Question

In: Economics

1. Enterprise Architecture analysis and design model 2. How to collect the pattern or significant feature...

1. Enterprise Architecture analysis and design model

2. How to collect the pattern or significant feature of security architecture?

3. How to setup the weighting and rating for security architecture parameters?

Solutions

Expert Solution

1)

Making a model a reference

The main difficulty of an enterprise architecture model is its constant evolution, and consequently its permanent update. Unlike building plans, which we can assume will remain stable over a very long period of time, enterprise architecture models quickly become obsolete if they are not updated. The organization, IS, procedures, business, and goals are constantly evolving, making it essential to rework models in order to reflect changes.

The situation can deteriorate very quickly. If analysts or architects do not trust in the relevance of existing models, the pressure of deadlines may force them into rebuilding models ad hoc, focusing on the requirements of the moment, which are even more short-lived. Worse still, they may decide to do without models altogether, in order to continue on to the actual realization of projects. If this happens, the enterprise is back at square one, where knowledge is neither controlled nor recorded, but rather scattered across detailed realizations.

2)

[SFD1.1: 102] Integrate and deliver security features.

Rather than having each project team implement its own security features (e.g., authentication, role management, key management, logging, cryptography, protocols), the SSG provides proactive guidance by acting as or facilitating a clearinghouse of security features for engineering groups to use. These features might be discovered during SSDL activities, created by the SSG or specialized development teams, or defined in configuration templates (e.g., cloud blueprints) and delivered via mechanisms such as containers, microservices, and APIs. Generic security features often have to be tailored for specific platforms. For example, each mobile and cloud platform will likely need their own means by which users are authenticated and authorized, secrets are managed, and user actions are centrally logged and monitored. Project teams benefit from implementations that come preapproved by the SSG, and the SSG benefits by not having to repeatedly track down the kinds of subtle errors that often creep into security features

[SFD1.2: 76] Engage the SSG with architecture teams.

Security is a regular topic in the organization’s software architecture discussions, with the architecture team taking responsibility for security in the same way that it takes responsibility for performance, availability, scalability, and resiliency. One way to keep security from falling out of these discussions is to have an SSG member participate in architecture discussions. Increasingly, architecture discussions include developers and site reliability engineers governing all types of software components, such as open source, APIs, containers, and cloud services. In other cases, enterprise architecture teams can help the SSG create secure designs that integrate properly into corporate design standards. Proactive engagement by the SSG is key to success here. Moving a well-known system to the cloud means reengaging the SSG, for example. It’s never safe for one team to assume another team has addressed security requirements.


Related Solutions

1.define enterprise architecture as a capability in organisations 2. restate business architecture and how to support...
1.define enterprise architecture as a capability in organisations 2. restate business architecture and how to support the business to deliver strategic business outcomes 3. Demonstrate an understanding of the components of the CSVLOD Model of Enterprise Architecture: considerations, standards, visions, landscapes, outlines and designs. 5. Review and evaluate how Governments’ use enterprise architecture to deliver citizen services 6. evaluate and investigate key trends impacting organisations today and how enterprise architects respond to these trends. can you make a essay including...
Enterprise Architecture Discuss the impact of Enterprise Architecture changes in any business process model. Especially on...
Enterprise Architecture Discuss the impact of Enterprise Architecture changes in any business process model. Especially on the aspect of outsourcing. [20 marks] 1.5 pages or 200 words.
Federal Enterprise Architecture Framework (FEAF) 2. In what area the architecture framework is used? 3. How...
Federal Enterprise Architecture Framework (FEAF) 2. In what area the architecture framework is used? 3. How to use the architecture framework? 4. What are the advantages and disadvantages of the architecture framework? 5. Select a minimum of 10 articles (journals or conference paper) published 5 years back. Analyze the articles. Identify and discuss what researches have been done related with architecture framework in the software design and architecture. You can summarize the analysis in a table.
1. Define introspection and discuss purpose/function. 2. What is the feature-analysis model and identify the problems...
1. Define introspection and discuss purpose/function. 2. What is the feature-analysis model and identify the problems associated with it. 3. Define divided and selective tention. how do they differ? 4. What are the characteristics of short-term and long-term memory? how do they differ?
SAS Enterprise Miner Exersice Chapter 8 – Pattern Discovery Association 1.   Conducting an Association Analysis A store...
SAS Enterprise Miner Exersice Chapter 8 – Pattern Discovery Association 1.   Conducting an Association Analysis A store is interested in determining the associations between items purchased from the Health and Beauty Aids Department and the Stationery Department. The store chose to conduct a market basket analysis of specific items purchased from these two departments. The TRANSACTIONSdata set contains information about more than 400,000 transactions made over the past three months. The following products are represented in the data set: bar soap...
1. how to collect useful data online for analysis that will be relevant to a busness?...
1. how to collect useful data online for analysis that will be relevant to a busness? 2. what type of incentive can a buseness offer to get people to respond to surveys truefully? 3. what are some ways that less well known companies can overcome trust issues when collecting data to gain insight? 4. pros and cons to sample size? 5. how does "level of confidence: affect sample size?
1.Describe a design pattern that incents good security behavior. 2.Design a hash function that uses any...
1.Describe a design pattern that incents good security behavior. 2.Design a hash function that uses any desired date as the salt. Demonstrate operation of the function, including input values. Describe benefits and shortcomings of the hash function.
Software Design When is the model-view-controller pattern better than the client-server pattern? Why? Justify your answer.
Software Design When is the model-view-controller pattern better than the client-server pattern? Why? Justify your answer.
What will the generic confounding pattern be for a 2^5-2 (resolution III) experiment design?
What will the generic confounding pattern be for a 2^5-2 (resolution III) experiment design?
What is the drawback of using the step_wise model in multiple linear regression? How is feature...
What is the drawback of using the step_wise model in multiple linear regression? How is feature importance addressed in decision trees? Is there a guarantee that an ensemble method always outperforms a simple decision tree? Elaborate on your answer.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT