Course Name: Security Architecture & Design
Textbook: Schoenfield, Brook S.E. – Securing Systems: Applied Security Architecture and Threat Models, CRC Press, 2014 ISBN: 978-1-4822-3397-1
Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least three references.
As you consider the reputation service and the needs of customers or individual consumers, as well as, perhaps, large organizations that are security conscious like our fictitious enterprise, Digital Diskus, what will be the expectations and requirements of the customers? Will consumers’ needs be different from those of enterprises? Who owns the data that is being served from the reputation service? In addition, what kinds of protections might a customer expect from other customers when accessing reputations?
Need atleast in Minimum of 600 words in APA format. Remember not to copy any content from any other source – all work needs to be your original work, but remember to also include citations
Answer preview
In some parts, the consumer needs differ from those of the entities. The entities prefer reputation systems that do not allow other users to post on individual feedback directly. Ureña, Chiclana, Carrasco, & Herrera-Viedma (2019) highlight that this creates a negative perception of the company, especially when individual users endorse other companies or post unrelated information. By allowing individual ratings encourages blackmail and other negativities, which is not related to the business objectives. For instance, the company may be interested in eradicating cyberactivism on its website, which may attract negative perceptions about it. Secondly, the entities are more driven by the urge to draw purchase and consumption behavior from the users. They prefer a reputation system that will enable them to draw an informative conclusion from the behaviors. Lastly, the enterprise is more driven by cybersecurity. The cybercriminals leverage bugs in the company website to gain access to its information. The need for cybersecurity remains an extremely important issue for enterprises.
[833 Words]