Security Architecture and Design

Security Architecture and Design

  • List 2 methods to build visual models of your system.
  • What is the best definition of a trust boundary?
  • What are the 3 most essential questions to ask in threat modeling?
  • In the Star Wars mnemonic, what threat does LukeSky walker embody?

Minimum of 600 words. Briefly respond to all the following questions. Make sure to explain and back up your response with facts and examples.

 

This assignment should be in APA format and have to include at least two references.

 

Make sure to use the enclosed template. Any other format will not be accepted.

 

There are total of 4 questions.

Please go through the requirements make sure plagiarism.

 

Shostack, Adam. Threat Modeling: Designing for Security, Indianapolis, IN: Wiley, 2014

this is only i have, please make sure that word limit 4 questions total of 600 words or more not less then 600.

 

 

 

Solution Preview

List 2 methods to build visual models of your system.

 

The two methods to build visual models are

  • Physical Data modeling
  • Logical Data Modeling

Logical data modeling involves the gathering of business requirements and converting these into a model. It revolves around the need of a business instead of the database. These needs are later used to define the needs of the database. Logical modeling involves gathering information about data categories, business processes and units of organization.

Physical data is the actual design of a database according to the designs that are established during logical data modeling. It involves the conversion of a of business model of logical model into a database model relatable to. Physical modeling defines objects at schema level when it occurs.  (“What is Data Modeling? Conceptual, Logical, & Physical Data Models,” n.d.) 

(717 words)

Open chat
Hello
Contact us here via WhatsApp