You are required to research and write a report focused on the specific challenges and issues that arise owing to the use of microservices architecture as a software development philosophy. The report...

1 answer below »
You are required to research and write a report focused on the specific challenges and issues that arise owing to the use of microservices architecture as a software development philosophy. The report length is 1500 words (+/- 10%). You are also required to identify and include risk mitigation strategies that can be applied to minimise privacy and security risk in microservices-architected environments.
Whilst this is not a continuation of the case covered in Assignment 1 Part B, you might have developed insights when completing the Assessment 1 Part B Case Study that can enrich this assessment. Please review your notes to ensure that you have identified any context-based insights from Assessment 1 Part B Case Study that can inform this assessment. Re-read any relevant readings and conduct additional research in the area of investigation and select five additional sources that will add value to your report in the relevant area of investigation.





MIS603_Assessment_2_Brief_Report_Module 6.1 Page 1 of 6 Task Summary You are required to research and write a report focused on the specific challenges and issues that arise owing to the use of microservices architecture as a software development philosophy. The report length is 1500 words (+/- 10%). You are also required to identify and include risk mitigation strategies that can be applied to minimise privacy and security risk in microservices-architected environments. Context Microservices architecture signals a shift from monolithic software applications architecture to different microservices architected to address different functions. Not only is there a shift in how distribution of services impacts on managing security but hosting of services on cloud platforms not owned by the organisation, and the use of communication channels between services adds complexity to managing security. Equally, additional complexity is provided through the rapid and incremental software development principles associated with Agile and DevOps methods. The organisation as an enterprise has several moral, ethical, and legal obligations regarding privacy and the security of information. The purpose of this report is to engage you in building knowledge about privacy and security issues with a specific focus on how these manifest in a microservices-architected environment. You are also required to identify and discuss mitigations available to better manage privacy and security risk for ASSESSMENT 2 BRIEF Subject Code and Title MIS603 – Microservices Architecture Assessment Privacy and Security Report Individual/Group Individual Length 1500 words (+/- 10%) Learning Outcomes The Subject Learning Outcomes demonstrated by successful completion of the task below include: d) Analyse and evaluate moral and ethical considerations in specific security and privacy issues while transitioning to new technologies. Submission Due by 11:55pm AEST Sunday end of Module 6.1 (Week 11) Intensive class: Due by 11:55pm AEST Sunday end of Module 6.1 (Week 6) Weighting 35% Total Marks 100 marks MIS603_Assessment_2_Brief_Report_Module 6.1 Page 2 of 6 the organisation in relation to microservices architecture. Irrespective of your future role, many organisations make it clear that privacy and security is every employee’s concern. Task Instructions 1. Write a 1500-word report focused on the specific challenges and issues that arise owing to the use of microservices architecture as a software development philosophy. Identify and include risk mitigation strategies that can be applied to minimise privacy and security risk in microservices-architected environments. 2. Whilst this is not a continuation of the case covered in Assignment 1 Part B, you might have developed insights when completing the Assessment 1 Part B Case Study that can enrich this assessment. Please review your notes to ensure that you have identified any context-based insights from Assessment 1 Part B Case Study that can inform this assessment. Re-read any relevant readings and conduct additional research in the area of investigation and select five additional sources that will add value to your report in the relevant area of investigation. 3. Plan how you will structure your ideas for your report and write a report plan before you start writing. 4. The report should consist of the following structure: A title page with the subject code and name, assignment title, student’s name, student number, and lecturer’s name. The introduction (200–250 words) that will also serve as your statement of purpose for the report—this means that you will tell the reader what you are going to cover in your report. You will need to inform the reader of: a. Your area of research and its context b. The key concepts you will be addressing c. What the reader can expect to find in the body of the report The body of the report (1000–1100 words) will need to respond to the following: a. The specific issues and challenges that arise owing to the use of microservices architecture for software development as opposed to those that arise in service- oriented architecture or monolithic application architecture b. Potential privacy issues that may arise owing to these security issues/challenges c. The reason for these issues/challenges and potential mitigations to manage the risk for both privacy and security The conclusion (200–250 words) will summarise any findings or recommendations that the report puts forward regarding the concepts covered in the report. 5. Format of the report The report should use font Arial or Calibri 11 point, be line spaced at 1.5 for ease of reading, and have page numbers on the bottom of each page. If diagrams or tables are used, due attention should be given to pagination to avoid loss of meaning and continuity by MIS603_Assessment_2_Brief_Report_Module 6.1 Page 3 of 6 unnecessarily splitting information over two pages. Diagrams must carry the appropriate captioning. 6. Referencing There are requirements for referencing this report using APA referencing style and it is expected that you reference any lecture notes used and five additional sources in the relevant subject area based on readings and further research. It is essential that you use the appropriate APA style for citing and referencing research. Please see more information on referencing here: http://library.laureate.net.au/research_skills/referencing 7. You are strongly advised to read the rubric, which is an evaluation guide with criteria for grading your assignment—this will give you a clear picture of what a successful report looks like. Submission Instructions Submit Assessment 2 via the Assessment link in the main navigation menu in MIS603 Microservices Architecture. The Learning Facilitator will provide feedback via the Grade Centre in the LMS portal. Feedback can be viewed in My Grades. Academic Integrity Declaration I declare that, except where I have referenced, the work I am submitting for this assessment task is my own work. I have read and am aware of the Torrens University Australia Academic Integrity Policy and Procedure viewable online at http://www.torrens.edu.au/policies-and-forms I am aware that I need to keep a copy of all submitted material and their drafts, and I will do so accordingly. http://library.laureate.net.au/research_skills/referencing http://www.torrens.edu.au/policies-and-forms MIS603_Assessment_2_Brief_Report_Module Due 6.1 Page 4 of 6 Assessment Rubric Assessment Attributes Fail (Yet to achieve minimum standard) 0–49% Pass (Functional) 50–64% Credit (Proficient) 65–74% Distinction (Advanced) 75–84% High Distinction (Exceptional) 85–100% Visual appeal and presentation of content Title page included. Adheres to the font, spacing, format, and word count requirement. Appropriate use of paragraphs, sentence construction, spelling, and grammar. 20% No title page. Incorrect font and size with poor line spacing and large gaps in pagination, tables, or diagrams. Report is written as a block of text with no breaks in between ideas. Separate ideas cannot be clearly discerned. Many errors in spelling or grammar. Does not adhere to the word count requirement. Title page is included. Missing most information. Incorrect font and size is used or poor line spacing and large gaps in pagination. Paragraphs are used but large blocks of text with long sentences make it difficult to understand the ideas being conveyed. Spelling or grammar has errors but meaning remains clear. Does not adhere to the word count requirement. Title page is included but is missing key information. Some errors in font use and line spacing. Some pagination problems. One idea or concept per paragraph. Some paragraphs could be more succinctly written. Minor spelling or grammar errors. Adheres to the word count requirement. Title page is included with most required information. Minor errors in font, spacing, and format. One idea or concept per paragraph with 3–4 well- constructed sentences per paragraph. No errors in spelling or grammar. Adheres to the word count requirement. Title page is included with all required information. Font, spacing, and format are in accordance with the requirements of the assignment brief. Expert use of paragraphs with 3–4 well-constructed sentences per paragraph that follow logically from each other. No errors in spelling or grammar. Adheres to the word count requirement. Knowledge and understanding Understanding of the key concepts of computer-based business information systems including elements of systems and processes, and how systems aid competitive advantage. Lack of understanding of the required concepts and knowledge. Key components of the assignment are not addressed. Lack of application, and analysis of information to provide clear recommendations. Limited understanding of required concepts and knowledge. Some of the key components of the assignment are not addressed. Limited application and analysis to provide clear recommendations. Adequate knowledge or understanding of the required concepts. A reasonable capacity to explain and apply relevant key concepts. Supports opinion and information substantiated by evidence from research to provide recommendations. Thorough understanding of the key concepts. Discriminates between assertion of opinion and information substantiated by robust evidence from the research/course materials and extended reading. Highly developed understanding of the field or discipline/s. Systematically and critically discriminates between
Answered 2 days AfterAug 10, 2021MIS603

Answer To: You are required to research and write a report focused on the specific challenges and issues that...

Neha answered on Aug 13 2021
137 Votes
Introduction
In this report we will discuss about an organization which wants to incorporate micro service architecture and replace monolithic architecture. The green John wealth management private limited is a mature company and it has strong base for investment customers who have trust on the company with their i
nvestment portfolio. It behaves like core platform to manage the accounts and investment of the customer and reduce the time.
The monolithic platform is able to serve the requirements of customers and business but as the time has changed cloud-based solutions are offering agility and flexibility. There are many competitors who are evolving in their digital platform to meet the expectation of market and now the executive leadership team wants to understand the requirements of customer in different manner. In this report it discusses about the issues which can be faced when they are transforming from monolithic architecture to micro service architecture.
It includes the basic issues and security issues also. It provides few ways which can be used to mitigate the risk in organization. The same service can be used multiple times for different business processes on different channels with microservice architecture.
Monolithic Architecture
The monolithic architecture can be defined as traditional unified model which is used to design the software program. Monolithic means everything is composed in a single piece. It also means something which is too large or cannot be changed. This software is designed to be self-contained. All the components off the program are interdependent and interconnected instead of leaving them loosely coupled as done in modular software programs.
It is tightly coupled architecture and each component should be present to execute or compile the code. If the developer has to update any component that it will have rewrite the whole application. It will not allow to make changes on any module separately as it will have impact on the whole program. The modular architectures or generally used 2 reduce the risk which can be created by making change in one element as the modules are independent.
Microservice Architecture
The capabilities of micro services can be expressed with the help of business-oriented API. They are able to encapsulate the core business capability and then the implementation of the whole service. It can have integrations within the system, but it remains hidden with the help of interface which can be defined in the business terms. If we are able to position the different services in the form of valuable asset for the business, then it can easily promote them in the adaptable form for multiple usage.
The same service can be used multiple times for different business processes on different channels. The principle of loose coupling helps to reduce those dependencies between the customers and services. We can standardise over the contract which are expressed with business-oriented API, and it will not have impact over the customers with the changes made with the service implementation. It will allow the service owners to make the changes in the implementation or...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here