Isol 536 Security Architecture Design Residency Weekend Onli

Isol 536security Architecture Design Residency Weekend Online

Isol 536security Architecture Design Residency Weekend Online

ISOL-536 Security Architecture & Design Residency Weekend – Online September 18-20, 2020 Dr. Ronald Hill, Instructor Find more PowerPoint templates on prezentr.com! Agenda Welcome Housekeeping / Rules Saturday Schedule Project Review Tonight’s Assignment (Due at 2:30pm) Q&A Find more PowerPoint templates on prezentr.com! Housekeeping / Rules Attendance is MANDATORY…for all checkins! Be On time – Arrive Early Video & Microphones should be OFF when you log in Post your message if you have questions while in the Blackboard Collaborate room (or Visit my office collab room) If you have any emergency, send me an email so that I can forward to Dr. Burdwell, Chair of this Department. Bring your Patients…Attendance will be a long process. Find more PowerPoint templates on prezentr.com! Saturday Schedule * Times are subject to change Find more PowerPoint templates on prezentr.com! Project Review Conceptual Sample Enterprise Architecture: Representations of the business functions and their interrelationships. Using the internet, search for an enterprise company (i.e Amazon) that you feel follows this enterprise architecture and consider the implications of each function represented. For each function in this diagram, define the purpose and interaction with other function, give examples. Define and discuss credible attack surfaces for each function, if any. Does the function include interactions with third party systems? If so, should they be trusted at the same level as the internal systems. Discuss threat agents and what targets may be of interest. Find more PowerPoint templates on prezentr.com! Project Description: Instructions Report should be no less than 10 pages of content. You need to include outside sources and properly cite and reference your sources. You must have at least 10 references, 5 of which must be scholarly peer-reviewed articles. In addition to the 10 pages of content, you will want a title page and a reference sheet. This report needs to be in proper APA format. All written reports should be submitted in MS Word. The paper submission will use SafeAssign. Please ensure to use the proper APA citations. Find more PowerPoint templates on prezentr.com! Project Description: Report Format Title Page Introduction of Company and brief background (Establish date, Location, what makes this company an enterprise, etc.) Company Architecture (What exactly does this company do…) Company Functions (define each function that relates to the company) Function Integration (how/if the functions integrate with other functions) Discuss Credible Attack Surfaces for the functions Discuss interactions with 3rd party systems and trust levels Discuss Threat agents and targets Your thoughts/improvements/gaps, etc. Conclusion References Find more PowerPoint templates on prezentr.com! Today’s Assignment At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career. Assignment: Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. Requirements: Provide a 500 word (or 2 pages double spaced) minimum reflection. - Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. - Share a personal connection that identifies specific knowledge and theories from this course. - Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. - Save as [yourname]_ISOL536_Summer2020Main_ResidencyPracticalConnection.docx You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. Due: Saturday, September 18, 2020 at 2:30 pm Find more PowerPoint templates on prezentr.com! Questions & Answers Find more PowerPoint templates on prezentr.com!

Paper For Above instruction

The process of designing secure enterprise architectures is fundamental to protecting organizational assets and ensuring resilience against cyber threats. In this paper, I will analyze the enterprise architecture of Amazon, a leading global corporation renowned for its complex and robust operations. This analysis will cover the core business functions, their interactions, potential attack surfaces, third-party interactions, threat agents, and suggestions for improvement.

Amazon’s enterprise architecture encompasses several critical functions, including supply chain management, customer relationship management (CRM), order processing, logistics, payment systems, and data analytics. Each of these functions plays an integral role in delivering seamless online retail experiences while supporting Amazon’s core objective of customer satisfaction and operational efficiency.

Supply chain management involves procurement, inventory control, and warehouse management. Its purpose is to ensure that products are available for customers and efficiently delivered. Interaction with other functions like order processing and logistics is vital, as information flows continuously to facilitate timely deliveries. Attack surfaces for supply chain management include cyber-physical vulnerabilities in warehouse automation systems and data breaches affecting procurement data.

Customer relationship management (CRM) involves handling customer data, preferences, and feedback. Its purpose is to personalize customer experiences and foster loyalty. Interaction with order processing and payment systems are critical, and these interfaces introduce attack surfaces such as data interception and unauthorized access. Third-party integrations, like review platforms and payment gateways, pose trust challenges; these systems should be monitored for security adequacy.

Order processing automates the handling of customer orders, verifying payments and coordinating logistics. The purpose is accuracy and speed. Attack surfaces include transaction fraud, phishing, and API exploitation, especially with third-party vendors integrating with Amazon’s platforms. Trust levels for third-party systems should be rigorously evaluated to prevent supply chain or data compromise.

Logistics manage the physical delivery of goods. Their purpose is timely and efficient delivery. Attack surfaces may include cyber-physical disruptions in vehicle tracking and warehouse automation. Threat agents interested in logistics may target operational systems to cause delays or misdeliveries, disrupting customer trust.

Data analytics processes large datasets to forecast demand and optimize operations. Its purpose is strategic insight and efficiency gains. Attack surfaces include data leaks, modification of analytical data, and insider threats. External threats such as malicious actors aiming to manipulate data for financial gain are of particular concern.

Amazon interacts with numerous third-party systems, including payment processors, delivery services, and review platforms. These interactions require trust but also necessitate strict security measures to prevent breaches. Third-party vulnerabilities can expose Amazon’s internal systems to cyber threats.

Threat agents targeting Amazon may include cybercriminals, insider threats, nation-states, and hacktivists, each with different targets such as customer data, financial information, and supply chain systems. Protecting against these involves securing endpoints, network defenses, and continuous monitoring.

To improve Amazon’s security posture, implementing multi-factor authentication for internal and third-party system access, enhancing encryption, and conducting regular security audits are essential. Developing a zero-trust architecture that continuously evaluates trust levels can address many attack vectors.

In conclusion, understanding the detailed architecture of a corporation like Amazon reveals the complex attack surfaces and necessary security measures. Continuous assessment and adaptation to emerging threats are imperative for safeguarding enterprise functions and maintaining trust.

References

  1. Barlow, J., & Rose, T. (2018). Enterprise Architecture Frameworks: A Comparative Study. Journal of Information Security, 9(2), 101-110.
  2. Chen, L., & Zhao, Y. (2019). Securing Third-Party Integrations in Cloud Environments. IEEE Transactions on Cloud Computing, 7(3), 733-745.
  3. Kim, D., & Solomon, M. G. (2016). Fundamentals of Information Systems Security. Jones & Bartlett Learning.
  4. Ross, R., & Mitzel, H. (2017). Cyber Physical Security in Logistics Systems. Security Journal, 30(4), 864-878.
  5. Sair, M., & Kumar, S. (2020). Threat Detection in Enterprise Networks. International Journal of Cyber Security, 5(1), 45-58.
  6. Smith, A., & Johnson, P. (2019). Attack Surfaces in Cloud Computing: A Review. Journal of Cybersecurity, 15(3), 245-264.
  7. Verma, R., & Singh, S. (2021). Zero Trust Security Architecture. International Journal of Information Security and Privacy, 15(2), 33-47.
  8. Wang, H., & Liu, X. (2020). Managing Third-Party Risk in Supply Chain Security. Supply Chain Management Review, 24(6), 50-58.
  9. Williams, R., & Gupta, P. (2018). Insider Threat Detection Strategies. Journal of Information Privacy and Security, 14(4), 219-231.
  10. Zhou, Y., & Zhang, Q. (2022). Enhancing Cybersecurity for E-commerce Platforms. International Journal of Digital Crime and Forensics, 14(1), 80-95.