Security architecture & design – person mapping


Question A

  • Acknowledge at least two types of accounts that should not be mapped to a person; explain your reasoning.

Question B

Each week, research a unique news story or article related to Information Security/Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source.