SlideShare a Scribd company logo
1 of 5
IFSM 370 Project 2: White Paper Instructions
Follow Below Link to DownloadTutorial
https://homeworklance.com/downloads/ifsm-370-project-2-white-paper-instructions/
For More Information Visit Our Website ( https://homeworklance.com/ )
Email us At: Support@homeworklance.com orlancehomework@gmail.com
Introduction
This is an individual project. Each student must complete a White Paper that proposes a
telecommunications solution to address a communications problem for a business
organization. The target audience will be the organization’s Chief Information Officer
(CIO). The White Paper deliverable is an MS Word document. If you have never written a
white paper, you should conduct some research and review sample white papers to understand
the content and format associated with these professional documents.
The completed White Paper deliverable is due by 11:59 PM Eastern Time on the due date shown
in the Course Schedule. See the Additional Information section of the syllabus for the penalty
for late or missed assignments and projects.
The White Paper is valued at 12% of the course grade.
Scenario
Ullman, Manly, & Ulysses Corporation
With 75,000 customers worldwide, 250 employees working in four locations in the United States
and three European offices, and a catalog of more than 100,000 parts, Ullman, Manly & Ulysses
Corporation (UMUC) relies on its network for its survival. In the past decade, UMUC has seen
its business grow from just one location and a few local customers to the worldwide supplier it is
today. But in the process of growing exponentially, it has overwhelmed its telecommunications
network, which is currently managed by an outside telecommunications network management
company. The network crashes frequently, resulting in customer service and e-mail interruptions
that are costly to the company. The network management company is not responsive to UMUC,
a relatively small customer, and often disagrees that there is even a problem. Since the contract
with the service provider is about to expire, UMUC has decided to seek a better network
solution.
The Chief Information Officer (CIO) has outlined the key requirements for a new network for
UMUC. He has explained to the executive board that a new network would have the following
characteristics:
1. Availability:Business operations require maximum uptime, and quick repairs when
needed.
2. Reliability:The network must function as designed and produce accurate results.
3. Scalability:UMUC continues to grow at a rapid rate, and there are plans for acquisition
of several small parts suppliers; the network must support this growth.
4. Security:The confidentiality and integrity of UMUC’s data is of great importance, as is
the protection of its customers’ data.
5. Flexibility:The new network must be responsive to the changing needs of the business.
6. Performance:The network must provide quick access for employees and customers.
7. Manageability:The network must be designed and implemented so that it can be
managed by a small team of centrally located IT specialists.
8. Economic efficiency:The ongoing operations and maintenance costs should offset the
initial investment costs, reducing the long-term total cost of ownership of the network.
UMUC’s executives have agreed that they need a business network with higher reliability,
security, and scalability, but with lower costs, than the existing externally managed network. The
CIO has proposed that UMUC design and implement its own network, using advanced
technologies for high availability, efficiency, and security management, that can be operated by a
very small IT department. He proposes to use virtual private network technologies to connect
remote offices and users securely and to facilitate company expansion.
The Deliverable
The CIO has asked you to develop a 3-page white paper that provides the following:
 definition of the business or technical problem
 discussion of the problem within the context of the scenario
 recommendation of the application of technology, processes, and policies that solve the
problem
 discussion of the impact or risks of the applied solution within the context of business
strategy and managerial perspective
 identification, analysis, and mitigation of risks of the recommended solution
Briefly define the business problem, and discuss it in the context of the scenario. Briefly describe
the proposed technology solution, processes, and policies to solve the problem. You should
demonstrate your critical thinking as you incorporate the course concepts and explain the
business needs and solutions. Then discuss the impact or risks of the applied solution within the
context of the business strategy and managerial perspective. Then discuss the challenges and
security risks that result from implementing the proposed solution. Propose mitigation strategies
for the challenges and risks identified. The bolded attributes in the Scoring Rubric (see below)
must be used as the section headings in the white paper.
Your deliverable will be a white paper three pages in length, not counting the cover page and
references page. At least two (2) external sources (other than the assigned readings and other
course materials) must be used, and citations and references must be in APA format. Your paper
will be scored according to the Scoring Rubric below. Be sure you have incorporated all required
aspects of the assignment.
Scoring Rubric
Attribute Full points Partial points No points
Possible
Points
The business
problem
The business problem is
defined and discussed in
sufficient depth to set the
stage for the proposed
solution, and
demonstrates critical
thinking and
understanding of the
course concepts.
The business problem is partially
defined and/or discussed; it may
not adequately set the stage for
the proposed solution and/or may
not demonstrate critical thinking
and understanding of course
concepts.
The business
problem is not
defined.
1
Proposed
technology
solution
The proposed technology
solution appropriately
addresses the business
scenario/problem, and
demonstrates
understanding of course
concepts, analysis, and
critical thinking.
The proposed technology solution
somewhat addresses the business
scenario/problem; it may be
lacking in demonstration of
understanding of course concepts,
analysis, and/or critical thinking.
No technology
solution is proposed.
3
Attribute Full points Partial points No points
Possible
Points
Proposed
processes and
policies
Processes and policies
relevant to the proposed
solution are presented;
work demonstrates
understanding of course
concepts, analysis, and
critical thinking.
The processes and policies
somewhat address the business
scenario/problem; work may be
lacking in demonstration of
understanding of course concepts,
analysis, and/or critical thinking.
No proposed
processes or policies
are presented.
2
Business and
managerial
impacts and risks
Impact and risks relevant
to the proposed solution
and the business strategy
are presented from a
managerial perspective;
work demonstrates
understanding of course
concepts, analysis, and
critical thinking.
Impact and risks are somewhat
relevant to the proposed solution
and/or the business strategy; they
may or may not be presented from
a managerial perspective; and
they may be lacking in
demonstration of understanding of
course concepts, analysis, and/or
critical thinking.
No impact or risks
are presented.
1
Cybersecurity
challenges and
risks identified
Cybersecurity challenges
and risks of the proposed
solution are
appropriately identified;
work demonstrates
understanding of course
concepts, analysis, and
critical thinking.
Cybersecurity challenges and
risks of the proposed solution are
partially identified and/or
explained; work may be lacking
in demonstration of understanding
of course concepts, analysis,
and/or critical thinking.
Cybersecurity
challenges and risks
are not included, or
do not apply to the
proposed solution.
2
Mitigation
strategies
Appropriate mitigation
strategies are provided
and thoroughly
explained. All risks of
the proposed solution are
addressed.
Mitigation strategies are
somewhat appropriate and/or
partially explained. They may
only partially address the risks of
the proposed solution.
No mitigation
strategies are
provided.
1
External research
More than two sources
other than the assigned
readings and course
materials are
incorporated and used
effectively.
One or two sources other than the
assigned readings and course
materials, but they are not
properly incorporated or used
and/or are not effective or
appropriate.
No external research
is incorporated.
1
Document format
The document reflects
effective organization
and correct sentence
structure, grammar, and
spelling; it is presented
in a professional format;
and references are
The document is not well-
organized, and/or contains
grammar and/or spelling errors;
and/or it does not follow APA
style for references and citations.
The document is
extremely poorly
written and does not
convey the
information.
1
Attribute Full points Partial points No points
Possible
Points
appropriately
incorporated and cited,
using APA style.
Total Points: 12

More Related Content

What's hot

Discussion 1 due to increase in the number of cyber attacks on th
Discussion 1 due to increase in the number of cyber attacks on thDiscussion 1 due to increase in the number of cyber attacks on th
Discussion 1 due to increase in the number of cyber attacks on thAMMY30
 
Welingkar_final project_ppt_IMPORTANCE & NEED FOR TESTING
Welingkar_final project_ppt_IMPORTANCE & NEED FOR TESTINGWelingkar_final project_ppt_IMPORTANCE & NEED FOR TESTING
Welingkar_final project_ppt_IMPORTANCE & NEED FOR TESTINGSachin Pathania
 
CIS 558 Life of the Mind/newtonhelp.com   
CIS 558 Life of the Mind/newtonhelp.com   CIS 558 Life of the Mind/newtonhelp.com   
CIS 558 Life of the Mind/newtonhelp.com   bellflower9
 
#Learnpad Project - results for the Public Survey on learning needs and chall...
#Learnpad Project - results for the Public Survey on learning needs and chall...#Learnpad Project - results for the Public Survey on learning needs and chall...
#Learnpad Project - results for the Public Survey on learning needs and chall...Andrea Sergiacomi
 
Rapidly Generating Human and System Requirements - Mark Mellblom
Rapidly Generating Human and System Requirements  - Mark MellblomRapidly Generating Human and System Requirements  - Mark Mellblom
Rapidly Generating Human and System Requirements - Mark MellblomPaul W. Johnson
 
Managing it personnel and projects
Managing it personnel and projectsManaging it personnel and projects
Managing it personnel and projectsMr. Pramit Kumar Sah
 
Managing IT Personnel and projects
Managing IT Personnel and projectsManaging IT Personnel and projects
Managing IT Personnel and projectsMr. Pramit Kumar Sah
 
Adapting to case management
Adapting to case managementAdapting to case management
Adapting to case managementTom Shepherd
 
Managing IT Personnel and Projects
Managing IT Personnel and Projects Managing IT Personnel and Projects
Managing IT Personnel and Projects Mr. Pramit Kumar Sah
 
Requirements management and the business analyst
Requirements management and the business analystRequirements management and the business analyst
Requirements management and the business analystRobert Darko
 
Cis 558 Extraordinary Success/newtonhelp.com
Cis 558 Extraordinary Success/newtonhelp.com  Cis 558 Extraordinary Success/newtonhelp.com
Cis 558 Extraordinary Success/newtonhelp.com amaranthbeg152
 
AQA INFO 1 – Sample Work Requirements
AQA INFO 1 – Sample Work RequirementsAQA INFO 1 – Sample Work Requirements
AQA INFO 1 – Sample Work Requirementsmrmwood
 
Project management
Project managementProject management
Project managementDavid Terry
 
St josephs project management
St josephs project managementSt josephs project management
St josephs project managementDavid Terry
 

What's hot (17)

Discussion 1 due to increase in the number of cyber attacks on th
Discussion 1 due to increase in the number of cyber attacks on thDiscussion 1 due to increase in the number of cyber attacks on th
Discussion 1 due to increase in the number of cyber attacks on th
 
Requirement Capturing Techniques
Requirement Capturing TechniquesRequirement Capturing Techniques
Requirement Capturing Techniques
 
Welingkar_final project_ppt_IMPORTANCE & NEED FOR TESTING
Welingkar_final project_ppt_IMPORTANCE & NEED FOR TESTINGWelingkar_final project_ppt_IMPORTANCE & NEED FOR TESTING
Welingkar_final project_ppt_IMPORTANCE & NEED FOR TESTING
 
Lecture # 07 (developing business it strategies)
Lecture # 07 (developing business it strategies)Lecture # 07 (developing business it strategies)
Lecture # 07 (developing business it strategies)
 
CIS 558 Life of the Mind/newtonhelp.com   
CIS 558 Life of the Mind/newtonhelp.com   CIS 558 Life of the Mind/newtonhelp.com   
CIS 558 Life of the Mind/newtonhelp.com   
 
#Learnpad Project - results for the Public Survey on learning needs and chall...
#Learnpad Project - results for the Public Survey on learning needs and chall...#Learnpad Project - results for the Public Survey on learning needs and chall...
#Learnpad Project - results for the Public Survey on learning needs and chall...
 
Rapidly Generating Human and System Requirements - Mark Mellblom
Rapidly Generating Human and System Requirements  - Mark MellblomRapidly Generating Human and System Requirements  - Mark Mellblom
Rapidly Generating Human and System Requirements - Mark Mellblom
 
Managing it personnel and projects
Managing it personnel and projectsManaging it personnel and projects
Managing it personnel and projects
 
Managing IT Personnel and projects
Managing IT Personnel and projectsManaging IT Personnel and projects
Managing IT Personnel and projects
 
Adapting to case management
Adapting to case managementAdapting to case management
Adapting to case management
 
Managing IT Personnel and Projects
Managing IT Personnel and Projects Managing IT Personnel and Projects
Managing IT Personnel and Projects
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Requirements management and the business analyst
Requirements management and the business analystRequirements management and the business analyst
Requirements management and the business analyst
 
Cis 558 Extraordinary Success/newtonhelp.com
Cis 558 Extraordinary Success/newtonhelp.com  Cis 558 Extraordinary Success/newtonhelp.com
Cis 558 Extraordinary Success/newtonhelp.com
 
AQA INFO 1 – Sample Work Requirements
AQA INFO 1 – Sample Work RequirementsAQA INFO 1 – Sample Work Requirements
AQA INFO 1 – Sample Work Requirements
 
Project management
Project managementProject management
Project management
 
St josephs project management
St josephs project managementSt josephs project management
St josephs project management
 

Viewers also liked

Viewers also liked (20)

1020111447 019
1020111447 0191020111447 019
1020111447 019
 
Tita Nur Anggraini
Tita Nur AnggrainiTita Nur Anggraini
Tita Nur Anggraini
 
Burocracia
BurocraciaBurocracia
Burocracia
 
SM- Electric bass
SM- Electric bassSM- Electric bass
SM- Electric bass
 
Estrella animal 2
Estrella animal 2Estrella animal 2
Estrella animal 2
 
SM- Auxilliary
SM- Auxilliary SM- Auxilliary
SM- Auxilliary
 
Postres y cuentos
Postres  y  cuentosPostres  y  cuentos
Postres y cuentos
 
XII commercial interior
XII commercial interiorXII commercial interior
XII commercial interior
 
Hora
HoraHora
Hora
 
Hola
HolaHola
Hola
 
2013最新在家工作網路創業商機
2013最新在家工作網路創業商機2013最新在家工作網路創業商機
2013最新在家工作網路創業商機
 
Drosophila
DrosophilaDrosophila
Drosophila
 
Emprendimeinto clei 5 b2
Emprendimeinto clei 5 b2Emprendimeinto clei 5 b2
Emprendimeinto clei 5 b2
 
Test mee e
Test mee eTest mee e
Test mee e
 
SM- Vibraphone 2
SM- Vibraphone 2SM- Vibraphone 2
SM- Vibraphone 2
 
Todos iguales todos diferentes
Todos iguales todos diferentesTodos iguales todos diferentes
Todos iguales todos diferentes
 
Advice
AdviceAdvice
Advice
 
Final ezkerrortuella
Final ezkerrortuellaFinal ezkerrortuella
Final ezkerrortuella
 
EF Certificate
EF CertificateEF Certificate
EF Certificate
 
Mat80a
Mat80aMat80a
Mat80a
 

Similar to Ifsm 370 project 2 white paper instructions

IntroductionThis is an individual project. Each student must comp.docx
IntroductionThis is an individual project.  Each student must comp.docxIntroductionThis is an individual project.  Each student must comp.docx
IntroductionThis is an individual project. Each student must comp.docxmariuse18nolet
 
IntroductionThis is an individual project. Each student must comp.docx
IntroductionThis is an individual project.  Each student must comp.docxIntroductionThis is an individual project.  Each student must comp.docx
IntroductionThis is an individual project. Each student must comp.docxnormanibarber20063
 
Get help with SWE4202 Computing Infrastructure Assignment
Get help with SWE4202 Computing Infrastructure AssignmentGet help with SWE4202 Computing Infrastructure Assignment
Get help with SWE4202 Computing Infrastructure AssignmentAaravSunak
 
Following your analysis of the business environment and the business.docx
Following your analysis of the business environment and the business.docxFollowing your analysis of the business environment and the business.docx
Following your analysis of the business environment and the business.docxhoundsomeminda
 
CMGT578 v12Week 4 Assignment InstructionsCMGT578 v12Page 2
CMGT578 v12Week 4 Assignment InstructionsCMGT578 v12Page 2CMGT578 v12Week 4 Assignment InstructionsCMGT578 v12Page 2
CMGT578 v12Week 4 Assignment InstructionsCMGT578 v12Page 2WilheminaRossi174
 
Week Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docxWeek Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docxalanfhall8953
 
CIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comCIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comMcdonaldRyan39
 
Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comrobertleses9
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comdonaldzs56
 
Cis 558 Effective Communication-snaptutorial.com
Cis 558  Effective Communication-snaptutorial.comCis 558  Effective Communication-snaptutorial.com
Cis 558 Effective Communication-snaptutorial.comjhonklinz11
 
Final PaperThe final paper will demonstrate the students’ abil.docx
Final PaperThe final paper will demonstrate the students’ abil.docxFinal PaperThe final paper will demonstrate the students’ abil.docx
Final PaperThe final paper will demonstrate the students’ abil.docxPOLY33
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comrobertlesew96
 
Cmgt 433 cmgt433 cmgt 433 education for service uopstudy.com
Cmgt 433 cmgt433 cmgt 433 education for service   uopstudy.comCmgt 433 cmgt433 cmgt 433 education for service   uopstudy.com
Cmgt 433 cmgt433 cmgt 433 education for service uopstudy.comUOPCourseHelp
 
COMP1648Development, Frameworks and MethodsCoursework Number.docx
COMP1648Development, Frameworks and MethodsCoursework Number.docxCOMP1648Development, Frameworks and MethodsCoursework Number.docx
COMP1648Development, Frameworks and MethodsCoursework Number.docxmonicafrancis71118
 
BUSN350Week 3 Business Problem and RequirementsBusiness.docx
BUSN350Week 3 Business Problem and RequirementsBusiness.docxBUSN350Week 3 Business Problem and RequirementsBusiness.docx
BUSN350Week 3 Business Problem and RequirementsBusiness.docxhumphrieskalyn
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxbradburgess22840
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxdeanmtaylor1545
 
Before you begin this assignment, be sure you1.Read the UMUC.docx
Before you begin this assignment, be sure you1.Read the UMUC.docxBefore you begin this assignment, be sure you1.Read the UMUC.docx
Before you begin this assignment, be sure you1.Read the UMUC.docxlascellesjaimie
 
Assignment Objectives for Unit 5Influence ProcessesYou have.docx
Assignment Objectives for Unit 5Influence ProcessesYou have.docxAssignment Objectives for Unit 5Influence ProcessesYou have.docx
Assignment Objectives for Unit 5Influence ProcessesYou have.docxhoward4little59962
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worogglili
 

Similar to Ifsm 370 project 2 white paper instructions (20)

IntroductionThis is an individual project. Each student must comp.docx
IntroductionThis is an individual project.  Each student must comp.docxIntroductionThis is an individual project.  Each student must comp.docx
IntroductionThis is an individual project. Each student must comp.docx
 
IntroductionThis is an individual project. Each student must comp.docx
IntroductionThis is an individual project.  Each student must comp.docxIntroductionThis is an individual project.  Each student must comp.docx
IntroductionThis is an individual project. Each student must comp.docx
 
Get help with SWE4202 Computing Infrastructure Assignment
Get help with SWE4202 Computing Infrastructure AssignmentGet help with SWE4202 Computing Infrastructure Assignment
Get help with SWE4202 Computing Infrastructure Assignment
 
Following your analysis of the business environment and the business.docx
Following your analysis of the business environment and the business.docxFollowing your analysis of the business environment and the business.docx
Following your analysis of the business environment and the business.docx
 
CMGT578 v12Week 4 Assignment InstructionsCMGT578 v12Page 2
CMGT578 v12Week 4 Assignment InstructionsCMGT578 v12Page 2CMGT578 v12Week 4 Assignment InstructionsCMGT578 v12Page 2
CMGT578 v12Week 4 Assignment InstructionsCMGT578 v12Page 2
 
Week Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docxWeek Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docx
 
CIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comCIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.com
 
Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.com
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.com
 
Cis 558 Effective Communication-snaptutorial.com
Cis 558  Effective Communication-snaptutorial.comCis 558  Effective Communication-snaptutorial.com
Cis 558 Effective Communication-snaptutorial.com
 
Final PaperThe final paper will demonstrate the students’ abil.docx
Final PaperThe final paper will demonstrate the students’ abil.docxFinal PaperThe final paper will demonstrate the students’ abil.docx
Final PaperThe final paper will demonstrate the students’ abil.docx
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.com
 
Cmgt 433 cmgt433 cmgt 433 education for service uopstudy.com
Cmgt 433 cmgt433 cmgt 433 education for service   uopstudy.comCmgt 433 cmgt433 cmgt 433 education for service   uopstudy.com
Cmgt 433 cmgt433 cmgt 433 education for service uopstudy.com
 
COMP1648Development, Frameworks and MethodsCoursework Number.docx
COMP1648Development, Frameworks and MethodsCoursework Number.docxCOMP1648Development, Frameworks and MethodsCoursework Number.docx
COMP1648Development, Frameworks and MethodsCoursework Number.docx
 
BUSN350Week 3 Business Problem and RequirementsBusiness.docx
BUSN350Week 3 Business Problem and RequirementsBusiness.docxBUSN350Week 3 Business Problem and RequirementsBusiness.docx
BUSN350Week 3 Business Problem and RequirementsBusiness.docx
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
 
Before you begin this assignment, be sure you1.Read the UMUC.docx
Before you begin this assignment, be sure you1.Read the UMUC.docxBefore you begin this assignment, be sure you1.Read the UMUC.docx
Before you begin this assignment, be sure you1.Read the UMUC.docx
 
Assignment Objectives for Unit 5Influence ProcessesYou have.docx
Assignment Objectives for Unit 5Influence ProcessesYou have.docxAssignment Objectives for Unit 5Influence ProcessesYou have.docx
Assignment Objectives for Unit 5Influence ProcessesYou have.docx
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
 

Recently uploaded

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Recently uploaded (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

Ifsm 370 project 2 white paper instructions

  • 1. IFSM 370 Project 2: White Paper Instructions Follow Below Link to DownloadTutorial https://homeworklance.com/downloads/ifsm-370-project-2-white-paper-instructions/ For More Information Visit Our Website ( https://homeworklance.com/ ) Email us At: Support@homeworklance.com orlancehomework@gmail.com Introduction This is an individual project. Each student must complete a White Paper that proposes a telecommunications solution to address a communications problem for a business organization. The target audience will be the organization’s Chief Information Officer (CIO). The White Paper deliverable is an MS Word document. If you have never written a white paper, you should conduct some research and review sample white papers to understand the content and format associated with these professional documents. The completed White Paper deliverable is due by 11:59 PM Eastern Time on the due date shown in the Course Schedule. See the Additional Information section of the syllabus for the penalty for late or missed assignments and projects. The White Paper is valued at 12% of the course grade. Scenario Ullman, Manly, & Ulysses Corporation With 75,000 customers worldwide, 250 employees working in four locations in the United States and three European offices, and a catalog of more than 100,000 parts, Ullman, Manly & Ulysses Corporation (UMUC) relies on its network for its survival. In the past decade, UMUC has seen its business grow from just one location and a few local customers to the worldwide supplier it is today. But in the process of growing exponentially, it has overwhelmed its telecommunications network, which is currently managed by an outside telecommunications network management company. The network crashes frequently, resulting in customer service and e-mail interruptions
  • 2. that are costly to the company. The network management company is not responsive to UMUC, a relatively small customer, and often disagrees that there is even a problem. Since the contract with the service provider is about to expire, UMUC has decided to seek a better network solution. The Chief Information Officer (CIO) has outlined the key requirements for a new network for UMUC. He has explained to the executive board that a new network would have the following characteristics: 1. Availability:Business operations require maximum uptime, and quick repairs when needed. 2. Reliability:The network must function as designed and produce accurate results. 3. Scalability:UMUC continues to grow at a rapid rate, and there are plans for acquisition of several small parts suppliers; the network must support this growth. 4. Security:The confidentiality and integrity of UMUC’s data is of great importance, as is the protection of its customers’ data. 5. Flexibility:The new network must be responsive to the changing needs of the business. 6. Performance:The network must provide quick access for employees and customers. 7. Manageability:The network must be designed and implemented so that it can be managed by a small team of centrally located IT specialists. 8. Economic efficiency:The ongoing operations and maintenance costs should offset the initial investment costs, reducing the long-term total cost of ownership of the network. UMUC’s executives have agreed that they need a business network with higher reliability, security, and scalability, but with lower costs, than the existing externally managed network. The CIO has proposed that UMUC design and implement its own network, using advanced technologies for high availability, efficiency, and security management, that can be operated by a very small IT department. He proposes to use virtual private network technologies to connect remote offices and users securely and to facilitate company expansion. The Deliverable The CIO has asked you to develop a 3-page white paper that provides the following:  definition of the business or technical problem  discussion of the problem within the context of the scenario  recommendation of the application of technology, processes, and policies that solve the problem  discussion of the impact or risks of the applied solution within the context of business strategy and managerial perspective
  • 3.  identification, analysis, and mitigation of risks of the recommended solution Briefly define the business problem, and discuss it in the context of the scenario. Briefly describe the proposed technology solution, processes, and policies to solve the problem. You should demonstrate your critical thinking as you incorporate the course concepts and explain the business needs and solutions. Then discuss the impact or risks of the applied solution within the context of the business strategy and managerial perspective. Then discuss the challenges and security risks that result from implementing the proposed solution. Propose mitigation strategies for the challenges and risks identified. The bolded attributes in the Scoring Rubric (see below) must be used as the section headings in the white paper. Your deliverable will be a white paper three pages in length, not counting the cover page and references page. At least two (2) external sources (other than the assigned readings and other course materials) must be used, and citations and references must be in APA format. Your paper will be scored according to the Scoring Rubric below. Be sure you have incorporated all required aspects of the assignment. Scoring Rubric Attribute Full points Partial points No points Possible Points The business problem The business problem is defined and discussed in sufficient depth to set the stage for the proposed solution, and demonstrates critical thinking and understanding of the course concepts. The business problem is partially defined and/or discussed; it may not adequately set the stage for the proposed solution and/or may not demonstrate critical thinking and understanding of course concepts. The business problem is not defined. 1 Proposed technology solution The proposed technology solution appropriately addresses the business scenario/problem, and demonstrates understanding of course concepts, analysis, and critical thinking. The proposed technology solution somewhat addresses the business scenario/problem; it may be lacking in demonstration of understanding of course concepts, analysis, and/or critical thinking. No technology solution is proposed. 3
  • 4. Attribute Full points Partial points No points Possible Points Proposed processes and policies Processes and policies relevant to the proposed solution are presented; work demonstrates understanding of course concepts, analysis, and critical thinking. The processes and policies somewhat address the business scenario/problem; work may be lacking in demonstration of understanding of course concepts, analysis, and/or critical thinking. No proposed processes or policies are presented. 2 Business and managerial impacts and risks Impact and risks relevant to the proposed solution and the business strategy are presented from a managerial perspective; work demonstrates understanding of course concepts, analysis, and critical thinking. Impact and risks are somewhat relevant to the proposed solution and/or the business strategy; they may or may not be presented from a managerial perspective; and they may be lacking in demonstration of understanding of course concepts, analysis, and/or critical thinking. No impact or risks are presented. 1 Cybersecurity challenges and risks identified Cybersecurity challenges and risks of the proposed solution are appropriately identified; work demonstrates understanding of course concepts, analysis, and critical thinking. Cybersecurity challenges and risks of the proposed solution are partially identified and/or explained; work may be lacking in demonstration of understanding of course concepts, analysis, and/or critical thinking. Cybersecurity challenges and risks are not included, or do not apply to the proposed solution. 2 Mitigation strategies Appropriate mitigation strategies are provided and thoroughly explained. All risks of the proposed solution are addressed. Mitigation strategies are somewhat appropriate and/or partially explained. They may only partially address the risks of the proposed solution. No mitigation strategies are provided. 1 External research More than two sources other than the assigned readings and course materials are incorporated and used effectively. One or two sources other than the assigned readings and course materials, but they are not properly incorporated or used and/or are not effective or appropriate. No external research is incorporated. 1 Document format The document reflects effective organization and correct sentence structure, grammar, and spelling; it is presented in a professional format; and references are The document is not well- organized, and/or contains grammar and/or spelling errors; and/or it does not follow APA style for references and citations. The document is extremely poorly written and does not convey the information. 1
  • 5. Attribute Full points Partial points No points Possible Points appropriately incorporated and cited, using APA style. Total Points: 12