Week 7 Discussion- Importance of IT Architecture in Security
Nofsinger Consulting has recommended that Sifers-Grayson invest in an Enterprise Architecture tool to help it document the assets, processes, and network infrastructure that comprise its information enterprise. Based upon past experience with such recommendations, the Nofsinger team knows that it must be prepared for debate amongst the client’s managers and executives as to the relative merits of such tools.
To help your team prepare for the expected debate, you have been asked to write a 3 to 5 paragraph response to the question “Why does Sifers-Grayson need an Enterprise Architecture tool?”
You should focus on the benefits of having a tool that can help guide the creation of an enterprise architecture.
Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.
Here is a link of a resource for Guidelines for evaluating websites:
1.Provide the URL in site ( a brief overview of its content, and date of the website review
2. What are the major categories of information covered on the site?
3. Who is the audience for the site? What clues define the audience? Provide evidence such as tone, voice, language (accessible to the general public or technical) and assumed knowledge.
4. What are the hypertext links on the website page? How do the various links relate to the main theme? Are the links consistent with the main theme? Or does the site have personal links? Is it a hodgepodge of various personal interests of an individual?
5. What kinds of graphics are on the site? Describe them in detail. How do they relate to the topics? Are the graphics designed to grab your attention? Do they make the site easier to use or help explain concepts? Do the graphics support text information or do they stand alone? Do they overuse graphics to the point of distraction? Who are the various audiences for these graphics? What are your clues?
6. Whatclues do you have about the credit ability of the site and the information? You may not be familiar with the institutions, organizations, or individuals who sponsor or who contributed information to the site, but can you find text material by these authors or institutions in the library? From what institutions or organizations does the site originate? Any group can give themselves an official sounding name or a logo.
What beyond surface credibility gives you clues about the reliability of the site and its information? Is the sponsoring organization involved in the research and/or does it provide supporting documentation to supports its points? Does the site have built in bias? For example, is the web page an advertisement for a product or service? Does it have a particular political or social agenda? Having an agenda or selling a product on the Web is not necessarily “bad” but is the sponsor “sneaky” about its alliances or “up front”?
7. Make some general observations about what you learned about the subject you choose to investigate by exploring this site. What did you learn about your discipline through exploring Internet resources?
What general observations can you make about the usefulness and value of the information you found on the Internet while being aware that you have only looked at one site related to the content of this week’s lesson? What did you learn about the importance of critiquing sources web and non-Web based with a critical eye?
8. Which type of website does the information appear i.e. is it an educational (.edu), government (.gov), or organization (.org). or commercial (.com). or network infrastructure (.net) website? Is it a personal homepage, a special interest site, an information site, a news/journalistic site, or a commercial site?
9. How will the information on this site enhance your practice?
Design and implement a secure network infrastructure that supports business goals and global industry standards.
Manage and maintain a secure integrated network infrastructure.
Evaluate and troubleshoot a compromised network infrastructure to re-establish a secured network infrastructu