Information Technology Architectures

Distributed systems are particularly vulnerable to security threats  because they are exposed in many areas over networks. Also, distributed  systems are often business-critical applications that must not be  compromised.

For this assignment, you will identify the security risks that may be  present for your distributed system project. You will also modify the  consultant’s analysis report to address any new issues you discover.

The following are the project deliverables:

  • Update the Consultant’s Analysis Report document title page with new date and project name.  
  • Update the previously completed sections based on your instructor’s feedback.  
  • Include the following new content:  
    • Security  
      • Identify the primary security risks and threats your distributed  system might face. Research and include threats such as phishing,  Internet scams, etc.  
      • Determine the severity level of the risks and threats in terms of likelihood and impact on the business.  
      • Based on the likelihood and impact of the security threats,  determine the order in which threats should be addressed, and prepare an  action plan to reduce the impact of each risk/threat listed in priority  order. 
  • Be sure to update your table of contents before submission.  
  • Name the document yourname_IT401_IP4.doc.