Answered step by step
Verified Expert Solution
Question
1 Approved Answer
. Short Answers: Security Analysis Consider the scenario in which a customer physically goes to a Starbucks store, and uses their physical plastic credit car
.
Short Answers: Security Analysis Consider the scenario in which a customer physically goes to a Starbucks store, and uses their physical plastic credit car to purchase a cup of coffee from the Starbucks cashier. Below are two architecture diagrams that represent this transaction. A DFD. Red numbers uniquely identify each data flow. A block diagram showing aspects of the physigal architecture. A block diagram showing aspects of the physical architecture. Use the above information to answer the following questions: 1. Either draw or describe the trust boundaries that would you add to this DFD. Given that there are many different trust boundaries that one could draw, explain why the particular set of trust boundaries that you drew is the best set. If you describe this in text, use the red numbers from the DFD to indicate which data flows are covered by each trust boundary. 2. Indicate which of the trust boundaries that fou drew is the MOST important boundary to further investigate for security threats. Explain your rationale for why that trust boundary is more Short Answers: Security Analysis Consider the scenario in which a customer physically goes to a Starbucks store, and uses their physical plastic credit car to purchase a cup of coffee from the Starbucks cashier. Below are two architecture diagrams that represent this transaction. A DFD. Red numbers uniquely identify each data flow. A block diagram showing aspects of the physigal architecture. A block diagram showing aspects of the physical architecture. Use the above information to answer the following questions: 1. Either draw or describe the trust boundaries that would you add to this DFD. Given that there are many different trust boundaries that one could draw, explain why the particular set of trust boundaries that you drew is the best set. If you describe this in text, use the red numbers from the DFD to indicate which data flows are covered by each trust boundary. 2. Indicate which of the trust boundaries that fou drew is the MOST important boundary to further investigate for security threats. Explain your rationale for why that trust boundary is moreStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started