Description
Question 1: Go to the architecture of your favorite open source system. On the site, look for the architectural documentation for that system. What is there? What is missing? How would this affect your ability to contribute code to this project? (Chapter 18, question 1)
Question 2: Banks are justifiably cautious about security. Sketch the documentation you would need for an automatic teller machine (ATM) in order to reason about its security architecture. (Chapter 18, question 2)
Question 3: What is ATAM and what are some of its benefits? List the various steps involved in this process.
Question 4: A sender wishes to send a sensitive document (e.g. a legal contract) to a receiver. How can the receiver be certain of who created and sent the document?
Question 5: Can a firewall protect a private network against hackers trying to exploit critical information? Draw and describe how this can be achieved.
Unformatted Attachment Preview
Purchase answer to see full attachment