ISOL 536 UC Computer Science Business Logical Data Analysis

User Generated

Rzcrebe2020

Computer Science

ISOL 536

University of the Cumberlands

ISOL

Description

Hi,

Need help with answers for attached questions. Figure 8.1 attached in document.

1.Minimum of 600 words

Assignment should be in APA format and have to include at least two references.

Figure 8.1 Business analytics logical data flow diagram (DFD).

Consider the data flow “octopus,” as shown in Figure 8.1. How can the analysis system gather data from all these sources that, presumably, are protected themselves?

2.Minimum of 600 words

Assignment should be in APA format and have to include at least two references.

  1. If an attacker can retrieve the API and libraries, then use these to write an agent, and then get the attacker’s agent installed, how should Digital Diskus protect itself from such an attack? Should the business analytics system provide a method of authentication of valid agents in order to protect against a malicious one? Is the agent a worthy attack surface?

thank you.

Unformatted Attachment Preview

Security Architecture and Design 1.Minimum of 600 words Assignment should be in APA format and have to include at least two references. Figure 8.1 Business analytics logical data flow diagram (DFD). Consider the data flow “octopus,” as shown in Figure 8.1. How can the analysis system gather data from all these sources that, presumably, are protected themselves? 2.Minimum of 600 words Assignment should be in APA format and have to include at least two references. 1. If an attacker can retrieve the API and libraries, then use these to write an agent, and then get the attacker’s agent installed, how should Digital Diskus protect itself from such an attack? Should the business analytics system provide a method of authentication of valid agents in order to protect against a malicious one? Is the agent a worthy attack surface?
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello, the paper is ready and well done. It was great working with you. All the best and welcome again.

Running Head: COMPUTER SCIENCE

Computer Science
Student’s Name:
Institutional Affiliation:

1

COMPUTER SCIENCE

2
Security Architecture and Design

Question 1: Business Analytics Logical Data Flow Diagram

Mainly, the figure shows the business analytics logical data flow diagram from business
analysis architecture. In that regard, the data elements in this diagram should be secured in line
with enterprise components that are not integrated directly with the intelligence system and
business analytics. The architecture used in the data flow diagram should enhance the protection
of data elements to access and interact with other components.
The first approach of gathering data for the business analytics system is by storing the
credentials for each of the secured data components. Thus, the storage of data components in a
secure manner will enhance the accessibility of data records that are protected by themselves.
The approach will be a significant thing that the business analytics system will have the power

COMPUTER SCIENCE
and the right to gather data from various sources (Aleryani, 2016). Secondly, the analytics
system will gather data from various sources in a secure manner to prevent other users from
logging into the system. However, the approach will expose analytic data systems into a difficult
situation when storing the credentials to a secure place. Thus, if it is possible to log into the
system, then it will be easy to gather data from these sources, thereby allowing business analytics
to perform almost any of the operations using business analytics logical flow diagram.
The analysis system used in gathering data from various sources is another fundamental
approach...


Anonymous
I use Studypool every time I need help studying, and it never disappoints.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags