security architecture amp design week 12

I need 4 different Documents as TWO for the discussion and the other TWO for the Assignment and both should be STRICTLY PLAGIARISM FREE.

DISCUSSION TOPIC: 1

Length: Minimum of 750 words
Total points: 10 points

Students will be required to create 1 new thread, and provide substantive comments on at least 3 threads created by other students. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Question:
Architecture and design represent one important side of delivering a security posture. That’s what this book is all about: How does one go about achieving an architecture and an architectural design that represent the security needs for a system ?

DISCUSSION TOPIC: 2

Length: Minimum of 750 words
Total points: 10 points

Students will be required to create 1 new thread, and provide substantive comments on at least 3 threads created by other students. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Question:
Why do good requirements go bad? What can be done to prevent things from going bad?




ASSIGNMENT TOPIC: 1

Length: Minimum of 600 words

Total points: 10 points

Submission Title: [yourname]_ISOL536_Spring2020Main_Week12_Assignment.docx


Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

In today’s fast-paced, often “agile” software development, how can the secure design be implemented?

ASSIGNMENT TOPIC: 2

Length: Minimum of 600 words

Total points: 10 points

Submission Title: [yourname]_ISOL536_Spring2020Main_Week13_Assignment.docx


Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Provide your thoughts and understanding of requirements:
1. Who consumes requirements?
2. Getting security requirements implemented.
3. Why do good requirements go bad?

ASSIGNMENTS & DISCUSSIONS BOTH SHOULD BE STRICTLY PLAGIARISM FREE

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *