Please read instructions:
1) Discussion (Security Architecture and Design)
If an attacker can retrieve the API and libraries, then use these to write an agent, and then get the attacker’s agent installed, how should Digital Diskus protect itself from such an attack? Should the business analytics system provide a method of authentication of valid agents in order to protect against a malicious one? Is the agent a worthy attack surface?
400 Words – 2 References – APA Format.
2) Assignment (Security Architecture and Design)
PFA – for assignment requirement
600 Words – 2 References – APA Format – Must include Conclusion
3) Discussion (Emerging threats and Countermeasures)
This chapter discusses the relevance of diversity strategy while securing any set of national assets. Diversity in national infrastructure involves the introduction of intentional differences into systems such as vendor source, deployment approach, network connectivity, targeted standards, programming language, operating system, and software version. Two systems are considered diverse if their key attributes differ, and nondiverse otherwise. The requirement for physical diversity in the design of computing infrastructure is perhaps the most familiar of all diversity-related issues. The idea is that any computing or networking asset that serves as an essential component of some critical function must include physical distribution to increase its survivability. A national diversity program should be developed that would call for coordination between companies and governmental agencies in several
Start a discussion thread and discuss how the types of threats discussed in the article could impact our economy, and how implementing Diversity (as discussed in Chapter 4) could help mitigate these threats.
For additional information click the link below:
You must do this following:
1) Create a new thread. As indicated above, discuss how the types of threats discussed in the article referenced above could impact our economy, and how implementing Diversity (as discussed in Chapter 4) could help mitigate these threats.
TextBook: Amoroso, E. G. (2012). Cyber-attacks: protecting national infrastructure. Elsevier.
Let me know if you have any questions.