CS783 Tradeoff BW Centralized and Embedded Security

Question # 00642309
Subject: Education
Due on: 12/03/2022
Posted On: 12/03/2022 04:50 AM
Tutorials: 1
Rating:
4.9/5
Question Dot Image

CS 783 Waldorf University Tradeoff BW Centralized and Embedded Security Questions

introduction

Our course covers a number of important IT governance topics in the context of Enterprise Architecture, including security. One of the statements I make during the security lecture is: “Security should be baked into the cake, not bolted on as an afterthought.” My husband, the ex-English teacher and an avowed Luddite BTW, corrected me, stating that I was mixing my metaphors – i.e., I should have said “Security should be baked into the cake, not treated as icing on the cake.” While he is correct (he almost always is!), my phraseology is more harsh, perhaps better denoting the negative downstream consequences of treating cybersecurity as an afterthought. The “bolt on” approach is an excellent example of being reactive instead of proactive: The proactive approach, however, is an essential part of pursuing Enterprise Architecture as Strategy, the title of our course textbook, and of course, a major theme of our course.

Moreover, there is no better illustration of this principle than the internet, right? The internet grew organically from its original mission to enable researchers to collaborate more easily. It is a classic illustration of “enabling technology” – in the 1970’s and 1980’s, no one envisioned internet shopping, let alone Alexa! And security was definitely an afterthought.

One of the toughest challenges with Enterprise Architecture is to craft an architecture that can gracefully scale and adapt to change, while effectively utilizing governance processes and policies to ensure that your design principles are followed over time. For example, consider an architecture you carefully design using the event-driven model (see Software Architecture Patterns by Mark Richards) that disintegrates into spaghetti code after two years of maintenance by your IT staff because they didn’t understand your first principles!

Your Mission

This assignment will give you an opportunity to think about how the principles we have discussed could be leveraged to improve cybersecurity. Either choose Johnson & Johnson or the company that is the subject of your Term Project as the architecture to use in order to design your security approach.

Deliverables

As a general guideline, you should cover at least a single sign-on scenario and a workflow we know well, such as the Order Fulfillment workflow from Assignment 3. You need to be specific about the exact technologies you propose to use for your solutions, e.g., JWTs, oAuth, etc.

  • Legacy applications
  • Greenfield applications using microservices
  • Testing, testing…
  • Policies, IT engagement model

Let’s say your EA has a profusion of legacy applications that have uneven/heterogeneous approaches to handling security. This hodgepodge has led to several data breaches over the past 3 years. Suggest some solutions where the legacy applications can remain in place, but the risk of data breach is greatly reduced. Be specific – use a workflow (or at least a partial workflow) from your Term Project or the Order Fulfillment workflow, and compare/contrast the situation before and after your security improvements are put in place. Your treatment does not have to be exhaustive, but the examples you use should be detailed and specific, not hand-waving.

Let’s say that your business in question 1 has decided to blow up and replace the old legacy applications with a microservices-based architecture. How would you approach a greenfield with microservices and bake security into the cake? Hint: Each microservice, or set of orchestrated microservices, will need to have security incorporated somehow. How could that be done? What would the downstream consequences be of your approach in terms of (1) system performance, (2) amount of code to maintain, and (3) system complexity?

How would you create a testing environment that would give good test coverage over the solution you propose in question 1 (i.e., after your security improvements) and what you have created for question 2? Give examples, explain and justify your recommendations.

There is a trend over the past few years to centralize security oversight in large corporations, leading to a fairly recent C-suite role of the CISO (Chief Information Security Officer, pronounced “see-so”). The CISO role is a separate role from CIO or CTO. Very recently, some large tech corporations, notably Facebook, have decided that the centralized approach isn’t working for them, and they have decided to pursue so-called “embedded” security, where the responsibility for security is pushed down into the development teams, and the CISO has left the company.

  • Describe the trade-off between centralized and embedded security, listing the pros and cons of each approach.
  • Say your company has adopted the embedded approach. As CIO, write a few paragraphs on the security policy you want the teams to follow in order to assure consistency and security in the enterprise architecture.  
Dot Image
Getsolution Posted By :
Questions: 14543 Tutorials: 14543
Tutorials for this Question

CS783 Tradeoff BW Centralized and Embedded Security

Tutorial # 00641189
Posted On: 12/03/2022 04:50 AM
Feedback Score: Not rated yet!
Purchased By: 2
Getsolution
Posted By:
Questions:
14543
Tutorials:
14543
Report this Tutorial as Inappropriate
Tutorial Preview
The solution of CS783 Tradeoff BW Centralized and Embedded Security...
Attachments
CS783_Tradeoff_BW_Centralized_and_Embedded_Security.ZIP (18.96 KB)

Great! We have found the solution of this question!

Related Questions
What technologies are used in your country to measure
Collect Liberia’s data and complete two chapters according to the template ? 1. Introduction 1.1. Purpose Statement The purpose of this project is to understand the use of technology an …
Policy Advocacy - You have been asked by the leadership
Option D: Policy Advocacy You have been asked by the leadership of a professional organization, of which you are a member, to spearhead a policy change within the organization that will affect your …
Internal Quality Management Team - The CEO of your health
Option C: Internal Quality Management Team The CEO of your health care organization is working with the CFO to enhance and expand the skilled nursing facility's quality management team. You mus …
Increasing Patients - The CEO of your health care organization
Option A: Increasing Patients The CEO of your health care organization has asked you to form a task force to increase the number of patients who access your community health center for primary care …
Discussion - Discuss two comments you heard from our panel
Discussion 1.Discuss two comments you heard from our panel that you found most valuable and useful that you may be able to apply to your internship(helping the government at senators office) or car …
Research the web and find an appropriate incident related
Research the web and find an appropriate incident related to either a successful or failed penetration testing effort, or a successful or unsuccessful hacking attempt against an organization, business …
Chemical Reaction and A Nuclear Reaction
Chemical Reaction and A Nuclear Reaction Questions 1. Which type of radiation consists of a fast stream of negatively charged particles? (2 points) alpha particles beta particles gamma …
What is a Normal Family - As a teacher or support staff member
What is a Normal Family?  As a teacher or support staff member you will work with many different families throughout your career. Our perception of family generally comes from our experiences …
Extra Credit Discussion - What are some takeaways
Extra Credit Discussion After reviewing this week's content, you may participate in this discussion for extra credit and learning. It will be worth up to 10 points depending on your p …
As part of the control phase of the improvement project
Part 1: A.  As part of the control phase of the improvement project, create a process control plan by doing the following: 1.  Define measures or key indicators that will be used to tr …
Recent Questions
Strayer LEG440 Week 5 Assignment Latest 2024
LEG440 Procurement and Contract Law Week 5 Assignment - Competition Requirements Overview The FAR Parts: Part 15 - Contracting by Negotiation: Subpart 15.2 - Solicitation and Receipt of P …
Strayer LEG440 Week 3 Assignment Latest 2024
LEG440 Procurement and Contract Law Week 3 Assignment - Contracting and the FAR Overview Part of the role of the FAR is to ensure taxpayer funds are properly managed in a way that protect …
Strayer LEG440 Week 4 Activity Case Study: Ethical Considerations Latest 2024
LEG440 Procurement and Contract Law Week 4 Activity - Case Study: Ethical Considerations Preparation Refer to the GSA National Capitol Region 4th Floor Total Workplace Case StudyLinks to an e …
Strayer LEG440 Week 2 Activity Case Study: Acquisition Planning Latest 2024
LEG440 Procurement and Contract Law Week 2 Activity - Case Study: Acquisition Planning Preparation Read the GSA National Capitol Region 4th Floor Total Workplace Case StudyLinks to an ext …
Strayer LEG440 Week 6 Discussion Latest 2024
LEG440 Procurement and Contract Law Week 6 Discussion - After Proposal Submission You are a contracting officer in your agency, tasked with reviewing contractor proposals. What are three …
Strayer LEG440 Week 5 Discussion Latest 2024
LEG440 Procurement and Contract Law Week 5 Discussion  - Price Evaluation You are a contracting officer in your agency, tasked with acquiring office equipment software. After the contrac …
Strayer LEG440 Week 4 Discussion Latest 2024
LEG440 Procurement and Contract Law Week 4 Discussion  - Winning a Government Contract Search the Internet for a news article on government contracting and explain the particular discuss …
Strayer LEG440 Week 3 Discussion Latest 2024
LEG440 Procurement and Contract Law Week 3 Discussion - Fairness of Obtaining a Government Contract Evaluate the level of fairness of the overall process of obtaining a government contract. …
Strayer LEG440 Week 2 Discussion Latest 2024
LEG440 Procurement and Contract Law Week 2 Discussion - The General Services Administration (GSA) Schedule Contract Go to the webpage Acquisition.govLinks to an external site.. Click Brow …
Strayer LEG440 Week 1 Discussion Latest 2024
LEG440 Procurement and Contract Law Week 1 Discussion - Introduction and Government Contracts Introduce yourself to your peers by sharing something unique about your background. Explain how …