IFSM 311 Week 7 Discussion

Week 7 Required Discussion

 

Security and privacy play an important role within an EA program and its architecture. Please respond to the following in your own words:

1. What is your understanding of the role of security and privacy in the EA program?

2. What is your understanding of the role of security and privacy in the Enterprise Architecture itself?

3. Do a little research and describe how security and/or privacy are handled by one of the frameworks.

ANSWER:

What is your understanding of the role of security and privacy in the EA program?

An organization that handles data, also believes, that they should protect that data. This is where security comes into play. Security is something that should always be held in high regard in the IT field. It is no surprise that it is a crucial factor when regarding the EA program. The EA program has security and privacy processes built into the program ensuring that these priorities are considered from the planning phase through the implementation phase. Security and privacy are not only technologies but should also be comprised of policies and regulations that are put into place inside the organization. The confidentiality of information for not only the company, but its customers and employees is essential. Therefore, when looking at the privacy and security, it’s easy to see why there is a need for it when concerning the EA.

What is your understanding of the role of security and privacy in the Enterprise Architecture itself?

          Security policies and privacy measures are taken from the beginning of the EA’s development to ensure that the development is safe. There should be a balance between confidentiality, integrity and availability of information. If the information is too available then the integrity and confidentiality of that information might be compromised. If the Integrity of the information is kept to tight, then the availability is too low for proper collaboration to occur.

Do a little research and describe how security and/or privacy are handled by one of the frameworks.

 The Zachman framework handles its security the same way it handles a lot of other programs. The organization of the framework lies in Data (What), Function (How), Network (Where), People (Who), Time (When), and Motivation (Why). Most of the security is handled in the ‘who’ classification of the framework’s structure. This leads to the assumption that this framework considers most of the security is in the hands of the people involved with the organization which are, employees and higher-ups like the CIO.

Reference:

Zachman, J. A. (2011). Cloud Computing and Enterprise Architecture by: John A. Zachman. Retrieved July 2, 2019, from https://www.zachman.com/ea-articles-reference/55-cloud-computing-and-enterprise-architecture-by-john-a-zachman

Place an Order

Plagiarism Free!

Scroll to Top