Security architecture and design

Assignment Help Other Subject
Reference no: EM132561166

Security Architecture and Design

The purpose of this midterm assignment is for you to demonstrate your in-depth understanding of the security concepts covered thus far in this course. This assignment is a paper that both answers the listed questions and ties together concepts from different chapters.

A summary of the concepts for each chapter is provided below. They are a further condensed version of the summary provided on pages 173-76 in your textbook. Be sure to use these concepts in your answers to the below questions. As you answer the questions, remember that you are writing a developed, academic paper. Do not be too concise or number your answers. Write long, developed paragraphs covering the answer, applying concepts from the textbook, and adding examples and explanations to show your in-depth knowledge.

The Questions:

1. List and describe the required tools needed for an effective assessment. What are some common mistakes and errors that occur when preparing for a security assessment?

2. Describe in depth the role in which organizational risk tolerance plays in relation to systems under assessment.

3. Identify and describe what threat agents should be avoided in preparation for an assessment. How do we effectively screen out irrelevant threats and attacks in this preparation?

4. Identify when to use architecture representation diagrams and communication flows. Define and illustrate when decomposing of architecture would be used. Provide an example of architecture risk assessment and threat modeling.

The Concepts:

What follows is a summary of the major concepts from the first six chapters of the textbook. You will use these concepts in answering the questions. The first five chapters of the textbook set the context and foundation for the security assessment and threat modeling for any type of system. System as defined is not only the implementation of software (code) but any type of digital system integration and deployment. Architecture risk assessment is mandated within standards and by organizations.

A continuing increase in sophistication and complexity of attackers means that flaws in architecture, missed security features and weak designs continue to put digital systems at risk.

Chapter 1- Architecture Risk Assessment (ARA) threat modeling has been defined as it applies to security architecture. Also addressed is a body of knowledge and a practice for applying security to systems of all types and sizes.

Chapter 2- defines what a system assessment for security is. It shows multiple examples and addresses the 3 Ss, namely Strategy, Structures, and Specification.

Chapter 3- explores the art of security architecture as a practice. Narrowly defined security architecture to the confines of the task at hand: ARA and threat modeling.

Chapter 4- addresses risk as it relates to the attack, breach, or compromise of digital systems. Providing concepts and constructs with direct applicability to system assessment and threat models. Also credible attack vectors (CAV), a construct for quickly understanding whether an attack surface is relevant or not.

Chapter 5- is devoted to the lightweight ARA/threat modeling methodology ATASM. The acronym stands for architecture, threats, attack surfaces, and mitigations. Chapter 5 demonstrates how to apply ATASM to a fictional e-commerce website.

Chapter 6- finishes examining the security architecture and the ATASM process for the fictional e-commerce website.

Reference no: EM132561166

Questions Cloud

Difference between magnitude and intensity of earthquake : What is an earthquake and what causes earthquakes to happen? What is the difference between magnitude and intensity of an earthquake?
Give the phenotypes of the genotype : The presence of at least one copy each of R and S produces red. The presence of one or the other allele
Analyze the roots of public health nursing : Analyze the roots of public health nursing and its influence on practice today. What significant changes or historical events have made public health.
Will result in a higher or a lower break-even point : If the variable expenses per unit increase as a percentage of the selling price, will it result in a higher or a lower break-even point? Why?
Security architecture and design : What are some common mistakes and errors that occur when preparing for a security assessment?
What impact does given have on the community as a whole : The CDC and Healthy People 2020 continue to educate on the importance, the improved ease of access and insurance coverage for screenings and vaccinations.
What are the three important of elisa : What are the three important of ELISA? Explain each
How shall be accounted for : If the net realizable value of the by-product of a joint production process is significant, how shall it be accounted for?, The net realizable value
Determine of cost allocation ratio : Determine of cost allocation ratio. Hypothetical market value or approximated net realizable value approach and Market value at split-off approach

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd