are present in the meeting, Ed is on the video call while the team members Ariane, Se Jong, Justin and the learner talk to each other using the chat box. There is a pane with notes that explains the various concepts on technical words. The meeting has the members discussing the Wi-Fi, Cell Towers, Landline Voice calls and the Bandwidth choices. The meeting ends with the members moving forward to make choices for Phase IV. Note that the learner cannot proceed further without completing the web meeting. After exiting the Web Meeting, the user reaches the homepage to find the Instant Message with messages from Ed. Instant Message: The Instant message has Ed saying that the budget needs to be put forth and he needs recommendations for the Special purpose systems. He also goes to put a reminder of the budget being
  • 12. $750,000 for the first year and $1.2 million for total 3 years cost. 2 The user can see that the Documents folder has been highlighted in the homepage. Documents: On selecting the documents folder, the learner can find a new document titled “Devil’s Canyon Architecture Map (draft)”. Opening the document, the learner can see the draft model of the Resort with the selections that have been made so far for the resort. The learner can close the document and exit from the document folder. Upon exiting the document folder and reaching the homepage, the learner can find the Architecture Design to be highlighted. The learner then selects the Application. Architecture Designer: On opening, the learner can see the map of the Resort with all the selected options from Phase I, II, and III. The learner has now to make the decision regarding the Special Purpose Systems Choices of Phase IV. On selecting the options, the learner can submit and then exit or reset the form and modify the choices and submit. The learner on returning to the homepage can find the email icon to be highlighted.Interaction 4 Email: The learner can find four new emails, two from Ed; one from Se Jong and the last one from Justin. The emails have different issues and concerns being discussed like the need for security, smart lift ticket systems with optical scanners, the budget and the web cam systems on the slopes. The learner can exit from the email folder and reach the homepage to find the Documents folder to be highlighted. Documents: On opening the documents folder, the learner can find the two new documents that have been added to the folder. One is titled “Devil’s Canyon Architecture Map (final) and the other being
  • 13. “Devil’s Canyon Budget”. “Devil’s Canyon Architecture Map (final)” has the final set up of all the selections that have been made for the resort. “Devil’s Canyon Budget” has the cost estimates for designing the Enterprise Architecture for Devil’s Canyon. It shows all the expenses and the total cost for 1 year and the total cost that has occurred for 3 years. The reader can then exit from the document to the folder and then exit the document folder to return to the homepage where a pop-up will say that the simulation has been completed. End of simulation exercise Copyright 2021 by University of Phoenix. All rights reserved. Copyright 2021 by University of Phoenix. All rights reserved. Running Head: SECURITY 1 SECURITY 2 Enterprise Security Architecture Patrick Carrasquillo University of Phoenix CMGT/582 Dr. Ellen M. Gaston 12/01/2021
  • 14. The goal of a security plan is to improve and maintain the security within the organization by identifying potential threats, creating ways to address them by using guidelines provided or sometimes inventing new ways of addressing these issues, and the formalization of response and reporting procedures (Landoll, 2020). A security plan provides an overview of any organization security as well as assessment methodology, strategies, objectives, programs, and processes. A security policy is a set of guidelines that guide users on how to avoid as well as respond to certain security incidents. This policy ensures that everyone within an organization adhere to certain rules related to information security. Security policy plays a huge role in enhancing information security within an organization. Policy provides a set of guidelines to be used in risk mitigation, by having a set of instructions on what to do in an event of a security incident organizations operations are guaranteed to return to normalcy within the shortest time possible. One of the key elements for any security plan is the set of controls or guidelines used to prevent any security incident (Chilamkurti, 2017). An office normally shows up safer during the day than in the evening on the grounds that only few criminals can commit a crime during the day. Operational security addresses the most widely recognized form of safety and, when appropriately executed, is frequently the best. An experienced and recognized security staff committed to the objectives of the organization is hard to find and on top of that expensive to hire. After identifying security measures using the best methodology, the next thing is to document these guidelines in a security plan book or all-inclusive strategy,
  • 15. which shows exact planning for the controls and measures being proposed. Accepting the requirement for a thoroughly examined security plan book can have the effect in acquiring resources once a security event occurs. Devil’s Canyon Security Related Risks/Threats Phishing Attacks: Phishing attacks involve hackers tricking users to provide their credential through social engineering and other tricks. To avoid this form of attack, organization must use phishing protection software and on top of that train their staff on how to detect these attacks. Remote Administration Tool (RAT) virus: These allow someone to fully control your computer. They can view your desktop, listen through your microphone, see through your webcam, browse your files, copy files in both directions, steal passwords, record everything you type, etc. These are also the easiest viruses to create. Anybody could make one if they knew where to get the installer file. RAT viruses must be installed on your computer to become active. Denial of Service (DOS) attack: This is where hackers overload a website or other device to the point that it can no longer process any more incoming information. After that time, all new incoming connections will time out because the server or device is busy trying to deal with all the packets sent to it in the DOS attack. Data Tampering: There are some Firefox and chrome plugins available that let you look at all the data being sent to a website before it leaves your computer. They also let you change this information. This can be a big threat to Devil’s Canyon Security as hackers can use these plugins to edit content to their advantage. Cookie Spoofing: Someone may be able to steal cookies from your computer, or construct a fake cookie, and install it i nto their own web browser to trick a website into thinking that it is already signed in as you.
  • 16. Risk Probability Risk/Threat Impact Low Medium High Phishing Cookie Spoofing Data Tampering Denial of Service Remote Administration Tool An architecture is only as good as the data that supports it, and the only way to keep that data current is to have the people who own it help keep it current (Kigel, 2019). They won't do that unless they see some real value in doing so, specific things like documenting what specific activities are supported by IT systems so that if something breaks you know exactly who's impacted and can prioritize recovery actions. A good security architecture will assure your stakeholders that
  • 17. you have considered a wide array of specific attacks and mitigated for each one to the extent that the organization is comfortable. Security concerns typically surround the unauthorized release of information or access to something (like a vault or data center), but it can also mean protection of a computing asset from malicious use (a DDOS attack is malicious use). Reference Landoll, D. J. (2020). Information security policies, procedures, and standards: A practitioner's reference. Auerbach Publications. Kigel, E. (2019). Using social Semantic Web data for privacy policies. diplom.de. Chilamkurti, N. (2017). Security, design, and architecture for broadband and wireless network technologies. IGI Global.