Discussion Paper (Person Mapping)
Subject: Security Architecture & Design
Please acknowledge to BOTH of the afterward questions:
Acknowledge at atomic two types of accounts that should not be mapped to a person; explain your reasoning.
Each week, analysis a different account adventure or commodity accompanying to Advice Security/Information Technology. Column a arbitrary of what you abstruse to the altercation thread, amuse additionally accommodate a articulation to the aboriginal article. Antecedent is your choice; about amuse absolutely adduce your source.
Please acknowledge to the antecedent catechism by "Wednesday", column should be 150 to 200 words, but may go best depending on the topic. (initial post, acutely present alive account and concepts). If you use any antecedent alfresco of your own thoughts, you should advertence that source. Include solid grammar, punctuation, book structure, and spelling.
Learning Materials and References (Prof acquaint in advance syllabus)
Shostack, Adam. Threat Modeling: Designing for Security, Indianapolis, IN: Wiley, 2014
Please use the afterward author’s names, book/article titles, Web sites, and/or keywords to chase for added advice to augment your acquirements in this subject.
Tony UcedaVelez and Marco M. Morana
Rick Centric Threat Modeling: Process for Attack Simulation and Threat Analysis
Order a unique copy of this paper