This week, you will extend your earlier work in the course by formulating a holistic system that not only goes across multiple needs
Week 7 – Assignment: Formulate Risk Approaches for Complex and Distributed Systems
Instructions
This week, you will extend your earlier work in the course by formulating a holistic system that not only goes across multiple needs but is resilient to the complexity and variety present within locations, machines, ownership, and data types. The risk plan should be highly structured for delivery to an audience of senior managers and the C suite, and it should support the strategies created earlier in the course while adding the level of complexity and specificity articulated here.
Include the following in your risk plan:
1. Formulate risk approaches that can deal with complex systems and also systems distributed across multiple locations and platforms (e.g., computing and foreign offices, tight integration with suppliers and/or customers).
2. Support diverse capabilities of the different systems and increased risks in cases when systems are not fully owned by the case study organization.
3. Consider those systems that are accessed by people that do not work for the organization and a variety of approaches used in various locations and levels.
4. Apply specific risk metrics as a means of quantifying risk resilience.
Length: 5 to 7-page plan. Include one original image and one table.
References: Include relevant sources from within the course and a minimum of 2 additional scholarly references from the NCU Library.
The completed assignment should address all of the assignment requirements, exhibit evidence of concept knowledge, and demonstrate thoughtful consideration of the content presented in the course. The writing should integrate scholarly resources, reflect academic expectations and current APA standards, and adhere to the Northcentral University’s Academic Integrity Policy.
When applicable, conduct a Turnitin pre-check and then upload your completed assignment and click the Submit to Dropbox button.
Week 7 Resources
Reminder: Please complete the O’Reilly login steps (See the Accessing O’Reilly link in the Week 1 Resources area) where you get an email that will allow your browser to keep your password, solving future access limitations.
• Access Control for Emerging Distributed Systems
Hu, V. C., Kuhn, D. R., & Ferraiolo, D. F. (2018). Access control for emerging distributed systems. Computer (00189162), 51(10), 100–103.
This journal article describes the implications of big data, cloud computing, grid computing, and the Internet of Things in the reshaping of current data systems and practices, to maximize the power of distributed systems, boost security, and prevent fraud.
• Efficient and Secure Attribute-Based Access Control for Smart Healthcare
Rana, S., & Mishra, D. (2020). Efficient and secure attribute-based Access control architecture for smart healthcare. Journal of Medical Systems, 44(5), 1–11.
This journal article describes the use of smart healthcare medical systems to ensure security and privacy risks are mitigated using efficient access control.
• The Art of Immutable Architecture: Theory and Practice of Data Management in Distributed Systems
Perry, M. L. (2020). The art of immutable architecture: Theory and practice of data management in distributed systems. Apress.
• Read Chapter 7 – Security.
This chapter describes various security protocols used in distributed systems and how these are used as precautions and countermeasures to attacks.
—————————————————————————————————
Technology Risks in Complex and Distributed Systems
Numerous challenges are presented with complex and distributed systems. Unplanned malfunctions of certain networks can occur whether accidentally or deliberately and, in some cases, dependability is a problem when connecting across the Internet. A distributed system is a collection of autonomous computing elements that appear to its users as a single unified system. These types of systems environments have security vulnerabilities that can be exploited by nefarious actors or exposed through negligence. Many of these distributed systems have middleware, which is a known target for exploitation. The threats of exploitation require efficient elimination, management, and mitigation using cost-based risk analysis. The size and scale of complex and distributed systems vary, and, in many cases, the distributed system is highly dynamic; so, given that the network is continuously changing, it may be perceived as difficult to manage.
Understanding Vulnerabilities and Threats
Vulnerabilities can be further understood by modeling the vulnerability to analyze features to assist with the classification of each vulnerability, the building of taxonomy, and providing a formalized model of the vulnerability. Threats can also be classified according to actions and consequences. Actions can include different types and the goal should be to prevent the intentional exploit or inadvertent activation of specific system vulnerabilities to bring about security breaches. Specific vulnerabilities and threats inherent to specific complex and distributed systems must be known by the enterprise to effectively mitigate those threats and vulnerabilities. Threat avoidance and tolerance should be developed based on the type of system, its complexity, and the nature and extent of its distribution.
Weekly Resources and Assignments
Review the resources from the Course Resources link, located in the top navigation bar, to prepare for this week’s assignments. The resources may include textbook reading assignments, journal articles, websites, links to tools or software, videos, handouts, rubrics, etc.
Image preview for”this week, you will extend your earlier work in the course by formulating a holistic system that not only goes across multiple needs”
APA
1637 words