Security architecture-design-diving in and threat modeling

Assignment Help Basic Computer Science
Reference no: EM132369122

Security Architecture and Design

There is a checklist for "Diving in and Threat Modeling". But before you can do that, you have to fully understand what the checklist is asking you to do. After each checklist item, provide your own definition of what you think the question means.

1. Can we tell a story without changing the diagram?

Assignment: Explain what this question means to you? And then provide your answer to the question of why or why not.

2. Can we tell that story without using words such as "sometimes" or "also?

Assignment: Explain what this question means to you? And then provide your answer to the question of why or why not.

3. Can we look at the diagram and see exactly where the software will make a security decision? Explain what this question means to you? And then provide your answer to the question.

Assignment: Explain what this question means to you? And then provide your answer to the question of why or why not.

4. Does the diagram show all the trust boundaries, such as where different accounts interact? Do you cover all UIDs, all application roles, and all network interface?

Assignment: Explain what this question means to you? And then provide your answer to the question of why or why not.

5. Does the diagram reflect the current or planned reality of the software?

Assignment: Explain what this question means to you? And then provide your answer to the question of why or why not.

6. Can we see where all the data goes and who uses it?

Assignment: Explain what this question means to you? And then provide your answer to the question of why or why not.

7. Do we see the processes that move data from one data store to another?

Assignment: Explain what this question means to you? And then provide your answer to the question of why or why not

Reference no: EM132369122

Questions Cloud

Analyze the given case study on security breach : Analyze the given case study on security breach. Recommend controls to avoid an enterprise security breach.
Discuss evolution of information governance in digital age : Search the Internet for information on "Information Governance" and discuss the evolution of Information Governance in the digital age.
Provide strategic planning recommendations for property : Suppose you lead a task force that is developing a simulation to provide strategic planning recommendations for property
Network connections-mobile devices and cloud services : Create a prescriptive section of your playbook providing guidelines to secure each of these areas. Network connections. Mobile devices.
Security architecture-design-diving in and threat modeling : Security Architecture and Design. There is a checklist for "Diving in and Threat Modeling". Does the diagram reflect the current or planned reality of software.
Delivering essential services internationally : The private sector are struggling to provide a secure, efficient, timely, and separate means of delivering essential services internationally.
Controls as either physical-administrative or technical : Identify each of the controls as either physical, administrative, or technical and either preventative, detective, or corrective
How would you go about determining accuracy : How would you ensure the highest level of accuracy with your simulation, and how would you go about determining accuracy?
Finding recent article about cyber security threats on news : Finding a recent article about Cyber security threats on the News. It has to be no older than 2 months and about Cyber security threats.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Model and you obtain the output

The expected signs of the coefficients are: ß10,ß3>0,ß4

  In economics what is meant by an oligopoly

What are some ways to make a distinction between an Oligopolistic Market and a Market identified as having Monopolistic Competition?

  Identify issues and troubleshooting steps covering

Create a 2.5- to 3-page troubleshooting document that is intended to become part of the internal knowledge base for IT staff members to reference when encountering issues. Your document should identify issues and troubleshooting steps covering the..

  Distinguish between a getrequest pdu and a setrequest pdu

In SNMP, which of the following PDUs are sent from a client SNMP to a server SNMP?

  Apply yen''s algorithm to find the shortest path from node 1

Apply Yen's alogithm to find the shortest paqth from node 1 to all

  Calculating debt ratio

(Calculating debt ratio) Fast Solutions, Inc. has the following financial structure:

  From time to time words become obsolete

One more requirement, from time to time words become obsolete. When this happens, such word must be removed from the dictionary. Your program must account for this also.

  Determining the metropolitan medical group

The Metropolitan Medical Group (MMG) merged with the Oak Grove Medical Group (OGMG). The Oak Grove Medical Group has four offices and owns the medical office building where their imaging and radiology lab and physical therapy and diagnostic labora..

  List and describe four categories of models

Q.1. List and briefly describe the steps of the AHP data mining process with an example that is not in your study material. Q.2. List and describe four categories of models. Give examples in each category.

  Explain the role of each p in software engineering

Effective software project management focuses on the four P's: people, product, process, and project. Explain the role of each P in software engineering.

  Conditions and requirements of application security

This seminal publication outlines a set of basic principles that define a logical way to classify and respond to threat. It also describes the critical things you should consider while building software. These underlying principles dictate the con..

  Explain movement on production possibilities frontier

Explain movement on production possibilities frontier, shifts in the curve of a PPF, costs along the curve of a ppf, and meaning of points on the graph of a PPF

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd