logo Use CA10RAM to get 10%* Discount.
Order Nowlogo
(5/5)

Consider blueprints in the building construction industry that guide the construction of a building,

INSTRUCTIONS TO CANDIDATES
ANSWER ALL QUESTIONS

Consider blueprints in the building construction industry that guide the construction of a building, the software architecture serves a blueprint that addresses technical concerns and programmatic issues of a project. In particular, it

 

- help refine the functional requirements, quality attribute requirements, and constraints

- help set and maintain expectations in stakeholders

- define the team structure

- aid in creating accurate project estimates

- establish the team vocabulary

- help identify technical risk early

- guide the creation of a more realistic and accurate production schedule

- assist in project tracking and oversight

- provide an early vision of the solution/system

 

Given the context of  technical concerns and programmatic issues above, technological components can have mismatch including processes, methods, and tools when we try to bring them together in an organization. Software development teams need specific guidance about how to create software architecture in the context of a product development lifecycle. Your task is to consider a scenario where you must provide the blueprint for complex software development. Here, complexity could mean that the software is distributed, scalable, fault-tolerant, and may be deployed at the enterprise level. Then consider the industry of your choice (e.g., healthcare, hospitality, retail, finance, IT, government, non-profit organization etc.) or if you are familiar with any organization you can consider that as well. Then, do the following (deliverables):

 

a. Create a proposal for software development (1-2 paragraphs) indicating its scope, system boundaries, deliverables, limitations, constraints, and assumptions (if any). This will be your "problem statement".

 

Deliverable-A

 

1. Enterprise goals and objectives

2. Organizational success factors (organizational enablers - example: business value of IT)

3. Technology goals (high-level at this time)

4. Technology success factors (technology enablers - example: system consolidation)

5. Security goals (high-level at this time)

6. Security success factors (security enablers - example: application of security best practices)

 

Note: these steps are based on COBIT 5 standards.

 

Deliverable-B

 

Now, create a simple context model using Archi modeling tools. The model must include the following constructs:

 

Business Goals

Technology Goals

Cybersecurity goals

 

Remember, these are high-level goals. Your model must indicate a) which business goal relates to what technology goal(s) and b) which technology goal related to what cybersecurity goal(s).

 

For these deliverables, consider the following points:

 

1. As a Cybersecurity Architect, you must be able to

 

a. Identify the goals and requirements for security

b. Develop a vision for how to achieve those goals

c. Work with other technical specialists to make sure that their vision is practical and feasible (e.g., CRO, CCO, CPO etc.)

 

2. Given your business scenario, analyze the following:

 

a. What will attackers do next?

b. How will their techniques evolve in ways we haven't planned for?

c. How will new technologies impact your organization's security model?

d. How will new business opportunities impact our security?

e. How can we know that we're secure – that we've secured the organization appropriately?

f. How do we use our limited resources in the best way possible?

 

3. Given your business scenario, analyze the Cybersecurity architecture as follows:

 

a. The approach to security within the organization is well planned.

b. Resources are used optimally.

c. The goals of the organization (both security as well as business and functional goals) are met throughout.

d. There are measures in place that allow future growth and expansion.

 

Deliverable-C

 

Given your business scenario, briefly explain the following in the context of Business Goals, Technology Goals, and Cybersecurity goals:

 

Policies

Procedures

Standards

Guidance

Risk appetite

Compliance requirements

 

Note: Make any assumptions you like. Clearly document all assumptions, constraints, and limitations.

 

Example business scenarios:

 

a. Build, develop, and deploy integrated database management for B-2-B e-commerce organization. 

b. Build, develop, and deploy HIPAA-compliant healthcare management system.

c. Migration of legacy system to hybrid cloud for transaction processing and management reporting in retail management.

d. Redesigning legacy network infrastructure that is resilient, fault-tolerant, and scalable.

e. Designing a comprehensive academic information system for a large public institution.

 

 

 

(5/5)
Attachments:

Related Questions

. Introgramming & Unix Fall 2018, CRN 44882, Oakland University Homework Assignment 6 - Using Arrays and Functions in C

DescriptionIn this final assignment, the students will demonstrate their ability to apply two ma

. The standard path finding involves finding the (shortest) path from an origin to a destination, typically on a map. This is an

Path finding involves finding a path from A to B. Typically we want the path to have certain properties,such as being the shortest or to avoid going t

. Develop a program to emulate a purchase transaction at a retail store. This program will have two classes, a LineItem class and a Transaction class. The LineItem class will represent an individual

Develop a program to emulate a purchase transaction at a retail store. Thisprogram will have two classes, a LineItem class and a Transaction class. Th

. SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of Sea Ports. Here are the classes and their instance variables we wish to define:

1 Project 1 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of

. Project 2 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of Sea Ports. Here are the classes and their instance variables we wish to define:

1 Project 2 Introduction - the SeaPort Project series For this set of projects for the course, we wish to simulate some of the aspects of a number of

Ask This Question To Be Solved By Our ExpertsGet A+ Grade Solution Guaranteed

expert
Um e HaniScience

608 Answers

Hire Me
expert
Muhammad Ali HaiderFinance

894 Answers

Hire Me
expert
Husnain SaeedComputer science

868 Answers

Hire Me
expert
Atharva PatilComputer science

870 Answers

Hire Me

Get Free Quote!

280 Experts Online