Report focused on the specific challenges and issues

Assignment Help Computer Engineering
Reference no: EM133244619

Case: A report focused on the specific challenges and issues that arise owing to the use of microservices architecture as a software development philosophy. The report length is. You are also required to identify and include risk mitigation strategies that can be applied to minimise privacy and security risk in microservices-architected environments.

Context

Microservices architecture signals a shift from monolithic software applications architecture to different microservices architected to address different functions. Not only is there a shift in how distribution of services impacts on managing security but hosting of services on cloud platforms not owned by the organisation, and the use of communication channels between services adds complexity to managing security.

Equally, additional complexity is provided through the rapid and incremental software development principles associated with Agile and DevOps methods. The organisation as an enterprise has several moral, ethical, and legal obligations regarding privacy and the security of information.

The purpose of this report is to engage you in building knowledge about privacy and security issues with a specific focus on how these manifest in a microservices-architected environment. You are also required to identify and discuss mitigations available to better manage privacy and security risk for the organisation in relation to microservices architecture. Irrespective of your future role, many organisations make it clear that privacy and security is every employee's concern.

Task

  1. Write a report focused on the specific challenges and issues that arise owing to the use of microservices architecture as a software development philosophy. Identify and include risk mitigation strategies that can be applied to minimise privacy and security risk in microservices-architected environments.
  2. Whilst this is not a continuation of the case covered in Assignment 1 Part B, you might have developed insights when completing the Assessment 1 Part B Case Study that can enrich this assessment. Please review your notes to ensure that you have identified any context-based insights from Assessment 1 Part B Case Study that can inform this assessment. Re-read any relevant readings and conduct additional research in the area of investigation and select five additional sources that will add value to your report in the relevant area of investigation.
  3. Plan how you will structure your ideas for your report and write a report plan before you start writing.
  4. The report consist of the following structure:
  5. A title page with the subject code and name, assignment title, student's name, student number, and lecturer's name.
  6. The introduction that will also serve as your statement of purpose for the report-this means that you will tell the reader what you are going to cover in your report. You will need to inform the reader of:
  7. Your area of research and its context
  8. The key concepts you will be addressing
  9. What the reader can expect to find in the body of the report
  10. The specific issues and challenges that arise owing to the use of microservices
  11. architecture for software development as opposed to those that arise in service-
  12. oriented architecture or monolithic application architecture
  13. Potential privacy issues that may arise owing to these security issues/challenges
  14. The reason for these issues/challenges and potential mitigations to manage the risk
  15. for both privacy and security
  16. The conclusion  will summarise any findings or recommendations that the report puts forward regarding the concepts covered in the report.

Reference no: EM133244619

Questions Cloud

Show the effect of rsvp on the voice application : IT Technical University of Malaysia, Analyze the graph we obtained in this lab. Show the effect of RSVP on the Voice application and explain the obtained
Benefits of creating and maintaining an information : IT 123 Pennsylvania State University Provides a brief but comprehensive overview of the goals and objectives of the information assurance plan
List three security controls that you employ to protect : Find and describe an example from the press (or elsewhere) of an organization that has suffered a major security breach
Provide a short summary of the main message : The Super Mario Effect - Provide a short summary of the main message and identify which types of support material this speaker(s) used
Report focused on the specific challenges and issues : Write a report focused on the specific challenges and issues that arise owing to the use of microservices architecture as a software development philosophy
Security breaches threaten patient privacy : CSE Arizona State University, Security breaches threaten patient privacy when confidential health information is made available to others
Develop list that highlight five type of departmentalization : Please develop a list that highlights the five types of departmentalization (Functional, Process, Customer, Product, and Geographic)
How you have recently used the availability heuristic : Give an example of how you have recently used the availability heuristic. What can you do to avoid this in the future
Thoughts reflecting on what coaching is : HPRO 106 College of Health Care Professions, Discuss in detail your thoughts reflecting on what coaching is? Explain the types of coaching and why are many

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd