Prepare a report to address all aspects of the assignment. This report should be no less than 10 pages of content. You need to include outside sources and properly cite and reference your sources. You must have at least 10 references, 5 of which must be scholarly peer-reviewed articles. In addition to the 10 pages of content, you will want a title page and a reference sheet. This report needs to be in proper APA format.
Paper Sections
The following sections should be outlined as Headers in the paper.
Introduction, thesis statement, overview, purpose
Background, discuss history of topic
Discussion, identify benefits, obstacles, innovations
Conclusion, summarize the overall study, lessons learned
References, minimum three references with citations in the body
All written reports should be submitted in MS Word. The paper submission will use SafeAssign. Please ensure to use the proper Author, YYYY APA citations with any outside content brought into the paper.
Be prepared to present a 10-minute presentation on this assignment.
Perform a search in Google or in the school’s online library database for three or four companies that have been victims of STRIDE and privacy threats. The issues must have occurred within the past five years.
Include:
Company Name—type of company—Industry—Customers (consumer, business, or both)
Type of threat
What or (who) caused the threat
How the threat was discovered
How the threat was resolved
How you believe the issue might have be avoided—third person; eg. One may argue; It may be concluded;
Known repercussions from the threat (monetary, reputation, brand, customer loss, etc).
Residency Make Up Session Assignment
Course |
ISOL536 – Security Architecture and Design |
Deliverable |
Individual Project Prepare a report to address all aspects of the assignment. This report should be no less than 10 pages of content. You need to include outside sources and properly cite and reference your sources. You must have at least 10 references, 5 of which must be scholarly peer-reviewed articles. In addition to the 10 pages of content, you will want a title page and a reference sheet. This report needs to be in proper APA format. Paper Sections The following sections should be outlined as Headers in the paper. Introduction, thesis statement, overview, purpose
All written reports should be submitted in MS Word. The paper submission will use SafeAssign. Please ensure to use the proper Author, YYYY APA citations with any outside content brought into the paper. |
Assignment |
Below are Residency Project examples by Faculty. Dr. Dawson Residency Project Perform a search in Google or in the school’s online library database for three or four companies that have been victims of STRIDE and privacy threats. The issues must have occurred within the past five years. Include: Company Name—type of company—Industry—Customers (consumer, business, or both) Type of threat What or (who) caused the threat How the threat was discovered How the threat was resolved How you believe the issue might have be avoided—third person; eg. One may argue; It may be concluded; Known repercussions from the threat (monetary, reputation, brand, customer loss, etc). Dr. Alhamdani Residency Project There are many security architecture modeling such as (Angelo, 2001) which focus on data in term of classification, Regulatory, change control; others look at the security functionalities as architecture (Harris, 2016); another approach presented in (Killmeyer, 2006) which look at the security architecture from the point of security program, this approach covers Security Organization Infrastructure, Security Policies, Standards, and Procedures, Security Baselines and Risk Assessments, Security Awareness and Training Program, Compliance. Other work looking at the security policies as a architecture modeling (wikibooks.org, 2017); many work been done on Enterprise Information Security Architecture (EISA) and some define the EISA as “process of instituting a complete information security solution to the architecture of an enterprise, ensuring the security of business information at every point in the architecture” (bestpricecomputers.co.uk, 2017). Some work based their security architecture as an extra layer to the information architecture layers where the (Dournaee, 2011). This work does not go with security as a layer added to the information architecture. Information architecture (IA) defined as” is the structural design of shared information environments; the art and science of organizing and labelling websites, intranets, online communities and software to support usability and findability; and an emerging community of practice focused on bringing principles of design and architecture to the digital landscape (wikipedia.org, 2017), and we do not look at the information security architecture from a single domain as it implementing in EISA case. There was a work to establish an understanding of information security architecture in (Thorn, Christen, Gruber, Portman, & Ruf, 2008) was defined security architecture based dependency as the highest level which drives the security architecture is the Business Strategy & Requirements which drive IT Strategy & Governance which itself drive the IT reference architecture. There are a separation between security architecture for a security program for an organization (which is primary focus for this work) and security architecture for a products or technology (Thorn, Christen, Gruber, Portman, & Ruf, 2008) such as security architecture for HP XP7 Device Manager Software, HP XP7 Tiered Storage Manager Software or IBM DB2 v12 for z/OS (Common-Criteria, 2017) or Java security architecture, GSS security architecture or CDMA) (Thorn, Christen, Gruber, Portman, & Ruf, 2008). You need to think and search to build a new methodology to understand to Information Security Architecture (ISA) as a complete independent architecture design stand by its own. You are not eliminating any other work or methodology that gives a new way to understand information security architecture. Bibliography |
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.