Discussion: Security-Architecture
If supporting evidence from outside resources is used proper citation is required. Your submission should largely consist of your own thoughts and ideas but may be supported by citations and references.
1) Question: Assume you have threat modelled an Application Programming Interface (API). Describe what threats there might be and how those could be mitigated.
2) Question: Define key aspects of a data privacy policy for a hypothetical e-commerce web site.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.