Need help with your Discussion

Get a timely done, PLAGIARISM-FREE paper
from our highly-qualified writers!

glass
pen
clip
papers
heaphones

UMGC Security and Privacy Discussion

UMGC Security and Privacy Discussion

UMGC Security and Privacy Discussion

Description

pls respond to students 

Security and privacy play an important role within an EA program and its architecture.

The research, development, organization, and implementation of policies and tactics to accomplish broad business goals by making utilization of IT technology and protection is known as an enterprise architecture (EA). As per this idea of enterprise architecture, a business may develop IT projects and put policies into place that would help it achieve its goals. Additionally, EA assists a company in staying current with changes in its industry, such as new, disruptive technology and approaches to the efficient and safe use of IT tools (Fortinet, n.d.)

An enterprise architect is another name for enterprise architecture (EAP). Plans that result from an enterprise architecture approach enable the company to scale up or down in accordance with its objectives while maintaining security and effectiveness. The truth is that ensuring an organization has a strong security posture involves many varied factors, but it’s crucial to know what we mean by security. Even though the scope may be greater in some organizations, we are mostly talking about information security (Fortinet, n.d.).

A company’s risk management strategy must include security as they are essential to the success of an EA program. As a result, enterprise architects collaborate with security and privacy architects to develop artefacts that oversee the EA’s suggested controls. A two-way information exchange is required since the security and privacy architects are also creating knowledge that the EA might find useful (Michali, 2022).

Before conducting a task or business process, security and protection requirements must be established and assigned. To protect the confidentiality, integrity, and availability of data used, processed, and stored in information technology systems, data security controls and safeguards have been built (Michali, 2022).

Once an organization’s enterprise information security architecture program is organized and effectively employed, employers and clients are better secured. The first line of defense is frequently preventative measures, which aim to stop an incident or breach. The confidentiality architect makes sure that corporate design, including reference models, segment architectures, and solution architectures, effectively addresses stakeholder security needs and corresponding technical specifications (Michali, 2022).

A complete set of controls that permeate all architectural domains and are a vital component of an organization’s strategy for risk management is the finest way, to sum up, the function of security and privacy inside an EA program. This can be visualized as a vertical thread that runs across all the architectural levels. Since security and privacy are most successful if they are integrated into the enterprise’s strategic initiatives, business services, information flows, applications, and technological infrastructure, the thread metaphor is employed (instead of a distinct dedicated level).

Based on your research, how are security and/or privacy handled by one of the frameworks?

Technology from many eras (independent machines, mainframe systems, client-server, distributed computing) is frequently merged in a single organization because of the evolution of IT management. The end effect is that a corporation finds it extremely challenging to have a comprehensive strategy for controlling all its information systems or an appropriate “map” of each of its information systems (Electronic intrusion, n.d).

Companies are rushing to comply with information security and privacy rules in the wake of the Sarbanes-Oxley act. Enterprise Architecture frameworks have indeed been utilized to address these difficulties and provide a shrink-wrapped approach to accomplishing them. There are several such systems, but two of them are among the more popular ones (the Zachman Framework and the Federal Enterprise Architecture Framework) (Electronic intrusion, n.d).

A lack of centralized coordination is thought to weaken system security. It is believed that confusion about everything would lead to numerous security leaks and increased vulnerability because each system has its techniques for handling security, which is inconsistent (Electronic intrusion, n.d).

The whole first three grids of the Zachman matrix are function, network, people, motive, time, and information useful when discussing security and privacy in design. This matrix offers details on the data assets that the organization is in control of, their location, their use, when they are utilized, by whom, and for what purposes. Additionally, the matrix’s first five rows offer a unique perspective on the security dilemma. The Ballpark view provides a detailed explanation of the interactions and relationships in this situation. The system’s functional capabilities are described from the architect’s view. A detailed description of the methods and architecture for monitoring the system’s performance is provided by the builder’s view, which follows the designer’s view in establishing the security architectural design ( et al., 2011).

Explanation & Answer:

600 words

User generated content is uploaded by users for the purposes of learning and should be used following Studypool’s honor code & terms of service.

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Order Solution Now

Our Service Charter


1. Professional & Expert Writers: Eminence Papers only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Eminence Papers are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Eminence Papers are known for the timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Eminence Papers, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.

We Can Write It for You! Enjoy 20% OFF on This Order. Use Code SAVE20

Stuck with your Assignment?

Enjoy 20% OFF Today
Use code SAVE20