Week 7 Required Discussion
Security and privacy play an important role within an EA program and its architecture. Please respond to the following in your own words:
1. What is your understanding of the role of security and privacy in the EA program?
2. What is your understanding of the role of security and privacy in the Enterprise Architecture itself?
3. Do a little research and describe how security and/or privacy are handled by one of the frameworks.
ANSWER:
What is your understanding of the role of security and privacy in the EA program?
An organization that handles data, also believes, that they should protect that data. This is where security comes into play. Security is something that should always be held in high regard in the IT field. It is no surprise that it is a crucial factor when regarding the EA program. The EA program has security and privacy processes built into the program ensuring that these priorities are considered from the planning phase through the implementation phase. Security and privacy are not only technologies but should also be comprised of policies and regulations that are put into place inside the organization. The confidentiality of information for not only the company, but its customers and employees is essential. Therefore, when looking at the privacy and security, it’s easy to see why there is a need for it when concerning the EA.
What is your understanding of the role of security and privacy in the Enterprise Architecture itself?
Security policies and privacy measures are taken from the beginning of the EA’s development to ensure that the development is safe. There should be a balance between confidentiality, integrity and availability of information. If the information is too available then the integrity and confidentiality of that information might be compromised. If the Integrity of the information is kept to tight, then the availability is too low for proper collaboration to occur.
Do a little research and describe how security and/or privacy are handled by one of the frameworks.
The Zachman framework handles its security the same way it handles a lot of other programs. The organization of the framework lies in Data (What), Function (How), Network (Where), People (Who), Time (When), and Motivation (Why). Most of the security is handled in the ‘who’ classification of the framework’s structure. This leads to the assumption that this framework considers most of the security is in the hands of the people involved with the organization which are, employees and higher-ups like the CIO.
Reference:
Zachman, J. A. (2011). Cloud Computing and Enterprise Architecture by: John A. Zachman. Retrieved July 2, 2019, from https://www.zachman.com/ea-articles-reference/55-cloud-computing-and-enterprise-architecture-by-john-a-zachman
Place an Order
Plagiarism Free!
Create an Account
Create an account at Top Tutor Online
- Allows you to track orders.
- Receive personal messages.
- Send messages to a tutor.
Post a Question/ Assignment
Post your specific assignment
- Tutors will be notified of your assignment.
- Review your question and include all the details.
- A payment Link will be sent to you.
Wait for your Answer!
Make payment and wait for your answer
- Make payment in accordance with the number of pages to be written.
- Wait for your Answer as a professional works on your paper.
- You will be notified when your Answer is ready.