Plan how you will structure your ideas for your report

Assignment Help Case Study
Reference no: EM132690234

MIS603 Microservices Architecture - Torrens University

Assessment - Privacy and Security Report

Learning Outcome 1: Analyse and evaluate moral and ethical considerations in specific security and privacy issues while transitioning to new technologies.

Task Summary
You are required to research and write a report focused on the specific challenges and issues that arise owing to the use of microservices architecture as a software development philosophy. The report length is 1500 words (+/- 10%). You are also required to identify and include risk mitigation strategies that can be applied to minimise privacy and security risk in microservices-architected environments.

Context
Microservices architecture signals a shift from monolithic software applications architecture to different microservices architected to address different functions. Not only is there a shift in how distribution of services impacts on managing security but hosting of services on cloud platforms not owned by the organisation, and the use of communication channels between services adds complexity to managing security.
Equally, additional complexity is provided through the rapid and incremental software development principles associated with Agile and DevOps methods. The organisation as an enterprise has several moral, ethical, and legal obligations regarding privacy and the security of information.
The purpose of this report is to engage you in building knowledge about privacy and security issues with a specific focus on how these manifest in a microservices-architected environment. You are also required to identify and discuss mitigations available to better manage privacy and security risk for the organisation in relation to microservices architecture. Irrespective of your future role, many organisations make it clear that privacy and security is every employee's concern.

Instructions

1. Write a 1500-word report focused on the specific challenges and issues that arise owing to the use of microservices architecture as a software development philosophy. Identify and include risk mitigation strategies that can be applied to minimise privacy and security risk in microservices-architected environments.

2. Whilst this is not a continuation of the case covered in Assignment 1 Part B, you might have developed insights when completing the Assessment 1 Part B Case Study that can enrich this assessment. Please review your notes to ensure that you have identified any context-based insights from Assessment 1 Part B Case Study that can inform this assessment. Re-read any relevant readings and conduct additional research in the area of investigation and select five additional sources that will add value to your report in the relevant area of investigation.

3. Plan how you will structure your ideas for your report and write a report plan before you start writing.

4. The report should consist of the following structure:

A title page with the subject code and name, assignment title, student's name, student number, and lecturer's name.

The introduction (200-250 words) that will also serve as your statement of purpose for the report-this means that you will tell the reader what you are going to cover in your report. You will need to inform the reader of:
a. Your area of research and its context
b. The key concepts you will be addressing
c. What the reader can expect to find in the body of the report

The body of the report (1000-1100 words) will need to respond to the following:
a. The specific issues and challenges that arise owing to the use of microservices architecture for software development as opposed to those that arise in service- oriented architecture or monolithic application architecture
b. Potential privacy issues that may arise owing to these security issues/challenges
c. The reason for these issues/challenges and potential mitigations to manage the risk for both privacy and security

The conclusion (200-250 words) will summarise any findings or recommendations that the report puts forward regarding the concepts covered in the report.

5. Format of the report
The report should use font Arial or Calibri 11 point, be line spaced at 1.5 for ease of reading, and have page numbers on the bottom of each page. If diagrams or tables are used, due attention should be given to pagination to avoid loss of meaning and continuity by unnecessarily splitting information over two pages. Diagrams must carry the appropriate captioning.

6. Referencing
There are requirements for referencing this report using APA referencing style and it is expected that you reference any lecture notes used and five additional sources in the relevant subject area based on readings and further research.

References in APA style

Attachment:- Microservices Architecture.rar

Reference no: EM132690234

Questions Cloud

SEC4206 Fundamentals in Networking : SEC4206 Fundamentals in Networking Assignment Help and Solution, HND in Computing / Network Engineering - Assessment Writing Service
Explore data management techniques and apply : Explore data management techniques and apply when and where applicable and Analyse and apply data issues in an organisational context.
Develop and implement the capstone project : Develop, and implement the capstone project approved by your course instructor. You will compile the information for your solution into a report
Discuss belief in the domain of human resource management : A well placed employee will be an asset to the organization. Proper placement makes the employee happy and reduces absenteeism and labor turnover.
Plan how you will structure your ideas for your report : Research and write a report focused on the specific challenges and issues that arise owing to the use of microservices architecture as a software development
Discussing the issue of motivating employees : Compare how two companies, within the same industry, approach a specific business issue in the workplace. Acceptable issues
What are some of the advantages of online recruiting : What are some of the advantages of online recruiting as opposed to traditional recruiting? What are some of the disadvantages of using Zip recruiter.
Create a mathematical model of the time-dependent volume : Create a mathematical model of the time-dependent volume of water in the container V(t) in terms of the height of water h(t).
Describe the process of electron transport : Describe the process of electron transport. Where do the electrons come from, and what does the sent energy do?

Reviews

len2690234

11/7/2020 5:00:26 AM

i want to attached case study for my previous assement but i can not attached 2 files here can u plz let me knw how to attach also i need references in APA style

Write a Review

Case Study Questions & Answers

  Advice to hotrod ceo on the strategies to implement

PRS303 Hotrod and the Case of the Lethal Floor mats Case Study. Write a Press Release that conveys this information and includes all of the elements of a good press release. Provide advice to Hotrod's CEO and senior management on the strategies to i..

  Research on two recent australian cases

Research on two recent Australian cases (not more than 10 years old) involving consumer protection laws. Write a report outlining the following: Case introduction, Outline the Trade Practices Act / Australian Competition and Consumer Act have been br..

  Global investment case

What do you think would be the key underlying factor that would have the most influence on the profits earned in Brazil as a result of the joint venture?

  Calculate the contribution per mile and total contribution

Calculate the contribution per mile and total annual contribution associated with accepting FHP's proposal. What do you recommend

  Policy analysis hi i have policy analysis about the impact

hi ltbrgt ltbrgti have policy analysis about quotthe impact of coverage of lactation consultants on medicaid spending

  What was the principal innovation of the ibm system

How did time-sharing give more organizations access to electronic digital computers in the 1960s and In what way did the Cold War accelerate the development of technology needed for the personal computer?

  Summarize what pixar says makes their braintrust

Summarize what Pixar says makes their braintrust. List the characteristics and how it works. Where did it come from, why does it work for Pixar.

  Calculate the present value

Compute and show your work for the following scenarios: Calculate the present value of the following lump sums: $100,000 to be received five years from now with a 5% annual interest rate

  Write a differential diagnosis of disorders

Why is it that the later in age this disease manifest itself, the less severe the disease is and what tests would you run to clarify your differential and potentially come to a definitive diagnosis?

  Discuss fitbits differentiation strategy

Evaluate the FITBIT's environment using PESTEL elements.- Discuss FITBIT's differentiation strategy.- Describe FITBIT's positioning strategy in comparison to its competitors.

  Discuss likely diagnoses from the clinical picture

MEDN61030 Immunodeficiency and Immunotherapy assignment What component of the immune system may be defective and Discuss likely diagnoses from the clinical picture.

  Exercises - designing three levels of intervention

Look at the four cases below and decide how you would intervene on three levels: the personal (micro), the contextual or social context immediately surrounding

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd