1 – Read the following case studies from http://kotusev.com/
1 – Read the following case studies from http://kotusev.com/The Problem of Engagement in Enterprise Architecture Practice: An Exploratory Case StudyTOGAF: Just the Next Fad That Turned into a New Religion2 – Read Microsoft BizTalk case studies from https://docs.microsoft.com/en-us/biztalk/core/security-case-studies-for-small-to-medium-sized-companiesSecurity Case Studies: Company ASecurity Case Studies: Company BThreat Model AnalysisSample Architectures for Small & Medium-Sized CompaniesSample Scenarios for Threat Model AnalysisAnalyze Companies A and B and apply the Threat Model Analysis” TMA 7-steps for security analysis. Discuss with team. This exercise is to gain an understanding for developing the Residency Paper.3 – Read about the Open Web Application Security ProjectWhat is OWASP? What are the OWASP Top 10? https://www.cloudflare.com/learning/security/threats/owasp-top-10/What is Web Application Security?https://www.cloudflare.com/learning/security/what-is-web-application-security/Projects/OWASP Mobile Security Project – Mobile Threat Modelhttps://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Mobile_Threat_ModelOWASP ZAP Softwarehttps://www.itcentralstation.com/products/owasp-zap-pros-and-consOWASP ZAP Videohttps://video.search.yahoo.com/search/video?fr=mcafee&p=what+is+owasp+zap#id=39&vid=2bf983d9dcda91d4a163a84ca0c3237b&action=view4 – Questions to discuss in written residency report and PPT presentation.The residency paper consists of two parts, I and II. The PPT presentation should consists of 18-20 slides discussing Part I and II. All work must be original to the team.4 – Questions to discuss in written residency report and PPT presentation.The residency paper consists of two parts, I and II. The written report should be 6-8 pages double spaced and APA compliant discussing Part I and II. The cover page and reference list are excluded. The PPT presentation should consist of 18-20 slides discussing Part I and II. All work must be original to the team.Part IFor Part I, select one of the TOGAF Architecture Case Studies and apply the Threat Model Analysis” TMA 7-steps for security analysis.Provide security recommendations for one the Case Studies based on the Threat Model Analysis” TMA 7-steps. Analyze the case using the security information presented in this residency to gain background information. Also, make assumptions as needed to build your case presentation.http://www.opengroup.org/public/arch/p4/cases/case_intro.htm#DFGCase Study CompaniesDepartment of Social Security (UK)Litton PRC (US)Ministry of Defense (UK)National Health Service (UK)NATO (Belgium)Police IT Organization (UK)QA Consulting (UK)Westpack (Australia)Requirement: Since this will be an online residence, consideration is given to the students. For this reason, only two company case studies will be analyzed: Litton PRC and Westpack. The written Report and PPT must analyze the companies using the TMA 7-steps. Part IIRespond to the following questions based on class readings, notes, and discussions so far. Think of a company with eCommerce presence and make assumptions as needed. Use APA formatting and at least 3-references from the materials reviewed.How often should the organization refresh its assessment of top risks?Who should own the top risks and who is accountable for results and to whom do they report?Are there any organizational “blind spots” warranting attention?How is the organization prepared to respond to extreme events?Does the organization have the required skills to provide effective risk oversight?As an Enterprise Architecture Professional would you recommend the TOGAF framework for enterprise architecture analysis? Why and why not?As an Enterprise Architecture Professional would you recommend the WASP ZAP tool for findings vulnerabilities in web applications? Discuss the OWASP ZAP pros and cons, Pros and Cons, benefits, valuable features, room for improvement, stability, scalability, and customer service technical support.Requirement: Written Report and PPT answering the above questions.Include the Grammarly Score before and after Grammarly changes. Use the Snipping tool to copy the score and paste the screenshots at the end of your essay. That step will ensure that you are running your report through Grammarly and taking advantage of the editing process.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.
