Discussions

Q1)  Compare and contrast the following access control models: Discretionary, role-based (both core and hierarchical), rule-based, and mandatory access controls. 
Q2)  
Users should not be authorized to access files and/or systems until they are properly identified and authenticated.  There are four steps that should be followed in the process of granting access.  They include Identification, Authentication, Authorization, and Accountability.  Please select two of these four steps and discuss them in detail.
Q3)  What were the most important new things you learned this week about the scope and importance of EA? Please explain why. Please limit your response to 200 words. 
Q4)  Relate SOA, WOA, Cloud Computing, and Security Architecture to the TOGAF ADM, the EA3 Cube model, and other architecture frameworks we have studied. Based on the article "What is Service Oriented Architecture" (in the "Week 8 Materials" File under the "Files" Tab of Canvas), and citing some of this week's readings, describe what an enterprise architect needs to know about SOA/WOA/Cloud Computing and Security Architecture, respectively, and then discuss SOA/WOA/Cloud Computing in light of Security Architecture. 
 
Q5)  Discuss how the TOGAF Architecture Development Method (ADM) is used as a blueprint for EA Kanban. Include discussion of (a) backlog – tasks waiting to be tackled, (b) tasks currently being worked on, and (c) tasks finished. 
 
Q6)  Describe how at least one of the other frameworks we have studied can support the use of EA Kanban. How can the Kanban approach be applied to other aspects of organizational transformation – i.e., in addition to EA? 
  1. Question Attachments

    0 attachments —

Answer Detail

Get This Answer

Invite Tutor