1 – Read the following case studies from http://kotusev.com/
- The Problem of Engagement in Enterprise Architecture Practice: An Exploratory Case Study
- TOGAF: Just the Next Fad That Turned into a New Religion
2 – Read Microsoft BizTalk case studies from https://docs.microsoft.com/en-us/biztalk/core/security-case-studies-for-small-to-medium-sized-companies
- Security Case Studies: Company A
- Security Case Studies: Company B
- Threat Model Analysis
- Sample Architectures for Small & Medium-Sized Companies
- Sample Scenarios for Threat Model Analysis
Analyze Companies A and B and apply the Threat Model Analysis†TMA 7-steps for security analysis. Discuss with team. This exercise is to gain an understanding for developing the Residency Paper.
3 – Read about the Open Web Application Security Project
What is OWASP? What are the OWASP Top 10? https://www.cloudflare.com/learning/security/threats/owasp-top-10/
What is Web Application Security?
https://www.cloudflare.com/learning/security/what-is-web-application-security/
Projects/OWASP Mobile Security Project – Mobile Threat Model
https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Mobile_Threat_Model
OWASP ZAP Software
https://www.itcentralstation.com/products/owasp-zap-pros-and-cons
OWASP ZAP Video
4 – Questions to discuss in written residency report and PPT presentation.
The residency paper consists of two parts, I and II. The PPT presentation should consists of 18-20 slides discussing Part I and II. All work must be original to the team.
4 – Questions to discuss in written residency report and PPT presentation.
The residency paper consists of two parts, I and II. The written report should be 6-8 pages double spaced and APA compliant discussing Part I and II. The cover page and reference list are excluded. The PPT presentation should consist of 18-20 slides discussing Part I and II. All work must be original to the team.
Part I
For Part I, select one of the TOGAF Architecture Case Studies and apply the Threat Model Analysis†TMA 7-steps for security analysis.
Provide security recommendations for one the Case Studies based on the Threat Model Analysis†TMA 7-steps. Analyze the case using the security information presented in this residency to gain background information. Also, make assumptions as needed to build your case presentation.
http://www.opengroup.org/public/arch/p4/cases/case_intro.htm#DFG
Case Study Companies
Department of Social Security (UK)
Litton PRC (US)
Ministry of Defense (UK)
National Health Service (UK)
NATO (Belgium)
Police IT Organization (UK)
QA Consulting (UK)
Westpack (Australia)
Requirement: Since this will be an online residence, consideration is given to the students. For this reason, only two company case studies will be analyzed: Litton PRC and Westpack. The written Report and PPT must analyze the companies using the TMA 7-steps.
Part II
Respond to the following questions based on class readings, notes, and discussions so far. Think of a company with eCommerce presence and make assumptions as needed. Use APA formatting and at least 3-references from the materials reviewed.
- How often should the organization refresh its assessment of top risks?
- Who should own the top risks and who is accountable for results and to whom do they report?
- Are there any organizational “blind spots†warranting attention?
- How is the organization prepared to respond to extreme events?
- Does the organization have the required skills to provide effective risk oversight?
- As an Enterprise Architecture Professional would you recommend the TOGAF framework for enterprise architecture analysis? Why and why not?
- As an Enterprise Architecture Professional would you recommend the WASP ZAP tool for findings vulnerabilities in web applications? Discuss the OWASP ZAP pros and cons, Pros and Cons, benefits, valuable features, room for improvement, stability, scalability, and customer service technical support.
Requirement: Written Report and PPT answering the above questions.
Include the Grammarly Score before and after Grammarly changes. Use the Snipping tool to copy the score and paste the screenshots at the end of your essay. That step will ensure that you are running your report through Grammarly and taking advantage of the editing process.