University of The Cumberlands Security Architecture & Design Essay

User Generated

Punagv532

Writing

University of the Cumberlands

Description

Course Name: Security Architecture & Design

Textbook: Schoenfield, Brook S.E. – Securing Systems: Applied Security Architecture and Threat Models, CRC Press, 2014 ISBN: 978-1-4822-3397-1

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least three references

Consider the data flow “octopus,” as shown in Figure 8.1. How can the analysis system gather data from all these sources that, presumably, are protected themselves?

i am attaching fiigure to the question

Need atleast in Minimum of 600 words in APA format. Remember not to copy any content from any other source - all work needs to be your original work, but remember to also include citations

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: SECURITY ARCHITECTURE & DESIGN

Security Architecture & Design
Student’s Name
Institution Affiliation

1

SECURITY ARCHITECTURE & DESIGN

2

Security Architecture & Design
From figure 8.1, it is evident that the enterprise components are not directly connected
with business analytics. From the security architecture and design of figure 8.1, one can interpret
the components to be involved in the data mining business for Digital Diskus. Data mining can
be defined as the extraction of knowledge and information from data through the use of
technologies, which conform to the fundamental principles of data science. Such systems can be
used in various processes ranging from finance, sales, marketing, inventory, and other processes.
From the data flow diagram, there is a significant amount of data that is generated across
the system. For data mining to be possible, it must reach across the silos of data, so as to
correlate and get the chance to apply the analysis tool. In figure 8.1, the business intelligence
system will have to pull data from many sources. With most of the data sources being protected,
the analysis system has to use alternative means to access the data. Connection to the backend
databases will have to be utilized significantly in this case.
One way to make the connection possible is for the data analysis to make use of the
message bus to its advantage. The data analysis has to use the message bus as a listener to allow
for critical data to be captured when such data pass through the message bus. The data analysis
also has to use the message bus as a sender, so that it can be able to request the particular data
from the system. For this to be able, the data analysis has to connect some of the transactions...


Anonymous
I use Studypool every time I need help studying, and it never disappoints.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags