Report focused on the specific challenges and issues

Assignment Help Computer Engineering
Reference no: EM133244619

Case: A report focused on the specific challenges and issues that arise owing to the use of microservices architecture as a software development philosophy. The report length is. You are also required to identify and include risk mitigation strategies that can be applied to minimise privacy and security risk in microservices-architected environments.

Context

Microservices architecture signals a shift from monolithic software applications architecture to different microservices architected to address different functions. Not only is there a shift in how distribution of services impacts on managing security but hosting of services on cloud platforms not owned by the organisation, and the use of communication channels between services adds complexity to managing security.

Equally, additional complexity is provided through the rapid and incremental software development principles associated with Agile and DevOps methods. The organisation as an enterprise has several moral, ethical, and legal obligations regarding privacy and the security of information.

The purpose of this report is to engage you in building knowledge about privacy and security issues with a specific focus on how these manifest in a microservices-architected environment. You are also required to identify and discuss mitigations available to better manage privacy and security risk for the organisation in relation to microservices architecture. Irrespective of your future role, many organisations make it clear that privacy and security is every employee's concern.

Task

  1. Write a report focused on the specific challenges and issues that arise owing to the use of microservices architecture as a software development philosophy. Identify and include risk mitigation strategies that can be applied to minimise privacy and security risk in microservices-architected environments.
  2. Whilst this is not a continuation of the case covered in Assignment 1 Part B, you might have developed insights when completing the Assessment 1 Part B Case Study that can enrich this assessment. Please review your notes to ensure that you have identified any context-based insights from Assessment 1 Part B Case Study that can inform this assessment. Re-read any relevant readings and conduct additional research in the area of investigation and select five additional sources that will add value to your report in the relevant area of investigation.
  3. Plan how you will structure your ideas for your report and write a report plan before you start writing.
  4. The report consist of the following structure:
  5. A title page with the subject code and name, assignment title, student's name, student number, and lecturer's name.
  6. The introduction that will also serve as your statement of purpose for the report-this means that you will tell the reader what you are going to cover in your report. You will need to inform the reader of:
  7. Your area of research and its context
  8. The key concepts you will be addressing
  9. What the reader can expect to find in the body of the report
  10. The specific issues and challenges that arise owing to the use of microservices
  11. architecture for software development as opposed to those that arise in service-
  12. oriented architecture or monolithic application architecture
  13. Potential privacy issues that may arise owing to these security issues/challenges
  14. The reason for these issues/challenges and potential mitigations to manage the risk
  15. for both privacy and security
  16. The conclusion  will summarise any findings or recommendations that the report puts forward regarding the concepts covered in the report.

Reference no: EM133244619

Questions Cloud

Show the effect of rsvp on the voice application : IT Technical University of Malaysia, Analyze the graph we obtained in this lab. Show the effect of RSVP on the Voice application and explain the obtained
Benefits of creating and maintaining an information : IT 123 Pennsylvania State University Provides a brief but comprehensive overview of the goals and objectives of the information assurance plan
List three security controls that you employ to protect : Find and describe an example from the press (or elsewhere) of an organization that has suffered a major security breach
Provide a short summary of the main message : The Super Mario Effect - Provide a short summary of the main message and identify which types of support material this speaker(s) used
Report focused on the specific challenges and issues : Write a report focused on the specific challenges and issues that arise owing to the use of microservices architecture as a software development philosophy
Security breaches threaten patient privacy : CSE Arizona State University, Security breaches threaten patient privacy when confidential health information is made available to others
Develop list that highlight five type of departmentalization : Please develop a list that highlights the five types of departmentalization (Functional, Process, Customer, Product, and Geographic)
How you have recently used the availability heuristic : Give an example of how you have recently used the availability heuristic. What can you do to avoid this in the future
Thoughts reflecting on what coaching is : HPRO 106 College of Health Care Professions, Discuss in detail your thoughts reflecting on what coaching is? Explain the types of coaching and why are many

Reviews

Write a Review

Computer Engineering Questions & Answers

  Describe the complex email system

Describe the complex email system located on slide 12 from the slide deck from week 6 titled "Example of a Complex Hybrid System." (It is also attached).

  Linux versus microsoft windows server

Develop an 8- to 10-slide Microsoft PowerPoint presentation for the executive team at your selected Virtual Organization. The presentation must do the following

  How do you describe the importance of data in analytics

How do you describe the importance of data in analytics? Can we think of analytics without data? Explain. Considering the new and broad definition of business.

  Read about role base access control models

Look at the XACML operational model that is claimed to be a generic RBAC implementation. Do you agree with the last statement?

  List one or two concepts that you learned

List one or two concepts that you learned from this tutorial. Open your file in Notepad and print the source code for the page.

  Discuss the challenges of maintaining information security

Discuss the challenges of maintaining information security at a remote recovery location. The response must be typed.

  How cloud computing relevant to your current or future job

Write a 2-3 page double space paper about how cloud computing is relevant to your current or future job. The response must be typed.

  Why TAMTEX would benefit by using cloud storage

Cloud Computing and Virtualisation Questions - Provide one reason why TAMTEX would benefit by using cloud storage

  Discuss the impact of it issues on organizational values

Briefly, discuss the impact of IT issues on organizational and national values. Cite an example from your work. The chapter discusses "creating new types.

  Use a bubble sort algorithm in c++

use a Bubble Sort algorithm in C++ that generates a list of 10 random integers.

  Write a program that accepts positive integer from keyboard

Write a program that accepts a positive integer from the keyboard and then displays all integers from 1 up to that number, each on a separate line.

  Security team to help manage access controls

Is there a reason for Syslog administrators to have a dedicated resource on the security team to help manage access controls?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd