Security Architecture and Design
Require project report and Presentation
Save your time - order a paper!
Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlinesOrder Paper Now
check the attached document for detailed description
Security Architecture and Design Individual Project Require project report and Presentation check the attached document for detailed description No Plagiarism
Residency Make Up Session Assignment Course Security Architecture and Design Deliverable Individual Project Prepare a report to address all aspects of the assignment. This report should be at least 13 pages of content. You need to include outside sources and properly cite and reference your sources. You must have at least 15 references, 7 of which must be scholarly peer-reviewed articles. In addition to the 13 pages of content, you will want a title page and a reference sheet. This report needs to be in proper APA format. Paper Sections The following sections should be outlined as Headers in the paper. Introduction, thesis statement, overview, purposeBackground, discuss the history of the topic. Discussion, identify benefits, obstacles, and innovations. In conclusion, summarize the overall study and lessons learned. References, a minimum of five references with citations in the body. All written reports should be submitted in MS Word. The paper submission will use SafeAssign. Please use the proper Author, YYYY APA citations, with any outside content brought into the paper. Be prepared to present a 10-minute presentation on this assignment. Students must submit written assignments and presentation slides in the folder labeled “Makeup Assignment” in your iLearn course. Assignment Below are Residency Project examples by Faculty. Dr. Dawson Residency Project Perform a search in Google or in the school’s online library database for three or four companies that have been victims of STRIDE and privacy threats. The issues must have occurred within the past five years. Include: Company Name—type of company—Industry—Customers (consumer, business, or both) Type of threat What or (who) caused the threat How the threat was discovered How the threat was resolved How you believe the issue might have be avoided—third person; eg. One may argue; It may be concluded; Known repercussions from the threat (monetary, reputation, brand, customer loss, etc). Dr. Alhamdani Residency Project There are many security architecture modeling such as (Angelo, 2001) which focus on data in term of classification, Regulatory, change control; others look at the security functionalities as architecture (Harris, 2016); another approach presented in (Killmeyer, 2006) which look at the security architecture from the point of security program, this approach covers Security Organization Infrastructure, Security Policies, Standards, and Procedures, Security Baselines and Risk Assessments, Security Awareness and Training Program, Compliance. Other work looking at the security policies as a architecture modeling (wikibooks.org, 2017); many work been done on Enterprise Information Security Architecture (EISA) and some define the EISA as “process of instituting a complete information security solution to the architecture of an enterprise, ensuring the security of business information at every point in the architecture” (bestpricecomputers.co.uk, 2017). Some work based their security architecture as an extra layer to the information architecture layers where the (Dournaee, 2011). This work does not go with security as a layer added to the information architecture. Information architecture (IA) defined as” is the structural design of shared information environments; the art and science of organizing and labelling websites, intranets, online communities and software to support usability and findability; and an emerging community of practice focused on bringing principles of design and architecture to the digital landscape (wikipedia.org, 2017), and we do not look at the information security architecture from a single domain as it implementing in EISA case. There was a work to establish an understanding of information security architecture in (Thorn, Christen, Gruber, Portman, & Ruf, 2008) was defined security architecture based dependency as the highest level which drives the security architecture is the Business Strategy & Requirements which drive IT Strategy & Governance which itself drive the IT reference architecture. There are a separation between security architecture for a security program for an organization (which is primary focus for this work) and security architecture for a products or technology (Thorn, Christen, Gruber, Portman, & Ruf, 2008) such as security architecture for HP XP7 Device Manager Software, HP XP7 Tiered Storage Manager Software or IBM DB2 v12 for z/OS (Common-Criteria, 2017) or Java security architecture, GSS security architecture or CDMA) (Thorn, Christen, Gruber, Portman, & Ruf, 2008). You need to think and search to build a new methodology to understand to Information Security Architecture (ISA) as a complete independent architecture design stand by its own. You are not eliminating any other work or methodology that gives a new way to understand information security architecture. Bibliography Angelo, S. M. (2001). Security Architecture Model Component. Retrieved from https://www.sans.org/reading-room/whitepapers/basics/security-architecture-model-component-overview-526 bestpricecomputers.co.uk. (2017). Enterprise Information Security Architecture (from BPC, Articles and Glossary). Retrieved 2017, from http://www.bestpricecomputers.co.uk/glossary/enterprise-information-security-architecture.htm Common-Criteria. (2017). Certified Products. Retrieved 2017, from can be retrived from https://www.commoncriteriaportal.org/products/#AC Dournaee, B. (2011). How about a Security Layer? Retrieved 2017, from Can be retrived from https://software.intel.com/en-us/blogs/2011/02/10/how-about-a-security-layer Harris, S. (2016). Chapter 5 Security Models and Architecture. In CISSP Certification All-in-One Exam Guide (p. 186). McGraw-Hill Education; 7 edition (June 7, 2016). Killmeyer, J. (2006). Information Security Architecture An Integrated Approach to Security in the Organization (Second Edition). FL 33487-2742: Auerbach – Taylor & Francis Group, LLC. Thorn, A., Christen, T., Gruber, B., Portman, R., & Ruf, L. (2008, 9 2). information security society seussland: What is a Security Architecture?-v6.doc. Retrieved 1 1, 2018, from can be retrived from https://www.isss.ch/fileadmin/publ/agsa/Security_Architecture.pdf wikibooks.org. (2017, November 22). Security Architecture and Design/Security Models. (wikibooks.org) Retrieved 2017, from https://en.wikibooks.org/wiki/Security_Architecture_and_Design/Security_Models wikipedia.org. (2017, Dec). Information architecture. Retrieved 2017, from https://en.wikipedia.org/wiki/Information_architecture