Discussion: Security Architecture & Design
1. Assume you have threat modelled an Application Programming Interface (API). Describe what threats there might be and how those could be mitigated.
2. Define key aspects of a data privacy policy for a hypothetical e-commerce web site.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.