Week 2 – cyber | Telecommunications Engineering homework help

Week 2 Discussion – Question #2 

As the demand for systems and applications continue to grow, organizations are striving to get things correct the first time as barriers are high and alternatives are plentiful.  Review the elements systems engineering discussed in Chapter 2 and select the most critical element and one you see commonly overlooked.

Use only as example!


Hello class,

I hope this week finds you all doing well. This week we are discussing the elements of system engineering. I will admit I have not delved into the systems engineering process in my previous studies too extensively before this course. From my previous life experiences though I would have to be one of the more critical steps that is often overlooked would be the process of investigating alternative solutions (Jacobs, 2015). I know it sounds like this should be something done all of the time, but I know from what little project experience I do have people tend to focus in on one main plan and not want to budge. Meanwhile an alternative solution could make the system implementation go much smoother, or there are more cost effective options available to the team. In reality this task is paired with another in our reading which seems to walk hand in hand and that is modeling the system (Jacobs, 2015). By modeling the system the systems engineers can lay out a roadmap of the system, and see where potential alternatives may be helpful.

By investigating alternative systems, and modeling each one the systems engineers can lay out each of the models and see the value of each in different functionality areas, as well as lay out the cost of the individual models, and performance based information. This side by side comparison of alternatives will allow the management to decide which option is the best fit overall and thus save time in the long run by not having to continuously go back to the drawing board as they say. In the words of this week’s reading exploring the alternatives will help examine the performance, cost-benefit, and trade-off analysis for each of the alternative designs (Jacobs, 2015). I thought the reading from this week was extremely interesting, and I am working a bit ahead because of my operational requirements while deployed, but I look forward to reading what you all have to say about the reading. Best of luck to you all.



Jacobs, S. (2015). Engineering information security: The application of systems engineering concepts to achieve information assurance. John Wiley & Sons, Incorporated.

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more