Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

Information technology architectures

Distributed systems are particularly vulnerable to security threats because they are exposed in many areas over networks. Also, distributed systems are often business-critical applications that must not be compromised.

For this assignment, you will identify the security risks that may be present for your distributed system project. You will also modify the consultant’s analysis report to address any new issues you discover.

The following are the project deliverables:

  • Update the Consultant’s Analysis Report document title page with new date and project name. 
  • Update the previously completed sections based on your instructor's feedback. 
  • Include the following new content: 
    • Security 
      • Identify the primary security risks and threats your distributed system might face. Research and include threats such as phishing, Internet scams, etc. 
      • Determine the severity level of the risks and threats in terms of likelihood and impact on the business. 
      • Based on the likelihood and impact of the security threats, determine the order in which threats should be addressed, and prepare an action plan to reduce the impact of each risk/threat listed in priority order. 
  • Be sure to update your table of contents before submission. 
Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question