1) Discussion:
Since we know that this particular instance of the AppMaker implements a customer-facing store that processes financial transactions, how does that influence which threat agents may be interested in attacking it?
Requirements:
2) Assignment:
Attached Document with Requirements. (Need Conclusion too.)
Let me know if you have any questions.
Text Book:
Schoenfield, Brook S.E. – Securing Systems: Applied Security Architecture and Threat Models, CRC Press, 2014 ISBN: 978-1-4822-3397-1
3) Discussion (Emerging Threats and CounterMeasures)
In today’s world, both government and the private sector are struggling to provide a secure, efficient, timely, and separate means of delivering essential services internationally. As a result, these critical national infrastructure systems remain at risk from potential attacks via the Internet.
It is the policy of the United States to prevent or minimize disruptions to the critical national information infrastructure in order to protect the public, the economy, government services, and the national security of the United States.The Federal Government is continually increasing capabilities to address cyber risk associated with critical networks and information systems.
Please explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.
Requirements:
APA Format
2 References
Instructor: Dr. < Your Name >
Class: ISOL536-Security Architecture and Design
Assignment: Week 3 Individual Assignment 3
Length: Minimum of 600 words
Total points: 40 points
Due date: Sunday, January 26, 2020
Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.
Using Figure 5.4 as the target architecture, who are the threat agents who will be most interested in attacking Web applications created through AppMaker?