security plan -privacy policies- risk assessments

Part 1 Devil’s Canyon
Part A: Ch. 3 Role Playing Sim: Devil’s Canyon
In this simulation, you will evaluate how to design an enterprise architecture for a Mountain Resort. Your job is to utilize the team’s vision to design the enterprise architecture using the interactive map tools while staying within budget. Using the Devil’s Canyon Simulation Access link, complete the interactive before moving to Part B.
Part B: Policies, Plans, and Risks
Now that you’ve seen all of the elements contributing to the Devil’s Canyon enterprise architecture, Justin wants to move forward with developing privacy policies to ensure videos aren’t distributed or uploaded to the net without the consent of the people in them. This opens a much larger conversation: Devil’s Canyon is also in need of a complete security plan, as well as risk assessments.
In a 3- to 4-page rationale and table, prepare the following information to present to the Devil’s Canyon team:
Explain the relationship between policies and security plans. Identify potential policy needs, noting Justin’s privacy policy, in relation to the Devil’s Canyon enterprise structure.
Outline the importance of a security plan in relation to security roles and safeguards.
Analyze at least 5 security-related risks/threats that Devil’s Canyon may face.
Assess the probability and impact to the Devil’s Canyon if each risk occurs. Based on these two factors, determine the overall risk level. For purposes of this assignment, evaluate and categorize each factor as low, medium, or high, and create a table to illustrate the risks. For example, a risk/threat with a low likelihood of occurrence and a high impact would represent an overall medium risk.
Consider digital elements mentioned in the designing of the enterprise architecture, such as software, hardware, proposed security measures, smart lift tickets, webcam systems, and smartphones.
Part 2 Devil’s Canyon
Using the potential risks for Devil’s Canyon you identified in Part 1, create a 4- to 5-page matrix to share with the team. In your matrix, you should do the following:
Describe briefly each of the identified risks/threats.
Evaluate the security controls that mitigate each of the risks/threats identified.
Provide a rationale for how each of the controls identified mitigates the risk to an acceptable level.
Research and describe the security technologies and security design that can be used to mitigate each of the identified information security risks.
Page 2 of 2
Transcript: Devil’s Canyon – A Role-Playing Simulation on Designing the Enterprise Architecture for a Mountain Resort by Patricia Wallace
In this simulation, the learner will understand how to design an enterprise architecture for a Mountain Resort by using the interactive map tools and get a sense of their vision and estimate their expenses.
The simulation will allow the learner to interact with the decision-makers of the enterprise through the following tools: Email, Voicemail, Instant message, Architecture Designer, and Web meeting.
Upon logging in to the application, the learner will have access to the following tools: Email, Voicemail and the documents. These are seen on the home screen of the application.
Interaction 1
The learner will be using various means of interaction in the simulation, which shall be divided into stages as the interaction proceeds.
Once the learner clicks on the email icon, he/she will be able to see three emails, two are replies to the email sent by Ed, one from Se Jong and the other reply is from Ariane.
The subject of the email from Ed is “Devil’s Canyon ICT”. In the email Dan says that the maps of the resort are ready for the development, he wants to be sure that everything is right before investing on the computers, networks, and software. He plans on having all the cables underground so that people have wireless access throughout the resort. He warns about the storms during which the internet would be down. He says that electricity will not be an issue, as they have their own generators which would make a small data center feasible for them.
Ed informs that he has placed the cost estimates made for the software, data center construction, servers, training, maintenance and other things in the document folder to work out a budget. The budget needs to be around $750K for a year, which should include all the startup costs. He wishes for the costs to be around $1.2 million for three years.
After reading the mail from Ed, the learner then closes the mail and goes to read the reply made by Se Jong to Ed’s email.
Se Jong goes on to say that she has added a map of the resort to the folder and is working on the installation of the Architecture designer software for the user. She says that since they do not have a legacy software to fall upon, it would be of advantage to choose a software that would be suitable for the resort. She wants a thought on the cloud computing and software as a service and thinks of using it, as it would mean that there would be no requirement for the data center. She goes on to say that if they go in as an infrastructure-as-a-service they would not have the need to buy bigger hard drives.
After reading the mail from Se Jong, the learner then closes the mail and goes on to read the reply made by Ariane to Ed’s mail.
Ariane says that she has been thinking about the hardware side. And asks for opinions regarding the usage of optical scanners at the base of the lifts to keep the lines moving faster or using the RFID to track the charges of the customers so that they could avoid carrying their wallets. She thinks that it is costly to imply RFID’s but would be helpful to track the customers during bad weather in the slopes. She goes to mention that Se Jong is pretty good at developing a mobile app which is costly as well.
After reading the emails, the learner exits from the email folder and reaches the home page where he/she can find that the voicemail has been highlighted.
The learner clicks on the voicemail icon.
There is a voicemail from Ed. In the voicemail Ed says that he has so much expectations for the resort and wants his customers to have a top notch experience, he wants his customers to have easy access to Wi-Fi to use their laptops and tablets, he also wants smartphones to work well in the resort as there is the issue of dropped calls which he plans to avoid from happening.
After listening to the voicemail, the learner exits from the voicemail folder and reaches the homepage where the Instant Message pane pops up.
Instant Message:
Se Jong has sent a message saying that the Architect Designer application is up and running.
The learner can then type in a response and press return to read through the documents that has been attached in the documents folder
On opening the documents folder, the learner can find two documents titled “Map of the Resort” and “Estimated Costs of Architecture Components”.
On clicking the document titled “Map of the Resort” the learner can find a map of the resort.
After going through the map of the resort the learner closes the document and selects the document named “Estimated Costs of Architecture Components”.
On opening the document, the estimated costs for the Architecture Components for Devil’s Canyon are given. The document has the components divided into phases. Phase I: Software Choices, which has two parts: Enterprise Systems and Individual Productivity Software; Phase II: Hardware Choices; Phase III: Network and Telecom Choices which has four parts: Cabling, Wi-Fi and Cellular Access and Main Internet Connection; Phase IV: Special Purpose Systems Choices.
After going through the documents in the folder, the user can exit and reach the home page where the learner can find that the Architecture Designer icon is highlighted.
Architecture Designer:
The learner on selecting the Architecture Designer icon can see the map of the resort. There are three panes. One pane has the map of the resort, the second pane has the Enterprise Architecture Design Panel Running Expenses where the amount gets filled in once the learner selects the options in Phase I: Software Choices for the Enterprise Systems and the Individual Productivity Software. The learner must keep in mind the expenditure that is to be made.
The learner can click on the submit button if he/she is satisfied with the response or reset the form and select the option that he/she thinks is suitable and then submit the form.
The learner can then exit the Architecture Designer and return to the homepage where the learner can find the Email and the Voicemail icons to be highlighted.
Interaction 2
The reader can find two emails in the email folder, one is from Ed and the other mail is from Se Jong replying to Ed’s email which has the subject “Phase I – Software Selections”.
Both the emails put forth the opinions and concerns of Se Jong and Ed on the choices that have been made for the Phase I of Software Choices for the Enterprise Systems and Individual Productivity Software.
The user can then exit the email folder and reach the homepage to see the Voicemail folder to be highlighted.
On selecting the voicemail icon, the learner can find three new voicemails from Ariane, Justin and Ed. The reader can then listen to the individual voicemails where all the three of them provide their view on the choices that has been made.
The reader then can exit the voicemail and reach the homepage where Se Jong has sent a message on the Instant message saying that she has loaded the data for Phase II on the hardware architecture in the Architecture Designer. The homepage now has the highlight on the Architecture Designer.
Architecture Designer:
Upon selecting the application, the learner can see the map of the resort, with the selections that have been made in Phase I. There are three panes as before, but at this point the user has to make the decision by selecting the Hardware Choices of Phase 2, the learner can then submit after making the selection or reset and then select the option that he/she thinks is right. The learner must keep in mind the budget that has been allotted by Ed in the beginning. The learner can notice that there is the option of “Exit without Submitting”, keep in mind that the activity will not proceed until the choice is made.
Exiting the Architecture Designer, the learner can see that the voicemail and the email icons have been highlighted.
Opening the voicemail first, the learner can find two new voicemails from Justin and Ariane. Both of them provide their feedback and concerns on the choices that have been made for the Hardware.
Exiting the voicemail, the learner can now find the Email icon in the homepage to be highlighted.
Interaction 3
Selecting the email folder, the learner can find 2 emails. One is from Ed and the other is from Se Jong.
The mail from Ed has the subject “Phase 2- Hardware Selections”, where he puts forth his views on the selections that have been made and the concerns that he has regarding the choices.
The mail from Se Jong has the subject “Smartphones”, where she shares her concern of operating systems for smartphones and source codes.
The learner can then exit from the email folder and return to the homepage to find the Architecture Designer to be highlighted.
Architecture Designer:
On selecting the Architecture Designer, the learner is put forth with the map of the resort now containing the choices made for both Phase I and Phase II. The learner now has to make the decision regarding the Network and Telecom Choices for Cabling, Wi-Fi and Cellular Access, Voice calls, Main Internet Connection of Phase III. The learner should keep in mind the budget allotted and that he/she can submit the selection made or reset and make the correct choice. Keep in mind that the learner cannot proceed further without making the selection for the Phase III.
The learner can now exit from the Architecture Designer and go to the homepage where he/she can see that the Instant Message has popped up and has a message from Ed instructing to try out the Web software where the team would be meeting up to discuss what has been done so far.
Web Meeting:
On selecting the Web Meeting icon, the learner can see the Screen Area with the map of the Resort. All the members are present in the meeting, Ed is on the video call while the team members Ariane, Se Jong, Justin and the learner talk to each other using the chat box. There is a pane with notes that explains the various concepts on technical words. The meeting has the members discussing the Wi-Fi, Cell Towers, Landline Voice calls and the Bandwidth choices. The meeting ends with the members moving forward to make choices for Phase IV. Note that the learner cannot proceed further without completing the web meeting.
After exiting the Web Meeting, the user reaches the homepage to find the Instant Message with messages from Ed.
Instant Message:
The Instant message has Ed saying that the budget needs to be put forth and he needs recommendations for the Special purpose systems. He also goes to put a reminder of the budget being $750,000 for the first year and $1.2 million for total 3 years cost.
2 The user can see that the Documents folder has been highlighted in the homepage.
On selecting the documents folder, the learner can find a new document titled “Devil’s Canyon Architecture Map (draft)”.
Opening the document, the learner can see the draft model of the Resort with the selections that have been made so far for the resort.
The learner can close the document and exit from the document folder.
Upon exiting the document folder and reaching the homepage, the learner can find the Architecture Design to be highlighted. The learner then selects the Application.
Architecture Designer:
On opening, the learner can see the map of the Resort with all the selected options from Phase I, II, and III. The learner has now to make the decision regarding the Special Purpose Systems Choices of Phase IV. On selecting the options, the learner can submit and then exit or reset the form and modify the choices and submit.
The learner on returning to the homepage can find the email icon to be highlighted.
Interaction 4
The learner can find four new emails, two from Ed; one from Se Jong and the last one from Justin. The emails have different issues and concerns being discussed like the need for security, smart lift ticket systems with optical scanners, the budget and the web cam systems on the slopes.
The learner can exit from the email folder and reach the homepage to find the Documents folder to be highlighted.
On opening the documents folder, the learner can find the two new documents that have been added to the folder. One is titled “Devil’s Canyon Architecture Map (final) and the other being “Devil’s Canyon Budget”.
“Devil’s Canyon Architecture Map (final)” has the final set up of all the selections that have been made for the resort.
“Devil’s Canyon Budget” has the cost estimates for designing the Enterprise Architecture for Devil’s Canyon. It shows all the expenses and the total cost for 1 year and the total cost that has occurred for 3 years.
The reader can then exit from the document to the folder and then exit the document folder to return to the homepage where a pop-up will say that the simulation has been completed.
End of simulation exercise
6/8/22, 10:01 PM Wallace_sim3.pdf 1/3
Feedback on Your Choices in Devil’s Canyon: A Role-Playing Simulation on Designing the Enterprise Architecture
Total Points for Your Choices (out of a maximum of 49 points): 36
1. Your Choices for Devil’s Canyon
Designing the Enterprise Architecture for Devil’s Canyon:
Points awarded for selection Best selections
Phase 1 : Software Choices
Enterprise Systems (5 points maximum)
COTS for Resort Management (installed on premises) 5 ✔
Open Source Software (installed on premises) 0
Software as a Service/Cloud computing 0
Individual Productivity Software (5 points maximum)
Microsoft Suite 5 ✔
Open Office or Google Docs 0
Phase 2: Hardware Choices (15 points maximum)
Data Center on premises with virtualized servers* 5 ✔
Microcomputers-Desktops 5 ✔
Microcomputers-Laptops 0
Smartphones 0 ✔
Phase 3: Network and Telecom Choices
Cabling (6 points maximum)
All �ber throughout 0
Mix of �ber and twisted pair 3 ✔
Coaxial cable (mainly for cable TV) 3 ✔
Wi� and Cellular Access (6 points maximum)
Wi� Hot Spots 0 ✔
Cell towers (with pine tree disguise) 3 ✔
Voice Calls (3 points maximum)
PBX (installed on premises) 0 ✔
Virtual PBX (Voice over IP, hosted by service) 1
Main Internet Connection (3 points maximum)
Maximum bandwidth for highest speeds and traffic 3 ✔
Moderate bandwidth for moderate speeds and traffic 0
Phase 4: Special Purpose Systems Choices (6 points maximum)
Smart Lift Tickets (with RFID) 0
Security system (video cameras, motion sensors) 3 ✔
6/8/22, 10:01 PM Wallace_sim3.pdf 2/3
Devil’s Canyon Custom Mobile Phone App 0
Web Cam System on Slopes with Large Display in Lodge 0 ✔
Total 1 Year Costs for Your Choices $774,180
Total 3 Year Costs for Your Choices $1,098,540
* Some choices earn partial credit.
To stay within the budget and still make sure Devil’s Canyon has what it needs to operate, some tough choices are
needed. Your decisions led to a one year cost of $774,180, which was $24,401 over budget. Your three year costs
amounted to $1,098,540, which was $95,599 under budget.
2. Feedback on the Choices for Devil’s Canyon
Phase I: Software Choices
In this setting, software as a service and cloud computing that rely on Internet connectivity for all operations are
too risky, given the frequency of snowstorms and associated downtime, so COTS or open source software
installed on premises is a better choice. COTS would be preferred over open source, partly because of the
shortage of IT staff at Devil’s Canyon, and their limited skill set. For individual productivity, the Microsoft suite is
the best choice, and also less costly in the long run.
Phase II: Hardware Choices
A data center is a requirement for COTS or open source software. Desktops are the best choice, given the higher
cost of purchasing and maintaining laptops. An attractive solution for mobile access is to combine desktops with
smartphones. Staff would not be able to carry their laptops around the resort, but they could use their smartphones
to access the systems, even from the ski lifts. The smartphones with GPS capabilities will also add improvements
to safety, especially for rescue teams and during blizzards.
Phase III: Network and Telecom Choices
A mix of fiber and twisted pair is preferred over all fiber, especially because guests will not have the interface
cards for a fiber connection. Even if the resort installs wireless access points, guests may prefer Ethernet cables
because the connections are typically faster and more reliable.
Coaxial cable adds little to the expense for startup because it would be installed along with the fiber and
twisted pair. If it is not installed at this time, the costs for installation would be much higher. The cable
installation provides the resort with more flexibility for delivering television signals.
The resort needs reliable wifi, so hot spots are essential. Though the resort gets spotty signals from existing cell
towers in the geographic vicinity, reliable and strong signals will be an enormous benefit, so cell towers are a
justifiable expenditure. For voice calls, the hosted virtual PBX may not be reliable because of snowstorms and
Internet outages. The higher costs of maximum bandwidth for the resort’s main is a justifiable expense that could
make a very positive impression on customers who want to watch movies or play games.
Phase IV: Special Purpose Systems
The security system is essential, but the costly smart lift tickets and mobile phone app would best be added later to
stay within the budget. They are both attractive, but their costs will probably come down in the future.
The web cam system is a good choice, given its much lower cost and its potential for earning revenue.
Final Budget
The best choices would lead to a 1 year cost of $749,779, and a 3 year cost of $1,194,139, and stay just within
Ed’s budget.
Total Points for Scored Choices
6/8/22, 10:01 PM Wallace_sim3.pdf 3/3
You received 36 out of 49 points or 73%.
Discussion Questions
1. If Devil’s Canyon Resort already had built a data center in the basement of its hotel, and had room for expansion,
would that affect your choices?
2. What are the pros and cons for the order in which the enterprise architecture choices were made (software,
hardware, networks and telecommunications, and special purpose systems)?
3. Which parts of Devil’s Canyon architecture do you think will need the most frequent upgrades or replacements?
4. If you were helping to design the enterprise architecture for a small college with a classroom building, a
dormitory, and an administration building, how would it differ? What additional components might be needed to
support the college’s mission?

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more