Analyse and evaluate moral and ethical considerations

Assignment Help Management Information Sys
Reference no: EM132869723

MIS603 Microservices Architecture - Torrens University

Assessment - Privacy and Security Report

Learning Outcome 1: Analyse and evaluate moral and ethical considerations in specific security and privacy issues while transitioning to new technologies.

Task Summary
You are required to research and write a report focused on the specific challenges and issues that arise owing to the use of microservices architecture as a software development philosophy. The report length is 1500 words (+/- 10%). You are also required to identify and include risk mitigation strategies that can be applied to minimise privacy and security risk in microservices-architected environments.

Context
Microservices architecture signals a shift from monolithic software applications architecture to different microservices architected to address different functions. Not only is there a shift in how distribution of services impacts on managing security but hosting of services on cloud platforms not owned by the organisation, and the use of communication channels between services adds complexity to managing security.
Equally, additional complexity is provided through the rapid and incremental software development principles associated with Agile and DevOps methods. The organisation as an enterprise has several moral, ethical, and legal obligations regarding privacy and the security of information.
The purpose of this report is to engage you in building knowledge about privacy and security issues with a specific focus on how these manifest in a microservices-architected environment. You are also required to identify and discuss mitigations available to better manage privacy and security risk for the organisation in relation to microservices architecture. Irrespective of your future role, many organisations make it clear that privacy and security is every employee's concern.

Task Instructions

1. Write a 1500-word report focused on the specific challenges and issues that arise owing to the use of microservices architecture as a software development philosophy. Identify and include risk mitigation strategies that can be applied to minimise privacy and security risk in microservices-architected environments.

2. Whilst this is not a continuation of the case covered in Assignment 1 Part B, you might have developed insights when completing the Assessment 1 Part B Case Study that can enrich this assessment. Please review your notes to ensure that you have identified any context-based insights from Assessment 1 Part B Case Study that can inform this assessment. Re-read any relevant readings and conduct additional research in the area of investigation and select five additional sources that will add value to your report in the relevant area of investigation.

3. Plan how you will structure your ideas for your report and write a report plan before you start writing.

4. The report should consist of the following structure:

A title page with the subject code and name, assignment title, student's name, student number, and lecturer's name.

The introduction (200-250 words) that will also serve as your statement of purpose for the report-this means that you will tell the reader what you are going to cover in your report. You will need to inform the reader of:
a. Your area of research and its context
b. The key concepts you will be addressing
c. What the reader can expect to find in the body of the report

The body of the report (1000-1100 words) will need to respond to the following:
a. The specific issues and challenges that arise owing to the use of microservices architecture for software development as opposed to those that arise in service- oriented architecture or monolithic application architecture
b. Potential privacy issues that may arise owing to these security issues/challenges
c. The reason for these issues/challenges and potential mitigations to manage the risk for both privacy and security

The conclusion (200-250 words) will summarise any findings or recommendations that the report puts forward regarding the concepts covered in the report.

5. Format of the report
The report should use font Arial or Calibri 11 point, be line spaced at 1.5 for ease of reading, and have page numbers on the bottom of each page. If diagrams or tables are used, due attention should be given to pagination to avoid loss of meaning and continuity by unnecessarily splitting information over two pages. Diagrams must carry the appropriate captioning.

6. Referencing
There are requirements for referencing this report using APA referencing style.

Attachment:- Privacy and Security Report.rar

Reference no: EM132869723

Questions Cloud

Which for social marketers comes in two forms : Explain how marketers in a selected organization use fear in messages for persuasion of their target audience. Evaluate the degree to which using fear in messag
How did corporations acquire the status of a legal person : How did corporations acquire the status of a 'legal person'? How does corporate power affect democracy? In your description utilise the keywords: corporate soci
How does price discrimination fit into implementation : Mohammed, R. (2018) article expounds on the marketing and pricing strategy of market segmentation and pricing products/services based on segmentation of Good ,
Establish standardized processes and procedures : Toyota Way Fieldbook : A Practical Guide for Implementing Toyota's 4Ps
Analyse and evaluate moral and ethical considerations : Analyse and evaluate moral and ethical considerations in specific security and privacy issues while transitioning to new technologies
Compare external business environment of two companies : Compare the external business environment of two companies (a fast-food restaurant and an insurance agency). Which external elements have the greatest impact on
Describe the role of government regulation and incentives : Describe the role of government regulation and incentives, as it relates to the concept of negative externalities created by business.
Briefly discuss the properties of scientific research : Briefly discuss the properties of scientific research Critically discuss the three Phases of International Research.
Marketing strategy of school supplies : What are some marketing strategy of school supplies and what are their marketing struggles due to pandemic?

Reviews

len2869723

4/27/2021 5:49:04 AM

PLEASE READ INTRO CAREFULLY. IF YOU REQUIRE ANY OTHER INFORMATION PLEASE LET ME KNOW !! THERE IS NO FURTHER INSTUCATION GIVEN RATHER THAN INTRO. THANKS

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd