Subject: Security Architecture & Design Please respond to BOTH of the following questions: Question A Acknowledge at least two types of accounts that should not be mapped to a person; explain your reasoning. Question B Each week, research a unique news story or article related to Information Security/Information Technology. Post a summary of what you learned to the discussion thread, please also provide a link to the original article. Source is your choice; however please fully cite your source. Please respond to the initial question by "Wednesday", post should be 150 to 200 words, but may go longer depending on the topic. ( initial post, clearly present well-reasoned ideas and concepts ). If you use any source outside of your own thoughts, you should reference that source. Include solid grammar, punctuation, sentence structure, and spelling. " NO PLAGIARISM" Learning Materials and References (Prof posted in course syllabus) Required Resources Shostack, Adam. Threat Modeling: Designing for Security , Indianapolis, IN: Wiley, 2014 Recommended Resources Please use the following author’s names, book/article titles, Web sites, and/or keywords to search for supplementary information to augment your learning in this subject. Tony UcedaVelez and Marco M. Morana Rick Centric Threat Modeling: Process for Attack Simulation and Threat Analysis ...