Research Paper Please find the attached document and please provide the assignments accordingly. Part 1: 500 words Part 2: 600 words PART 1: 500 Words W

Research Paper Please find the attached document and please provide the assignments accordingly.

Part 1: 500 words

Part 2: 600 words PART 1: 500 Words

W

Click here to Order a Custom answer to this Question from our writers. It’s fast and plagiarism-free.

Research Paper Please find the attached document and please provide the assignments accordingly.

Part 1: 500 words

Part 2: 600 words PART 1: 500 Words

What does a peer review process look like? When does an assessment require peer review? Who should perform the peer review?

Answer the questions with an APA-formatted paper (Title page, body and references only).  Your response should have a minimum of 500 words.  Count the words only in the body of your response, not the references.  A table of contents and abstract are not required.

A minimum of two references are required. One reference for the book is acceptable but multiple references are allowed.  There should be multiple citations within the body of the paper.  Note that an in-text citation includes author’s name, year of publication and the page number where the paraphrased material is located.

Your paper must be submitted to SafeAssign.  Resulting score should not exceed 35%.

PART 2: 600 Words

At the end of your textbook on page 385, the author mentions several “encouraging security architecture developments”:   

· The Open Group has created an Enterprise Security Architect certification. One of their first certified architects has subsequently created a few enterprise security reference architectures.   

· The SANS Institute hosted three “What Works in Security Architecture” Summits.   

· The IEEE initiated a Center for Secure Design. The Center published a “Top 10 Design Flaws” booklet.  

· Adam Shostack published Threat Modeling: Designing for Security, and renown threat modeler, John Steven, has told me that he’s working on his threat modeling book.   

· Anurag Agrawal of MyAppSecurity has been capturing well-known attack surfaces and their technical mitigations within his commercial threat modeling tool, “Threat Modeler.”

Choose 3 three items from the list above and provide an update to their development status.  Make sure you provide some background on your selection and then provide the update of the development.

Answer the questions with an APA-formatted paper (Title page, body and references only).  Your response should have a minimum of 600 words.  Count the words only in the body of your response, not the references.  A table of contents and abstract are not required.

A minimum of two references are required. One reference for the book is acceptable but multiple references are allowed.  There should be multiple citations within the body of the paper.  Note that an in-text citation includes author’s name, year of publication and the page number where the paraphrased material is located.

Your paper must be submitted to SafeAssign.  Resulting score should not exceed 35%.

Place your order now for a similar assignment and have exceptional work written by one of our experts, guaranteeing you an A result.

Need an Essay Written?

This sample is available to anyone. If you want a unique paper order it from one of our professional writers.

Get help with your academic paper right away

Quality & Timely Delivery

Free Editing & Plagiarism Check

Security, Privacy & Confidentiality