Security Architecture And Design #7.1

Chapter #7 from the textbook

If an attacker can retrieve the API and libraries, then use these to write an agent, and then get the attacker’s agent installed, how should Digital Diskus protect itself from such an attack? Should the business analytics system provide a method of authentication of valid agents in order to protect against a malicious one? Is the agent a worthy attack surface?

Answer the question with a short paragraph, with a minimum of 250 words. Count the words only in the body of your response, not the references.  APA formatting but do not include a title page, abstract or table of contents. Body and references only in your post.

A minimum of two references are required.  One reference for the book is acceptable but multiple references are allowed.  There should be multiple citations within the body of the paper.  Note that an in-text citation includes author’s name, year of publication and the page number where the paraphrased material is located.