SlideShare a Scribd company logo
1 of 14
11/1/19
Semester Proposal
A Proposal on the trouble with American’s Water: Newark as a
case study
Background Information
The city of Newark, New Jersey has had its public have an
outcry over presence of high levels of lead in their tap waters.
The residents have resorted to using bottled water due to the
unclean water being provided by their federal government. This
is a recurring issue in the U.S as earlier the same issue had
occurred in Flint in Michigan. There has been a controversy as
the officials have been denying this issue. Samples of Newark
children under the age of 16 years found that a number of them
had lead in their blood. 22% of the drinking water tested also
has been found to have levels of lead exceeding the federal
standards.
Explanation of the Controversy
This is a dire environmental issue that needs to be investigated
and solutions to be provided as quickly as possible. This is
because it has an adverse effect to the current and future
generations through the children and even the pregnant women.
In children it causes them to be anemic, hearing problems,
slowed and stunted growth, lower IQ and hyperactive and even
behavior and learning problems. It also affects pregnant women
thus causing reduced growth of fetus and even premature births.
In adults it can cause decreased kidney functions,
cardiovascular effects and reproductive problems.
Water is life and clean water is a basic human right that should
be provided for by the government. Lack of clean water leads to
poor sanitation and also invites diseases hence the government
in Newark through its municipality should fast track to ensure
that something has been done about the water being provided to
its residents. The United States environmental protection
agency has set its standards of water that should be provided
hence the need for its adherence. This menace can be dealt with
if there is replacement of the water pipes. The safe drinking
water act provides of less than 0.25% of lead in the water as
minimum standards. The water should also be checked through
treating it and ensuring the lead levels are brought to its
standards. Therefore, the research would be able to come with
recommendations to help deal with this environmental issue
List of References
For this research to be successful I would be able to use a
number of references. These including the EPA website, a
publication on the evaluation of water lead levels during the
Flint water crisis by Kelsey Pieper et al in 2018 in the
environmental science and technology journal and an article on
the trouble with American water by Olga Kazan in the Atlantic
journal published in September 11 2019.
Running head: Devil’s Canyon
1
Devil’s Canyon
5
Security plan and risk evaluation for Devils Canyon
Michael Brown
University of Phoenix CMGT 582
18 November 2019
Robert Quintin
Security plan and risk evaluation for Devils Canyon
Policies are rules that are put in place to ensure that activities
and events are unified, and the outcome of the game does not
harm any party. Security plans are blueprints that are prepared
by the company in advance to help in preventing vulnerabilities,
especially on data that is stored on the network where hackers
can obtain such information and use it for their benefits. Risk
assessment, on the other hand, is the evaluation of risks
associated with the implementation of the project. Evaluation of
the risk may help in identifying risks associated with specific
events in advance before they cause harm. Most people who are
risk-takers are motivated with the associated high output.
Therefore performing risk assessment helps the organization in
identifying alternative solutions to the risks if they occur. This
paper is going to address a security plan and risk assessment
based on the Devils Canyon.
From the discussion, Justin suggested the need for the privacy
policy, which will ensure that the installed software and
hardware are safer and free from hackers and thieves. To start
with, there is a need for a policy restricting counterfeiting of
the software developed by the company which competitors may
use (Rid, & Buchanan, 2015). Baring other users from
duplicating the idea can be done through acquiring copyrights
and designing company rules to capture the guidelines of the
copyrights. There is also the need to come up with the policy to
regulate the use of Wi-Fi because most Wi-Fi networks are
vulnerable to attacks by hackers. There is also a need for the
system on risk assessment and mitigation measures. They are
coming up with a clear policy on identifying different risks
associated with the installation of the software, and the cables.
Having a security plan is essential as it helps the organization
to assess or the risks that can affect the successful
implementation of the project. For the case of Devils Canyon's
case, the associated risks are the storm, which can affect the
underground cables for the Wi-Fi, high cost of mobile app and
software for tracking customers, electricity can also be an issue,
and dropped calls. Having a security plan will help the
organization come up with corrective measures for the above-
explained risks. For the case of electricity, the generator is
available to be used in case of a power blackout. Another
importance of having a security plan is that it helps the
organization to save the cost of maintenance and repairing the
damages caused by risks. By planning helps the organization in
coming up with risk preventive measures instead of waiting for
the chance to happen, then performing corrective actions, which
is costly and time-bound.
Devils Canyon faces the risk of cable destruction by storms and
other heavy moving objects, which might destruct the cables
hence affecting the strength of the Wi-Fi and internet
connection as well. Another risk is dropped calls at the resort,
which might affect customer satisfaction at the resort, and the
management needs to come up with ways of preventing that
from happening. There is also a high cost of preparing and
installing RFID software, which might affect the operation of
the organization because it will increase the operational costs
which usually has an influence on the efficiency at the
workplace. The creation of Wi-Fi at the workplace also
introduces the risk of cybercrime because the Wi-Fi network is
often not protected, and hackers may take advantage and steal
sensitive information from the system, which might damage the
reputation of the resort hence negatively affecting its business
operations (Betz, 2017). Electricity is also another risk because
of power blackout at some moments. Still, the probability of
this risk causing an impact on the operations of the organization
is minimal because there is a generator ready in case of a power
blackout.
The probability of destruction of cables to happen is medium,
but the impact is high. For the risk of dropped calls, the
likelihood is medium, but the effect is low. The probability of
cyber-crime to happen is elevated, with its impact being high as
well. Lastly, the likelihood of power blackout is low because of
the presence of the generator to the effects being high.
Impact of the risk
High
Medium
low
Power blackout
Cable destruction
Cybercrime
High
Medium
low
Dropped calls
Probability of risk occurrence
The table above illustrates the likelihood and impacts of the
discussed risks.
References
Betz, D. J. (2017). Cyberspace and the State: Towards a
Strategy for Cyber-power. Routledge.
Rid, T., & Buchanan, B. (2015). Attributing cyber-
attacks. Journal of Strategic Studies, 38(1-2), 4-37.
Transcript: Devil’s Canyon
CMGT/582 v8
Page 2 of 2
Transcript: Devil’s Canyon – A Role-Playing Simulation on
Designing the Enterprise Architecture for a Mountain Resort by
Patricia Wallace
In this simulation, the learner will understand how to design an
enterprise architecture for a Mountain Resort by using the
interactive map tools and get a sense of their vision and
estimate their expenses.
The simulation will allow the learner to interact with the
decision-makers of the enterprise through the following tools:
Email, Voicemail, Instant message, Architecture Designer, and
Web meeting.
Upon logging in to the application, the learner will have access
to the following tools: Email, Voicemail and the documents.
These are seen on the home screen of the application.Interaction
1:
The learner will be using various means of interaction in the
simulation, which shall be divided into stages as the interaction
proceeds.
Email:
Once the learner clicks on the email icon, he/she will be able to
see three emails, two are replies to the email sent by Ed, one
from Se Jong and the other reply is from Ariane.
The subject of the email from Ed is “Devil’s Canyon ICT”. In
the email Dan says that the maps of the resort are ready for the
development, he wants to be sure that everything is right before
investing on the computers, networks, and software. He plans on
having all the cables underground so that people have wireless
access throughout the resort. He warns about the storms during
which the internet would be down. He says that electricity will
not be an issue, as they have their own generators which would
make a small data center feasible for them.
Ed informs that he has placed the cost estimates made for the
software, data center construction, servers, training,
maintenance and other things in the document folder to work
out a budget. The budget needs to be around $750K for a year,
which should include all the startup costs. He wishes for the
costs to be around $1.2 million for three years.
After reading the mail from Ed, the learner then closes the mail
and goes to read the reply made by Se Jong to Ed’s email.
Se Jong goes on to say that she has added a map of the resort to
the folder and is working on the installation of the Architecture
designer software for the user. She says that since they do not
have a legacy software to fall upon, it would be of advantage to
choose a software that would be suitable for the resort. She
wants a thought on the cloud computing and software as a
service and thinks of using it, as it would mean that there would
be no requirement for the data center. She goes on to say that if
they go in as an infrastructure-as-a-service they would not have
the need to buy bigger hard drives.
After reading the mail from Se Jong, the learner then closes the
mail and goes on to read the reply made by Ariane to Ed’s mail.
Ariane says that she has been thinking about the hardware side.
And asks for opinions regarding the usage of optical scanners at
the base of the lifts to keep the lines moving faster or using the
RFID to track the charges of the customers so that they could
avoid carrying their wallets. She thinks that it is costly to imply
RFID’s but would be helpful to track the customers during bad
weather in the slopes. She goes to mention that Se Jong is pretty
good at developing a mobile app which is costly as well.
After reading the emails, the learner exits from the email folder
and reaches the home page where he/she can find that the
voicemail has been highlighted.
The learner clicks on the voicemail icon.
Voicemail:
There is a voicemail from Ed. In the voicemail Ed says that he
has so much expectations for the resort and wants his customers
to have a top notch experience, he wants his customers to have
easy access to Wi-Fi to use their laptops and tablets, he also
wants smartphones to work well in the resort as there is the
issue of dropped calls which he plans to avoid from happening.
After listening to the voicemail, the learner exits from the
voicemail folder and reaches the homepage where the Instant
Message pane pops up.
Instant Message:
Se Jong has sent a message saying that the Architect Designer
application is up and running.
The learner can then type in a response and press return to read
through the documents that has been attached in the documents
folder
Documents:
On opening the documents folder, the learner can find two
documents titled “Map of the Resort” and “Estimated Costs of
Architecture Components”.
On clicking the document titled “Map of the Resort” the learner
can find a map of the resort.
After going through the map of the resort the learner closes the
document and selects the document named “Estimated Costs of
Architecture Components”.
On opening the document, the estimated costs for the
Architecture Components for Devil’s Canyon are given. The
document has the components divided into phases. Phase I:
Software Choices, which has two parts: Enterprise Systems and
Individual Productivity Software; Phase II: Hardware Choices;
Phase III: Network and Telecom Choices which has four parts:
Cabling, Wi-Fi and Cellular Access and Main Internet
Connection; Phase IV: Special Purpose Systems Choices.
After going through the documents in the folder, the user can
exit and reach the home page where the learner can find that the
Architecture Designer icon is highlighted.
Architecture Designer:
The learner on selecting the Architecture Designer icon can see
the map of the resort. There are three panes. One pane has the
map of the resort, the second pane has the Enterprise
Architecture Design Panel Running Expenses where the amount
gets filled in once the learner selects the options in Phase I:
Software Choices for the Enterprise Systems and the Individual
Productivity Software. The learner must keep in mind the
expenditure that is to be made.
The learner can click on the submit button if he/she is satisfied
with the response or reset the form and select the option that
he/she thinks is suitable and then submit the form.
The learner can then exit the Architecture Designer and return
to the homepage where the learner can find the Email and the
Voicemail icons to be highlighted.Interaction 2:
Email:
The reader can find two emails in the email folder, one is from
Ed and the other mail is from Se Jong replying to Ed’s email
which has the subject “Phase I – Software Selections”.
Both the emails put forth the opinions and concerns of Se Jong
and Ed on the choices that have been made for the Phase I of
Software Choices for the Enterprise Systems and Individual
Productivity Software.
The user can then exit the email folder and reach the homepage
to see the Voicemail folder to be highlighted.
Voicemail:
On selecting the voicemail icon, the learner can find three new
voicemails from Ariane, Justin and Ed. The reader can then
listen to the individual voicemails where all the three of them
provide their view on the choices that has been made.
The reader then can exit the voicemail and reach the homepage
where Se Jong has sent a message on the Instant message saying
that she has loaded the data for Phase II on the hardware
architecture in the Architecture Designer. The homepage now
has the highlight on the Architecture Designer.
Architecture Designer:
Upon selecting the application, the learner can see the map of
the resort, with the selections that have been made in Phase I.
There are three panes as before, but at this point the user has to
make the decision by selecting the Hardware Choices of Phase
2, the learner can then submit after making the selection or reset
and then select the option that he/she thinks is right. The learner
must keep in mind the budget that has been allotted by Ed in the
beginning. The learner can notice that there is the option of
“Exit without Submitting”, keep in mind that the activity will
not proceed until the choice is made.
Exiting the Architecture Designer, the learner can see that the
voicemail and the email icons have been highlighted.
Voicemail:
Opening the voicemail first, the learner can find two new
voicemails from Justin and Ariane. Both of them provide their
feedback and concerns on the choices that have been made for
the Hardware.
Exiting the voicemail, the learner can now find the Email icon
in the homepage to be highlighted.Interaction 3:
Email:
Selecting the email folder, the learner can find 2 emails. One is
from Ed and the other is from Se Jong.
The mail from Ed has the subject “Phase 2- Hardware
Selections”, where he puts forth his views on the selections that
have been made and the concerns that he has regarding the
choices.
The mail from Se Jong has the subject “Smartphones”, where
she shares her concern of operating systems for smartphones
and source codes.
The learner can then exit from the email folder and return to the
homepage to find the Architecture Designer to be highlighted.
Architecture Designer:
On selecting the Architecture Designer, the learner is put forth
with the map of the resort now containing the choices made for
both Phase I and Phase II. The learner now has to make the
decision regarding the Network and Telecom Choices for
Cabling, Wi-Fi and Cellular Access, Voice calls, Main Internet
Connection of Phase III. The learner should keep in mind the
budget allotted and that he/she can submit the selection made or
reset and make the correct choice. Keep in mind that the learner
cannot proceed further without making the selection for the
Phase III.
The learner can now exit from the Architecture Designer and go
to the homepage where he/she can see that the Instant Message
has popped up and has a message from Ed instructing to try out
the Web software where the team would be meeting up to
discuss what has been done so far.
Web Meeting:
On selecting the Web Meeting icon, the learner can see the
Screen Area with the map of the Resort. All the members are
present in the meeting, Ed is on the video call while the team
members Ariane, Se Jong, Justin and the learner talk to each
other using the chat box. There is a pane with notes that
explains the various concepts on technical words. The meeting
has the members discussing the Wi-Fi, Cell Towers, Landline
Voice calls and the Bandwidth choices. The meeting ends with
the members moving forward to make choices for Phase IV.
Note that the learner cannot proceed further without completing
the web meeting.
After exiting the Web Meeting, the user reaches the homepage
to find the Instant Message with messages from Ed.
Instant Message:
The Instant message has Ed saying that the budget needs to be
put forth and he needs recommendations for the Special purpose
systems. He also goes to put a reminder of the budget being
$750,000 for the first year and $1.2 million for total 3 years
cost.
2 The user can see that the Documents folder has been
highlighted in the homepage.
Documents:
On selecting the documents folder, the learner can find a new
document titled “Devil’s Canyon Architecture Map (draft)”.
Opening the document, the learner can see the draft model of
the Resort with the selections that have been made so far for the
resort.
The learner can close the document and exit from the document
folder.
Upon exiting the document folder and reaching the homepage,
the learner can find the Architecture Design to be highlighted.
The learner then selects the Application.
Architecture Designer:
On opening, the learner can see the map of the Resort with all
the selected options from Phase I, II, and III. The learner has
now to make the decision regarding the Special Purpose
Systems Choices of Phase IV. On selecting the options, the
learner can submit and then exit or reset the form and modify
the choices and submit.
The learner on returning to the homepage can find the email
icon to be highlighted.Interaction 4:
Email:
The learner can find four new emails, two from Ed; one from Se
Jong and the last one from Justin. The emails have different
issues and concerns being discussed like the need for security,
smart lift ticket systems with optical scanners, the budget and
the web cam systems on the slopes.
The learner can exit from the email folder and reach the
homepage to find the Documents folder to be highlighted.
Documents:
On opening the documents folder, the learner can find the two
new documents that have been added to the folder. One is titled
“Devil’s Canyon Architecture Map (final) and the other being
“Devil’s Canyon Budget”.
“Devil’s Canyon Architecture Map (final)” has the final set up
of all the selections that have been made for the resort.
“Devil’s Canyon Budget” has the cost estimates for designing
the Enterprise Architecture for Devil’s Canyon. It shows all the
expenses and the total cost for 1 year and the total cost that has
occurred for 3 years.
The reader can then exit from the document to the folder and
then exit the document folder to return to the homepage where a
pop-up will say that the simulation has been completed.
End of simulation exercise
Copyright © 2018 by Pearson. Used with permission. All rights
reserved.
Copyright© 2019 by Pearson. Used with permission. All rights
reserved.

More Related Content

Similar to 11119Semester ProposalA Proposal on the trouble with Ameri.docx

CTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptxCTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptxSophia Price
 
CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022SophiaPalmira1
 
discuss how the types of threats discussed in the article.docx
discuss how the types of threats discussed in the article.docxdiscuss how the types of threats discussed in the article.docx
discuss how the types of threats discussed in the article.docxbkbk37
 
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docxRunning Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docxhealdkathaleen
 
Smart grid networks and security architecture: Threat analysis, threat scenar...
Smart grid networks and security architecture: Threat analysis, threat scenar...Smart grid networks and security architecture: Threat analysis, threat scenar...
Smart grid networks and security architecture: Threat analysis, threat scenar...John-André Bjørkhaug
 
Essay On Water Conservation.pdf
Essay On Water Conservation.pdfEssay On Water Conservation.pdf
Essay On Water Conservation.pdfJill Johnson
 
Unconventional Risks Presented by Synergy Assoc
Unconventional Risks Presented by Synergy AssocUnconventional Risks Presented by Synergy Assoc
Unconventional Risks Presented by Synergy AssocSujit Ghosh
 
4182020 Originality Reporthttpsucumberlands.blackboar.docx
4182020 Originality Reporthttpsucumberlands.blackboar.docx4182020 Originality Reporthttpsucumberlands.blackboar.docx
4182020 Originality Reporthttpsucumberlands.blackboar.docxblondellchancy
 
Review Paper ( Research Articles )
Review Paper ( Research Articles )Review Paper ( Research Articles )
Review Paper ( Research Articles )SaadSaif6
 
Successful Harvard Application Essays Pdf
Successful Harvard Application Essays PdfSuccessful Harvard Application Essays Pdf
Successful Harvard Application Essays PdfLisa Taylor
 
Are Water Utilities Inheriting Risk from Local Consultants?
Are Water Utilities Inheriting Risk from Local Consultants?Are Water Utilities Inheriting Risk from Local Consultants?
Are Water Utilities Inheriting Risk from Local Consultants?Safe-T-Cover
 
2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docxlorainedeserre
 
2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docxBHANU281672
 
IRJET- Air Quality Forecast Monitoring and it’s Impact on Brain Health based ...
IRJET- Air Quality Forecast Monitoring and it’s Impact on Brain Health based ...IRJET- Air Quality Forecast Monitoring and it’s Impact on Brain Health based ...
IRJET- Air Quality Forecast Monitoring and it’s Impact on Brain Health based ...IRJET Journal
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxbagotjesusa
 
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared EnoughScared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared EnoughXeneta
 
System shock analysis and complex network effects
System shock analysis and complex network effectsSystem shock analysis and complex network effects
System shock analysis and complex network effectsKimmo Soramaki
 
© 2017 Journal of the Practice of Cardiovascular Sciences Pu.docx
© 2017 Journal of the Practice of Cardiovascular Sciences  Pu.docx© 2017 Journal of the Practice of Cardiovascular Sciences  Pu.docx
© 2017 Journal of the Practice of Cardiovascular Sciences Pu.docxgerardkortney
 

Similar to 11119Semester ProposalA Proposal on the trouble with Ameri.docx (20)

CTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptxCTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptx
 
CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022
 
discuss how the types of threats discussed in the article.docx
discuss how the types of threats discussed in the article.docxdiscuss how the types of threats discussed in the article.docx
discuss how the types of threats discussed in the article.docx
 
green cloud computing
green cloud computinggreen cloud computing
green cloud computing
 
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docxRunning Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
 
Smart grid networks and security architecture: Threat analysis, threat scenar...
Smart grid networks and security architecture: Threat analysis, threat scenar...Smart grid networks and security architecture: Threat analysis, threat scenar...
Smart grid networks and security architecture: Threat analysis, threat scenar...
 
Essay On Water Conservation.pdf
Essay On Water Conservation.pdfEssay On Water Conservation.pdf
Essay On Water Conservation.pdf
 
Unconventional Risks Presented by Synergy Assoc
Unconventional Risks Presented by Synergy AssocUnconventional Risks Presented by Synergy Assoc
Unconventional Risks Presented by Synergy Assoc
 
Essay On It Security
Essay On It SecurityEssay On It Security
Essay On It Security
 
4182020 Originality Reporthttpsucumberlands.blackboar.docx
4182020 Originality Reporthttpsucumberlands.blackboar.docx4182020 Originality Reporthttpsucumberlands.blackboar.docx
4182020 Originality Reporthttpsucumberlands.blackboar.docx
 
Review Paper ( Research Articles )
Review Paper ( Research Articles )Review Paper ( Research Articles )
Review Paper ( Research Articles )
 
Successful Harvard Application Essays Pdf
Successful Harvard Application Essays PdfSuccessful Harvard Application Essays Pdf
Successful Harvard Application Essays Pdf
 
Are Water Utilities Inheriting Risk from Local Consultants?
Are Water Utilities Inheriting Risk from Local Consultants?Are Water Utilities Inheriting Risk from Local Consultants?
Are Water Utilities Inheriting Risk from Local Consultants?
 
2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx
 
2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx2232020 Originality Reporthttpsucumberlands.blackboar.docx
2232020 Originality Reporthttpsucumberlands.blackboar.docx
 
IRJET- Air Quality Forecast Monitoring and it’s Impact on Brain Health based ...
IRJET- Air Quality Forecast Monitoring and it’s Impact on Brain Health based ...IRJET- Air Quality Forecast Monitoring and it’s Impact on Brain Health based ...
IRJET- Air Quality Forecast Monitoring and it’s Impact on Brain Health based ...
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
 
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared EnoughScared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
Scared About Supply Chain Cybersecurity? 5 Reasons You Aren't Scared Enough
 
System shock analysis and complex network effects
System shock analysis and complex network effectsSystem shock analysis and complex network effects
System shock analysis and complex network effects
 
© 2017 Journal of the Practice of Cardiovascular Sciences Pu.docx
© 2017 Journal of the Practice of Cardiovascular Sciences  Pu.docx© 2017 Journal of the Practice of Cardiovascular Sciences  Pu.docx
© 2017 Journal of the Practice of Cardiovascular Sciences Pu.docx
 

More from aulasnilda

1. Analyze the case and determine the factors that have made KFC a s.docx
1. Analyze the case and determine the factors that have made KFC a s.docx1. Analyze the case and determine the factors that have made KFC a s.docx
1. Analyze the case and determine the factors that have made KFC a s.docxaulasnilda
 
1. A.Discuss how the concept of health has changed over time. B.Di.docx
1. A.Discuss how the concept of health has changed over time. B.Di.docx1. A.Discuss how the concept of health has changed over time. B.Di.docx
1. A.Discuss how the concept of health has changed over time. B.Di.docxaulasnilda
 
1. Abstract2. Introduction to Bitcoin and Ethereum3..docx
1. Abstract2. Introduction to Bitcoin and Ethereum3..docx1. Abstract2. Introduction to Bitcoin and Ethereum3..docx
1. Abstract2. Introduction to Bitcoin and Ethereum3..docxaulasnilda
 
1. A. Compare vulnerable populations. B. Describe an example of one .docx
1. A. Compare vulnerable populations. B. Describe an example of one .docx1. A. Compare vulnerable populations. B. Describe an example of one .docx
1. A. Compare vulnerable populations. B. Describe an example of one .docxaulasnilda
 
1. A highly capable brick and mortar electronics retailer with a l.docx
1. A highly capable brick and mortar electronics retailer with a l.docx1. A highly capable brick and mortar electronics retailer with a l.docx
1. A highly capable brick and mortar electronics retailer with a l.docxaulasnilda
 
1. A. Research the delivery, finance, management, and sustainabili.docx
1. A. Research the delivery, finance, management, and sustainabili.docx1. A. Research the delivery, finance, management, and sustainabili.docx
1. A. Research the delivery, finance, management, and sustainabili.docxaulasnilda
 
1. All of the following artists except for ONE used nudity as part.docx
1. All of the following artists except for ONE used nudity as part.docx1. All of the following artists except for ONE used nudity as part.docx
1. All of the following artists except for ONE used nudity as part.docxaulasnilda
 
1. According to the article, what is myth and how does it functi.docx
1. According to the article, what is myth and how does it functi.docx1. According to the article, what is myth and how does it functi.docx
1. According to the article, what is myth and how does it functi.docxaulasnilda
 
1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx
1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx
1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docxaulasnilda
 
1. A.Compare independent variables, B.dependent variables, and C.ext.docx
1. A.Compare independent variables, B.dependent variables, and C.ext.docx1. A.Compare independent variables, B.dependent variables, and C.ext.docx
1. A.Compare independent variables, B.dependent variables, and C.ext.docxaulasnilda
 
1. According to the Court, why is death a proportionate penalty for .docx
1. According to the Court, why is death a proportionate penalty for .docx1. According to the Court, why is death a proportionate penalty for .docx
1. According to the Court, why is death a proportionate penalty for .docxaulasnilda
 
1- Prisonization  What if  . . . you were sentenced to prison .docx
1- Prisonization  What if  . . . you were sentenced to prison .docx1- Prisonization  What if  . . . you were sentenced to prison .docx
1- Prisonization  What if  . . . you were sentenced to prison .docxaulasnilda
 
1. 250+ word count What is cultural and linguistic competence H.docx
1. 250+ word count What is cultural and linguistic competence H.docx1. 250+ word count What is cultural and linguistic competence H.docx
1. 250+ word count What is cultural and linguistic competence H.docxaulasnilda
 
1. 200 words How valuable is a having a LinkedIn profile Provid.docx
1. 200 words How valuable is a having a LinkedIn profile Provid.docx1. 200 words How valuable is a having a LinkedIn profile Provid.docx
1. 200 words How valuable is a having a LinkedIn profile Provid.docxaulasnilda
 
1. According to recent surveys, China, India, and the Philippines ar.docx
1. According to recent surveys, China, India, and the Philippines ar.docx1. According to recent surveys, China, India, and the Philippines ar.docx
1. According to recent surveys, China, India, and the Philippines ar.docxaulasnilda
 
1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx
1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx
1. Addressing inflation using Fiscal and Monetary Policy tools.S.docxaulasnilda
 
1. A vulnerability refers to a known weakness of an asset (resou.docx
1. A vulnerability refers to a known weakness of an asset (resou.docx1. A vulnerability refers to a known weakness of an asset (resou.docx
1. A vulnerability refers to a known weakness of an asset (resou.docxaulasnilda
 
1. According to the readings, philosophy began in ancient Egypt an.docx
1. According to the readings, philosophy began in ancient Egypt an.docx1. According to the readings, philosophy began in ancient Egypt an.docx
1. According to the readings, philosophy began in ancient Egypt an.docxaulasnilda
 
1-Explain what you understood from the paper with (one paragraph).docx
1-Explain what you understood from the paper with (one paragraph).docx1-Explain what you understood from the paper with (one paragraph).docx
1-Explain what you understood from the paper with (one paragraph).docxaulasnilda
 
1-Explanation of how healthcare policy can impact the advanced p.docx
1-Explanation of how healthcare policy can impact the advanced p.docx1-Explanation of how healthcare policy can impact the advanced p.docx
1-Explanation of how healthcare policy can impact the advanced p.docxaulasnilda
 

More from aulasnilda (20)

1. Analyze the case and determine the factors that have made KFC a s.docx
1. Analyze the case and determine the factors that have made KFC a s.docx1. Analyze the case and determine the factors that have made KFC a s.docx
1. Analyze the case and determine the factors that have made KFC a s.docx
 
1. A.Discuss how the concept of health has changed over time. B.Di.docx
1. A.Discuss how the concept of health has changed over time. B.Di.docx1. A.Discuss how the concept of health has changed over time. B.Di.docx
1. A.Discuss how the concept of health has changed over time. B.Di.docx
 
1. Abstract2. Introduction to Bitcoin and Ethereum3..docx
1. Abstract2. Introduction to Bitcoin and Ethereum3..docx1. Abstract2. Introduction to Bitcoin and Ethereum3..docx
1. Abstract2. Introduction to Bitcoin and Ethereum3..docx
 
1. A. Compare vulnerable populations. B. Describe an example of one .docx
1. A. Compare vulnerable populations. B. Describe an example of one .docx1. A. Compare vulnerable populations. B. Describe an example of one .docx
1. A. Compare vulnerable populations. B. Describe an example of one .docx
 
1. A highly capable brick and mortar electronics retailer with a l.docx
1. A highly capable brick and mortar electronics retailer with a l.docx1. A highly capable brick and mortar electronics retailer with a l.docx
1. A highly capable brick and mortar electronics retailer with a l.docx
 
1. A. Research the delivery, finance, management, and sustainabili.docx
1. A. Research the delivery, finance, management, and sustainabili.docx1. A. Research the delivery, finance, management, and sustainabili.docx
1. A. Research the delivery, finance, management, and sustainabili.docx
 
1. All of the following artists except for ONE used nudity as part.docx
1. All of the following artists except for ONE used nudity as part.docx1. All of the following artists except for ONE used nudity as part.docx
1. All of the following artists except for ONE used nudity as part.docx
 
1. According to the article, what is myth and how does it functi.docx
1. According to the article, what is myth and how does it functi.docx1. According to the article, what is myth and how does it functi.docx
1. According to the article, what is myth and how does it functi.docx
 
1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx
1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx
1. 6 Paragraph OverviewReflection on Reading Assigbnment Due Before.docx
 
1. A.Compare independent variables, B.dependent variables, and C.ext.docx
1. A.Compare independent variables, B.dependent variables, and C.ext.docx1. A.Compare independent variables, B.dependent variables, and C.ext.docx
1. A.Compare independent variables, B.dependent variables, and C.ext.docx
 
1. According to the Court, why is death a proportionate penalty for .docx
1. According to the Court, why is death a proportionate penalty for .docx1. According to the Court, why is death a proportionate penalty for .docx
1. According to the Court, why is death a proportionate penalty for .docx
 
1- Prisonization  What if  . . . you were sentenced to prison .docx
1- Prisonization  What if  . . . you were sentenced to prison .docx1- Prisonization  What if  . . . you were sentenced to prison .docx
1- Prisonization  What if  . . . you were sentenced to prison .docx
 
1. 250+ word count What is cultural and linguistic competence H.docx
1. 250+ word count What is cultural and linguistic competence H.docx1. 250+ word count What is cultural and linguistic competence H.docx
1. 250+ word count What is cultural and linguistic competence H.docx
 
1. 200 words How valuable is a having a LinkedIn profile Provid.docx
1. 200 words How valuable is a having a LinkedIn profile Provid.docx1. 200 words How valuable is a having a LinkedIn profile Provid.docx
1. 200 words How valuable is a having a LinkedIn profile Provid.docx
 
1. According to recent surveys, China, India, and the Philippines ar.docx
1. According to recent surveys, China, India, and the Philippines ar.docx1. According to recent surveys, China, India, and the Philippines ar.docx
1. According to recent surveys, China, India, and the Philippines ar.docx
 
1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx
1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx
1. Addressing inflation using Fiscal and Monetary Policy tools.S.docx
 
1. A vulnerability refers to a known weakness of an asset (resou.docx
1. A vulnerability refers to a known weakness of an asset (resou.docx1. A vulnerability refers to a known weakness of an asset (resou.docx
1. A vulnerability refers to a known weakness of an asset (resou.docx
 
1. According to the readings, philosophy began in ancient Egypt an.docx
1. According to the readings, philosophy began in ancient Egypt an.docx1. According to the readings, philosophy began in ancient Egypt an.docx
1. According to the readings, philosophy began in ancient Egypt an.docx
 
1-Explain what you understood from the paper with (one paragraph).docx
1-Explain what you understood from the paper with (one paragraph).docx1-Explain what you understood from the paper with (one paragraph).docx
1-Explain what you understood from the paper with (one paragraph).docx
 
1-Explanation of how healthcare policy can impact the advanced p.docx
1-Explanation of how healthcare policy can impact the advanced p.docx1-Explanation of how healthcare policy can impact the advanced p.docx
1-Explanation of how healthcare policy can impact the advanced p.docx
 

Recently uploaded

Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

11119Semester ProposalA Proposal on the trouble with Ameri.docx

  • 1. 11/1/19 Semester Proposal A Proposal on the trouble with American’s Water: Newark as a case study Background Information The city of Newark, New Jersey has had its public have an outcry over presence of high levels of lead in their tap waters. The residents have resorted to using bottled water due to the unclean water being provided by their federal government. This is a recurring issue in the U.S as earlier the same issue had occurred in Flint in Michigan. There has been a controversy as the officials have been denying this issue. Samples of Newark children under the age of 16 years found that a number of them had lead in their blood. 22% of the drinking water tested also has been found to have levels of lead exceeding the federal standards. Explanation of the Controversy This is a dire environmental issue that needs to be investigated and solutions to be provided as quickly as possible. This is because it has an adverse effect to the current and future generations through the children and even the pregnant women. In children it causes them to be anemic, hearing problems, slowed and stunted growth, lower IQ and hyperactive and even behavior and learning problems. It also affects pregnant women thus causing reduced growth of fetus and even premature births. In adults it can cause decreased kidney functions, cardiovascular effects and reproductive problems. Water is life and clean water is a basic human right that should be provided for by the government. Lack of clean water leads to poor sanitation and also invites diseases hence the government in Newark through its municipality should fast track to ensure that something has been done about the water being provided to its residents. The United States environmental protection
  • 2. agency has set its standards of water that should be provided hence the need for its adherence. This menace can be dealt with if there is replacement of the water pipes. The safe drinking water act provides of less than 0.25% of lead in the water as minimum standards. The water should also be checked through treating it and ensuring the lead levels are brought to its standards. Therefore, the research would be able to come with recommendations to help deal with this environmental issue List of References For this research to be successful I would be able to use a number of references. These including the EPA website, a publication on the evaluation of water lead levels during the Flint water crisis by Kelsey Pieper et al in 2018 in the environmental science and technology journal and an article on the trouble with American water by Olga Kazan in the Atlantic journal published in September 11 2019. Running head: Devil’s Canyon 1 Devil’s Canyon 5 Security plan and risk evaluation for Devils Canyon Michael Brown University of Phoenix CMGT 582 18 November 2019 Robert Quintin
  • 3. Security plan and risk evaluation for Devils Canyon Policies are rules that are put in place to ensure that activities and events are unified, and the outcome of the game does not harm any party. Security plans are blueprints that are prepared by the company in advance to help in preventing vulnerabilities, especially on data that is stored on the network where hackers can obtain such information and use it for their benefits. Risk assessment, on the other hand, is the evaluation of risks associated with the implementation of the project. Evaluation of the risk may help in identifying risks associated with specific events in advance before they cause harm. Most people who are risk-takers are motivated with the associated high output. Therefore performing risk assessment helps the organization in identifying alternative solutions to the risks if they occur. This paper is going to address a security plan and risk assessment based on the Devils Canyon. From the discussion, Justin suggested the need for the privacy policy, which will ensure that the installed software and hardware are safer and free from hackers and thieves. To start with, there is a need for a policy restricting counterfeiting of the software developed by the company which competitors may use (Rid, & Buchanan, 2015). Baring other users from duplicating the idea can be done through acquiring copyrights and designing company rules to capture the guidelines of the copyrights. There is also the need to come up with the policy to regulate the use of Wi-Fi because most Wi-Fi networks are vulnerable to attacks by hackers. There is also a need for the system on risk assessment and mitigation measures. They are
  • 4. coming up with a clear policy on identifying different risks associated with the installation of the software, and the cables. Having a security plan is essential as it helps the organization to assess or the risks that can affect the successful implementation of the project. For the case of Devils Canyon's case, the associated risks are the storm, which can affect the underground cables for the Wi-Fi, high cost of mobile app and software for tracking customers, electricity can also be an issue, and dropped calls. Having a security plan will help the organization come up with corrective measures for the above- explained risks. For the case of electricity, the generator is available to be used in case of a power blackout. Another importance of having a security plan is that it helps the organization to save the cost of maintenance and repairing the damages caused by risks. By planning helps the organization in coming up with risk preventive measures instead of waiting for the chance to happen, then performing corrective actions, which is costly and time-bound. Devils Canyon faces the risk of cable destruction by storms and other heavy moving objects, which might destruct the cables hence affecting the strength of the Wi-Fi and internet connection as well. Another risk is dropped calls at the resort, which might affect customer satisfaction at the resort, and the management needs to come up with ways of preventing that from happening. There is also a high cost of preparing and installing RFID software, which might affect the operation of the organization because it will increase the operational costs which usually has an influence on the efficiency at the workplace. The creation of Wi-Fi at the workplace also introduces the risk of cybercrime because the Wi-Fi network is often not protected, and hackers may take advantage and steal sensitive information from the system, which might damage the reputation of the resort hence negatively affecting its business operations (Betz, 2017). Electricity is also another risk because of power blackout at some moments. Still, the probability of this risk causing an impact on the operations of the organization
  • 5. is minimal because there is a generator ready in case of a power blackout. The probability of destruction of cables to happen is medium, but the impact is high. For the risk of dropped calls, the likelihood is medium, but the effect is low. The probability of cyber-crime to happen is elevated, with its impact being high as well. Lastly, the likelihood of power blackout is low because of the presence of the generator to the effects being high. Impact of the risk High Medium low Power blackout Cable destruction Cybercrime High Medium low Dropped calls Probability of risk occurrence The table above illustrates the likelihood and impacts of the
  • 6. discussed risks. References Betz, D. J. (2017). Cyberspace and the State: Towards a Strategy for Cyber-power. Routledge. Rid, T., & Buchanan, B. (2015). Attributing cyber- attacks. Journal of Strategic Studies, 38(1-2), 4-37. Transcript: Devil’s Canyon CMGT/582 v8 Page 2 of 2 Transcript: Devil’s Canyon – A Role-Playing Simulation on Designing the Enterprise Architecture for a Mountain Resort by
  • 7. Patricia Wallace In this simulation, the learner will understand how to design an enterprise architecture for a Mountain Resort by using the interactive map tools and get a sense of their vision and estimate their expenses. The simulation will allow the learner to interact with the decision-makers of the enterprise through the following tools: Email, Voicemail, Instant message, Architecture Designer, and Web meeting. Upon logging in to the application, the learner will have access to the following tools: Email, Voicemail and the documents. These are seen on the home screen of the application.Interaction 1: The learner will be using various means of interaction in the simulation, which shall be divided into stages as the interaction proceeds. Email: Once the learner clicks on the email icon, he/she will be able to see three emails, two are replies to the email sent by Ed, one from Se Jong and the other reply is from Ariane. The subject of the email from Ed is “Devil’s Canyon ICT”. In the email Dan says that the maps of the resort are ready for the development, he wants to be sure that everything is right before investing on the computers, networks, and software. He plans on having all the cables underground so that people have wireless access throughout the resort. He warns about the storms during which the internet would be down. He says that electricity will not be an issue, as they have their own generators which would make a small data center feasible for them. Ed informs that he has placed the cost estimates made for the software, data center construction, servers, training, maintenance and other things in the document folder to work out a budget. The budget needs to be around $750K for a year, which should include all the startup costs. He wishes for the costs to be around $1.2 million for three years.
  • 8. After reading the mail from Ed, the learner then closes the mail and goes to read the reply made by Se Jong to Ed’s email. Se Jong goes on to say that she has added a map of the resort to the folder and is working on the installation of the Architecture designer software for the user. She says that since they do not have a legacy software to fall upon, it would be of advantage to choose a software that would be suitable for the resort. She wants a thought on the cloud computing and software as a service and thinks of using it, as it would mean that there would be no requirement for the data center. She goes on to say that if they go in as an infrastructure-as-a-service they would not have the need to buy bigger hard drives. After reading the mail from Se Jong, the learner then closes the mail and goes on to read the reply made by Ariane to Ed’s mail. Ariane says that she has been thinking about the hardware side. And asks for opinions regarding the usage of optical scanners at the base of the lifts to keep the lines moving faster or using the RFID to track the charges of the customers so that they could avoid carrying their wallets. She thinks that it is costly to imply RFID’s but would be helpful to track the customers during bad weather in the slopes. She goes to mention that Se Jong is pretty good at developing a mobile app which is costly as well. After reading the emails, the learner exits from the email folder and reaches the home page where he/she can find that the voicemail has been highlighted. The learner clicks on the voicemail icon. Voicemail: There is a voicemail from Ed. In the voicemail Ed says that he has so much expectations for the resort and wants his customers to have a top notch experience, he wants his customers to have easy access to Wi-Fi to use their laptops and tablets, he also wants smartphones to work well in the resort as there is the issue of dropped calls which he plans to avoid from happening. After listening to the voicemail, the learner exits from the voicemail folder and reaches the homepage where the Instant
  • 9. Message pane pops up. Instant Message: Se Jong has sent a message saying that the Architect Designer application is up and running. The learner can then type in a response and press return to read through the documents that has been attached in the documents folder Documents: On opening the documents folder, the learner can find two documents titled “Map of the Resort” and “Estimated Costs of Architecture Components”. On clicking the document titled “Map of the Resort” the learner can find a map of the resort. After going through the map of the resort the learner closes the document and selects the document named “Estimated Costs of Architecture Components”. On opening the document, the estimated costs for the Architecture Components for Devil’s Canyon are given. The document has the components divided into phases. Phase I: Software Choices, which has two parts: Enterprise Systems and Individual Productivity Software; Phase II: Hardware Choices; Phase III: Network and Telecom Choices which has four parts: Cabling, Wi-Fi and Cellular Access and Main Internet Connection; Phase IV: Special Purpose Systems Choices. After going through the documents in the folder, the user can exit and reach the home page where the learner can find that the Architecture Designer icon is highlighted. Architecture Designer: The learner on selecting the Architecture Designer icon can see the map of the resort. There are three panes. One pane has the map of the resort, the second pane has the Enterprise Architecture Design Panel Running Expenses where the amount gets filled in once the learner selects the options in Phase I:
  • 10. Software Choices for the Enterprise Systems and the Individual Productivity Software. The learner must keep in mind the expenditure that is to be made. The learner can click on the submit button if he/she is satisfied with the response or reset the form and select the option that he/she thinks is suitable and then submit the form. The learner can then exit the Architecture Designer and return to the homepage where the learner can find the Email and the Voicemail icons to be highlighted.Interaction 2: Email: The reader can find two emails in the email folder, one is from Ed and the other mail is from Se Jong replying to Ed’s email which has the subject “Phase I – Software Selections”. Both the emails put forth the opinions and concerns of Se Jong and Ed on the choices that have been made for the Phase I of Software Choices for the Enterprise Systems and Individual Productivity Software. The user can then exit the email folder and reach the homepage to see the Voicemail folder to be highlighted. Voicemail: On selecting the voicemail icon, the learner can find three new voicemails from Ariane, Justin and Ed. The reader can then listen to the individual voicemails where all the three of them provide their view on the choices that has been made. The reader then can exit the voicemail and reach the homepage where Se Jong has sent a message on the Instant message saying that she has loaded the data for Phase II on the hardware architecture in the Architecture Designer. The homepage now has the highlight on the Architecture Designer. Architecture Designer: Upon selecting the application, the learner can see the map of the resort, with the selections that have been made in Phase I. There are three panes as before, but at this point the user has to
  • 11. make the decision by selecting the Hardware Choices of Phase 2, the learner can then submit after making the selection or reset and then select the option that he/she thinks is right. The learner must keep in mind the budget that has been allotted by Ed in the beginning. The learner can notice that there is the option of “Exit without Submitting”, keep in mind that the activity will not proceed until the choice is made. Exiting the Architecture Designer, the learner can see that the voicemail and the email icons have been highlighted. Voicemail: Opening the voicemail first, the learner can find two new voicemails from Justin and Ariane. Both of them provide their feedback and concerns on the choices that have been made for the Hardware. Exiting the voicemail, the learner can now find the Email icon in the homepage to be highlighted.Interaction 3: Email: Selecting the email folder, the learner can find 2 emails. One is from Ed and the other is from Se Jong. The mail from Ed has the subject “Phase 2- Hardware Selections”, where he puts forth his views on the selections that have been made and the concerns that he has regarding the choices. The mail from Se Jong has the subject “Smartphones”, where she shares her concern of operating systems for smartphones and source codes. The learner can then exit from the email folder and return to the homepage to find the Architecture Designer to be highlighted. Architecture Designer: On selecting the Architecture Designer, the learner is put forth with the map of the resort now containing the choices made for both Phase I and Phase II. The learner now has to make the decision regarding the Network and Telecom Choices for
  • 12. Cabling, Wi-Fi and Cellular Access, Voice calls, Main Internet Connection of Phase III. The learner should keep in mind the budget allotted and that he/she can submit the selection made or reset and make the correct choice. Keep in mind that the learner cannot proceed further without making the selection for the Phase III. The learner can now exit from the Architecture Designer and go to the homepage where he/she can see that the Instant Message has popped up and has a message from Ed instructing to try out the Web software where the team would be meeting up to discuss what has been done so far. Web Meeting: On selecting the Web Meeting icon, the learner can see the Screen Area with the map of the Resort. All the members are present in the meeting, Ed is on the video call while the team members Ariane, Se Jong, Justin and the learner talk to each other using the chat box. There is a pane with notes that explains the various concepts on technical words. The meeting has the members discussing the Wi-Fi, Cell Towers, Landline Voice calls and the Bandwidth choices. The meeting ends with the members moving forward to make choices for Phase IV. Note that the learner cannot proceed further without completing the web meeting. After exiting the Web Meeting, the user reaches the homepage to find the Instant Message with messages from Ed. Instant Message: The Instant message has Ed saying that the budget needs to be put forth and he needs recommendations for the Special purpose systems. He also goes to put a reminder of the budget being $750,000 for the first year and $1.2 million for total 3 years cost. 2 The user can see that the Documents folder has been highlighted in the homepage.
  • 13. Documents: On selecting the documents folder, the learner can find a new document titled “Devil’s Canyon Architecture Map (draft)”. Opening the document, the learner can see the draft model of the Resort with the selections that have been made so far for the resort. The learner can close the document and exit from the document folder. Upon exiting the document folder and reaching the homepage, the learner can find the Architecture Design to be highlighted. The learner then selects the Application. Architecture Designer: On opening, the learner can see the map of the Resort with all the selected options from Phase I, II, and III. The learner has now to make the decision regarding the Special Purpose Systems Choices of Phase IV. On selecting the options, the learner can submit and then exit or reset the form and modify the choices and submit. The learner on returning to the homepage can find the email icon to be highlighted.Interaction 4: Email: The learner can find four new emails, two from Ed; one from Se Jong and the last one from Justin. The emails have different issues and concerns being discussed like the need for security, smart lift ticket systems with optical scanners, the budget and the web cam systems on the slopes. The learner can exit from the email folder and reach the homepage to find the Documents folder to be highlighted. Documents: On opening the documents folder, the learner can find the two new documents that have been added to the folder. One is titled “Devil’s Canyon Architecture Map (final) and the other being “Devil’s Canyon Budget”.
  • 14. “Devil’s Canyon Architecture Map (final)” has the final set up of all the selections that have been made for the resort. “Devil’s Canyon Budget” has the cost estimates for designing the Enterprise Architecture for Devil’s Canyon. It shows all the expenses and the total cost for 1 year and the total cost that has occurred for 3 years. The reader can then exit from the document to the folder and then exit the document folder to return to the homepage where a pop-up will say that the simulation has been completed. End of simulation exercise Copyright © 2018 by Pearson. Used with permission. All rights reserved. Copyright© 2019 by Pearson. Used with permission. All rights reserved.