Written Assignment and Discussion

User Generated

Avpxynhf5124

Writing

Security Architecture and Design

Description

Hello I need help with 2 tasks below:

Written Assignment:

Task 1: In approximately 350 words, answer the question below. Follow APA guidelines.

Question:

Describe how you might define security requirements to align with a kind environment or a wicked environment. Explain your rationale.

Discussion:

Task 2: Please write at-least two paragraphs (In approximately 350), write discussion on question below. Follow APA guidelines.

Question:

What assumptions should we make when designing or using cryptography in systems?

Note: I need two separate documents for both the tasks and please mentioned References for both the task 1 and task 2.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: SECURITY REQUIREMENTS IN DIFFERENT ENVIRONMENTS

Security Requirements in Different Environments
Name
Institutional Affiliation

1

SECURITY REQUIREMENTS IN DIFFERENT ENVIRONMENTS

2

Security risks are ever constant and as such, security experts are tasked with always
trying to assess risk environments as either being kind or wicked. They should always be
prepared because they do not know the type of risk that awaits them. It is important to identify
this as it helps one to determine how robust the security requirements are for each situation. A
wicked environment is one which presents security requirements that are difficult to solve and
describe while a kind environment means it’s easier to identify threats and as such identify the
best ways to solve or curb the threat. Many systems today are more complex and as such looking
for threats that may cause vulnerability to the system means that one can come with numerous
threats that seem impossible to fully manage.
When defining se...


Anonymous
Great content here. Definitely a returning customer.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4

Similar Content

Related Tags