Assignment - Secret Questions

profileareddy

 Subject: Security Architecture & Design


Assignment Question:  

In this week's reading we looked at accounts, identity, authentication, and account recovery. There is an old adage that says, "You can never be too safe. When it comes to the digital world, it's very true. Cyber hackers and hijackers are lurking everywhere to steal digital information. And while it's a piece of cake for them to get passwords and other sensitive information, for the rest of us, keeping track of login information is a hassle especially since everything needs its own password. It's too much and eventually passwords get forgotten. 


The week's reading mentioned various methods of approach to account recovery. In your own words state what approach(s) you believe are the best approaches for account recovery, and how you would apply the approach in an enterprise setting. Please state your answer in a 2 page paper in APA format. Include citations and sources in APA style. 


"No plagiarism"


Grading Criteria Assignments                                             Maximum Points

  1. Meets or exceeds established assignment criteria                                                                                 40
  2. Demonstrates an understanding of lesson concepts                                                                              20
  3. Clearly presents well-reasoned ideas and concepts                                                                               30
  4. Uses proper mechanics, punctuation, sentence structure, spelling and APA structure                          10                                        

                                                                 TOTAL                                  100


Learning Materials and References (Prof posted in course syllabus)


Required Resources

Shostack, Adam. Threat Modeling: Designing for Security, Indianapolis, IN: Wiley, 2014


Recommended Resources

Please use the following author’s names, book/article titles, Web sites, and/or keywords to search for supplementary information to augment your learning in this subject.


Tony UcedaVelez and Marco M. Morana

Rick Centric Threat Modeling: Process for Attack Simulation and Threat Analysis



    • Posted: a month ago
    • Due: 
    • Budget: $10
    Answers 1
    • Assignment
      Answer rating:5Stars out of1ratings

    Purchase the answer to view it

    blurred-text