SECURITY ARCHITECTURE & DESIGN

Consider the data flow “octopus,” as shown in Figure 8.1. How can the analysis system gather data from all these sources that, presumably, are protected themselves?

Minimum 600 words

This assignment should be in APA format and have to include at least two references.