how can the secure design be implemented?
Part 1
As you consider the reputation service and the needs of customers or individual consumers, as well as, perhaps, large organizations that are security conscious like our fictitious enterprise, Digital Diskus, what will be the expectations and requirements of the customers? Will consumers’ needs be different from those of enterprises? Who owns the data that is being served from the reputation service? In addition, what kinds of protections might a customer expect from other customers when accessing reputations?
Answer the questions with an APA-formatted paper (Title page, body and references only). Your response should have a minimum of 500 words.
Part 2
In today’s fast-paced, often “agile” software development, how can the secure design be implemented?
Answer the questions with an APA-formatted paper (Title page, body and references only). Your response should have a minimum of 600 words.