• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • Week 01: Introduction
    • Week 02: Security and Risk Management
    • Week 03: Asset Security
    • Week 04: Security Engineering
    • Week 05: Communication and Network Security
    • Week 06: Identity and Access Management
    • Week 07: Security Assessment and Testing
    • Week 08: Security Operations
    • Week 9: Software Development Security
  • Assignments
    • Reading Assignments
    • Weekly Discussion Questions
    • In the News Article
    • Team Presentation
  • Quizzes
  • Webex
  • Group Project Discussion
    • Team 1 – Banking
    • Team 2 – Healthcare
    • Team 3 – Power Utility
    • Team 4 – Retail

Cyber Security Capstone

Temple University

Week 12: Security Threats & Mitigation

July 26, 2019 By William Bailey 22 Comments

During this last week of Discussion Questions, I would ask that you reflect that you consider at least one of the following:

  1. Which security threats did you become aware of during this capstone class?  How would you mitigate against this threat?
  2. What mitigation methods did you become aware of for the first time during this capstone class? Why is that mitigation method unique, more efficient or effective, or otherwise significant?

 

Week 12: In the News – Security Threats & Mitigation

July 26, 2019 By William Bailey 18 Comments

For this week’s “In the News”, locate an article that discusses one of the following:

  1. new security threats
  2. changing security threats
  3. reduced security threats?

In regards to the threats that you have identified, how does the threat change the steps that the organization would take to mitigate, or lessen, the risk from that threat?

Week 11: Incident Response

July 19, 2019 By William Bailey 24 Comments

Answer at least one of the following questions:

You’ve been hired as a consultant by an organization not due to a breach, but because their regulator documented a finding that the organization must redefine their Incident Response Program.

  1. How do you garner support for this effort if the organization disagrees with the regulator’s finding?
  2. What would your project plan look like if you must correct this finding prior to the next annual audit?

Week 11: In the News – Incident Response

July 19, 2019 By William Bailey 26 Comments

For this week’s “In the News”, research a recent article, providing the link to the article, that describes an incident that impacted an organization.

  • How was the impact worse or reduced because of their Incident Response Program?
  • What were the strengths of their Incident Response Program?

Week 10: In the News – Success or Impact of New Trends

July 12, 2019 By William Bailey 20 Comments

For this week’s In the News, research an article how an organization has improved their productivity, efficiency, or quality of their key business services by adopting one of the New Trends in Information Security.

Week 10: New Trends in Information Security

July 12, 2019 By William Bailey 21 Comments

This week, choose one of the following new trends, and relate what the business implications (benefit, risk, threat) of the new trend. If this is a risk or threat to the organization, why does the organization accept the risk, or what else does the organization do to minimize the threat?

  1. Cloud Computing resources
  2. Internet of Things
  3. Mobile Devices
  4. Changing Privacy Legislation

Week 9 : Application Development Security

July 5, 2019 By William Bailey 27 Comments

For this week’s Discussion, we consider Application (Software) Development. Answer at least one of the following questions:

  1. During which phase should Information Security be included? How would you explain to someone that Information Security has a role without a finalized product yet?
  2. Choose one of the popular software development methodologies, such as Scrum, Agile, or Waterfall; how does the choice of the methodology affect Information Security concerns?

Week 9 : In the News – Application Security

July 5, 2019 By William Bailey 21 Comments

For this week’s “In the News”, research an article dealing with how secure code development practices (or lack thereof) affected a major software project; was the project more or less successful as a result?

Week 8: In the News – Business Continuity & Disaster Recovery

June 28, 2019 By William Bailey 23 Comments

For this week’s “In the News”, research a recent article that relates how an organization was benefitted by their business continuity program, or suffered due to the lack of an adequate program? What are the key lessons learned from the article?

Week 8: Business Continuity & Disaster Recovery

June 28, 2019 By William Bailey 28 Comments

Answer one of the following questions:

  1. Considering that business continuity does not support day-to-day operations until a crisis situation, how does one justify the design, implementation, maintenance, and testing for business continuity system(s)?
  2. When using third-parties, how would you gain adequate confidence in their ability to maintain availability for their systems? What techniques or solutions would you use?

Week 7: In the News – Security Assessments

June 21, 2019 By William Bailey 25 Comments

For this week’s “In the News”, perform research on one of the following:

  • new testing requirements (e.g. SSAE18 SOC1 or SOC2)
  • new testing requriements put into place due to regulations
  • how security assessments and testing integrates with other domains, such as cloud network architecture, or software development lifecycle?

Week 7: Security Assessments

June 21, 2019 By William Bailey 30 Comments

As you read about security assessments, what can you conclude from this week’s readings about:

  • How often security assessments should be performed?
  • Are there factors that would decide how often you would perform these assessments?
  • Conditions that might alter that schedule?
  • What security assessments are most essential?

Week 6: Identity & Access Management

June 14, 2019 By William Bailey 27 Comments

For this week’s Discussion, consider that you want senior management to support a new Access Management program at your organization. While this may involve technology-based solutions, your budget may be limited and it is therefore essential that senior management provide support and encourage efficient use of the resources that the organization already has.

  • Why is access management critical to today’s enterprise?
  • What benefits does an enterprise gain from proper access management?

Week 6: In the News – Compromised Identities, Improper Use of Access

June 14, 2019 By William Bailey 29 Comments

For this week’s “In the News”, research an article that centers around how identities were compromised to provide access, or how an account that was otherwise authorized was then used for unauthorized purposes.

Week 5: In the News – New Developments in Communications and Network Security

June 7, 2019 By William Bailey 30 Comments

For this week’s “In the News”, research a new technology solution, or new method to utilize a previous technology, to address Communications and Network Security. How does this solution or application revolutionize networks? If this is particular to certain industries, please also include that detail.

Week 5: Communications and Network Security

June 7, 2019 By William Bailey 34 Comments

When designing a network for an organization, what are the key considerations that should be factored into the design?  Why do you recommend those considerations?  Also consider how you would address the inevitable situation of scarce resources; how would you prioritize?

Week 4: In the News – Enterprise Architecture

May 31, 2019 By William Bailey 25 Comments

For this week’s “In the News”, research and article that discusses today’s approach to Enterprise Architecture. Specifically, how has a recent organization modified their architecture to meet an acquisition, divesture, or change in business?

Week 04: Enterprise Architecture

May 31, 2019 By William Bailey 34 Comments

When designing an architecture for an organization, how do organizations best meet the needs to define reasonable permissions?

As a security practitioner, what measures would you implement to ensure that staff can perform their job duties, but minimize the risk of unauthorized use or disclosure?

 

Week 3: DQ – Protecting Privacy

May 24, 2019 By William Bailey 33 Comments

In Domain #2, we discuss Asset Security, and following on Domain #1, recall that Data (or Information) is an organization’s key asset, and that the asset may exist in various forms – not just paper, but those digital assets. Also recall that there are several factors that should be included when determining the true cost or value of the asset to the organization.

How would Data Classification and Data Retention policy help an organization protect the privacy of the customers, as well as maintain the security of the organization’s information?

Week 3: In the News – Protecting Privacy

May 24, 2019 By William Bailey 25 Comments

During this week, research a recent law concerning privacy. Summarize this recent law for us:

  • What information does it protect,
  • What controls or limitations does the law specify,
  • What organizations need to comply with the law, and
  • In which regions would we need to be concerned with this law?

How does this law represent new risk(s) to the organization?

 

Primary Sidebar

Weekly Discussions

  • Week 01: Introduction (1)
  • Week 02: Security and Risk Management (3)
  • Week 03: Asset Security (2)
  • Week 04: Security Engineering (2)
  • Week 05: Communication and Network Security (3)
  • Week 06: Identity and Access Management (1)
  • Week 07: Security Assessment and Testing (2)
  • Week 08: Security Operations (2)
  • Week 09: Software Development Security (2)
  • Week 10: New Trends (2)
  • Week 11: Incident Response (2)
  • Week 12: IT Security (2)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in