Sign In
Not register? Register Now!
Essay Available:
You are here: HomeEssayIT & Computer Science
Pages:
3 pages/≈825 words
Sources:
3 Sources
Level:
APA
Subject:
IT & Computer Science
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 16.2
Topic:

Security Architecture and Design (Essay Sample)

Instructions:

Chapter #1 Assignment
When should the Security architect begin the analysis?
What are the activities the architect must execute?
What is the set of knowledge domains applied to the analysis?
What are the tips and tricks that make security architecture risk assessment easier?
Answer the questions with an APA-formatted paper (Title page, body and references only). Your response should have a minimum of 500 words. Count the words only in the body of your response, not the references. A table of contents and abstract are not required.
A minimum of two references are required. One reference for the book is acceptable but multiple references are allowed. There should be multiple citations within the body of the paper. Note that an in-text citation includes author’s name, year of publication and the page number where the paraphrased material is located.
Your paper must be submitted to SafeAssign. Resulting score should not exceed 35%.
Course is Security Architecture & Design. focus on Security architect and Architecture

source..
Content:


Security Architecture and Design
Student's name
Course number
Instructor
Institution
Date
Security Architecture and Design
In organizational security controls and safeguards, security architecture and design examine how they are integrated with IT systems to preserve the confidentiality and integrity of the data utilized and stored within the systems. In any company that processes, transfers, and keeps data, security architecture and design are critical. Organizations can use it to meet the needs and hazards of computer applications and network infrastructures (Varadharajan et al., 2018). This architecture clearly outlines the security design concepts that should be applied and security control standards that are particular to the architecture in question.
When should the architect begin the analysis?
When it comes to security engineering, it can be a confusing process. Preventive, investigative, and restorative controls are used in security engineering to ensure the corporate foundation and applications. Some organizations make a better showing with security engineering by applying order regulations, comprising planning and technique. According to many data security experts with a traditional mindset, safety engineering is defined as using safety approaches, controls, devices, and looking at (Varadharajan et al., 2018). To know who confronts vulnerable targets, a protection outfitter must thoroughly understand a company's frameworks and procedures. After a comprehensive analysis, recommendations are provided to update and improve the security architecture using software and gadgets. Then, the client's arrangements and norms are set, checked, and adhered to. As the last step, countermeasures are installed to protect the PC system if an unauthorized purchaser tries to get in. Following the collection of these facts, the most significant part of the analysis is carried out.
What are the activities the architect must execute?
In addition to assessment and analysis, the architect should also be involved in the design, deployment, and management. An affiliation's data protection wishes are assessed and investigated by identifying weaknesses, hazards, and assets inside the association's gadgets, belonging, and seller connections (Wang et al., 2019). At the form and exhibiting level, approaches and model defense designs are created to meet the needs of a particular association or organization. As a result of the appraisal and evaluation stage, tactics will be developed with caution (Varadharajan et al., 2018). This stage involves setting up the previous tiers of security techniques, firmware, and devices. During the planning and showing stages, the means for implementing these safety measures are defined. It includes an all-time aid, guidance, and evaluation of the third-level security technology. In this stage, the safety framework's execution is reviewed, and any hiccups or failures will result in the security engineering being reexamined.
What is the set of knowledge domains applied to the analysis?
The expertise domain names carried out to the analysis are strategy know-how, shape records, and system specifics.
Strategy Knowledge
There are many ways in which strategic knowledge can be 'fitted' into various contexts: economic, social, geopolitical, organizational, scientific, and constitutional. It also contains an understanding of the complexity and complicated events, which is extremely important for success. Associations should no longer be concerned with the disgruntled consultant or the wise programmer (Wang et al., 2019). It is becoming increasingly difficult for organizations to keep aggregated data assets from fleeing their entry points due to the increasingly sophisticated and focused attacks.
 Data Structure
A statistics framework's architecture encompasses both hardware and software to answer administrations' remaining customers. The engineering represents a modernized framework's plan and substance (Wang et al., 2019). For example, the engineering may comprise a complete list of digital state, programming, and structures management capabilities; a depiction of long-term goals and needs for future purchases; and a strategy to upgrade and replace outdated equipment and programming.
Specifications of the System
It is a part of the business structure that primarily addresses informational system resilience and provides architectural

...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Report on Identity, Access, and Management
    Description: The Identify and access management (IAM) over years has been mainly focusing on managing and controlling information technology for user needs enterprises. As technology changes, different technologies including cloud, social networks, etc. Identity management become something to focus as many enterprises ...
    4 pages/≈1100 words| 5 Sources | APA | IT & Computer Science | Essay |
  • Understanding Computer Sciences and Information Technology
    Description: Information Technology acquisition s is thought about simple, quick and the most fantastic manner by which an association can address its issues. The acquisition system can be effective and can support a company's upper hand or, in other words, contain an advantage as to other companies. ...
    2 pages/≈550 words| 3 Sources | APA | IT & Computer Science | Essay |
  • Advantages And Disadvantages of Cloud Computing for Enterprise Resource Planning
    Description: Cloud computing refers to an infrastructure that enables on-demand delivery of the various services requested by the users; these users can be individual companies or organizations storing their data over the internet. Cloud computing has been implemented in multiple organizations and companies...
    1 page/≈275 words| 2 Sources | APA | IT & Computer Science | Essay |
Need a Custom Essay Written?
First time 15% Discount!