-
Gregory S. Senko wrote a new post on the site MIS5214 Security Architecture 8 years, 10 months ago
The reading assignment for week 1 is:
Where is infrastructure headed in 2015
As we head into 2016, I find that the issues we faced in early 2015 are still the high priority issues for Enterprise security in […]
-
Gregory S. Senko commented on the post, All Quizzes and Solutions Posted, on the site 9 years, 6 months ago
That is odd. I will double check.
-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 6 months ago
I have posted the last of the quizzes that will be included in the material ion the final exam.
To easily find the quizzes search for “quiz” and search for “solutions” for the solution pdfs.
Thanks to the folks who identified problems with the solution posting. They have been corrected.
-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 7 months ago
-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 7 months ago
Because of last week’s cancellation. The material we will cover this week was originally intended for week 13.
-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 7 months ago
I had a request to plain post the slides along with the voice over video. It is now posted with the week 10 materials.
-
Gregory S. Senko commented on the post, Week 10 Materials – lecture, quiz, on the site 9 years, 7 months ago
Posted 🙂
-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 7 months ago
Semester Project
REQUIRED: any diagrams and supporting text necessary to complete the work proposed in your abstract and outline.– Logical diagram
– Enterprise diagram
– Security system-specific physical diagram(s)
– Any notes required to explain the diagram (can be annotations directly on the diagram(s))We have seen lots of examples of logical diagrams in our class sessions, below is an example of a physical diagram (Courtesy of Dave Lanter):
(Click on the image to get a full version in another tab.)
-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 7 months ago
You can use the search function to find the Quiz and Quiz Solutions posts. Recent quizzes have been added.
-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 7 months ago
Sorry for the short notice – our class for tonight is cancelled.
In contrast to other classes where I we have not met in person, but I have assigned readings, quizzes, homework, lecture material, etc, I AM POSTPONING THIS WEEK’S LECTURE AND CLASS ACTIVITIES UNTIL NEXT WEEK.
What that means is:
– there will be no new assignment this Friday
– I will push back the class schedule depicted in the syllabus by one week, eliminated the “special topics” class
– Instead, this weekend, I will post the quizzes and solutions to date for you to study
– I will post brief  “voiced over” materials clarifying the final project and encouraging you to contact me to set-up one-on-one meetings (probably by phone) to address your specific questions
-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 7 months ago
BYOD and Cloud are Top Data Breaches and Malware Risk
http://www.csoonline.com/article/2906359/data-breach/byod-and-cloud-are-top-data-breaches-and-malware-risks-survey-shows.html
Cloud computing brings changes for IT security pros
http://www.computerworld.com/article/2907920/cloud-computing-brings-changes-for-it-security-pros.htmlVideo: Inside the IoT
-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 7 months ago
Assignment:
Apparently I have not made it clear that when I ask for a physical architecture diagram in this class, I am referring to a network diagram that depicts specific devices on the network with annotations explaining their role in the specific function depicted in the diagram. For example, in previous week’s assignments, I expected to see, among other things, depiction of PKI infrastructure, key management systems, certificate tracking and revocation facilities, firewalls, routers, etc. It has become apparent to me that future classes will have to have their assignements graded to rate them for quality in order to foster an expression of comphrehension and (ideally) mastery of the course concepts in their weekly work.
1. Read the following article:
9 top threats to cloud computing security2. Draw a physical network architecture diagram that provides capabilities to address 5 of the 9 vulnerabilites identified in the above article.
3. Write a brief description of  how your architecture mitigates each of the 5 vulnerabilities that you selected to address.
Send the diagram and text for item 3 in the body of the email with subject “Week 13 assignment” to my tue90933@temple.edu email address by 8 PM on Wednesday April 9th.
-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 7 months ago
-
Gregory S. Senko commented on the post, Progress Report for Week Ending, September 29, on the site 9 years, 7 months ago
Wen,
I found the problem. The file is too big to post in WordPress (well at least with our current settings.
Sorry,
Greg
-
Gregory S. Senko commented on the post, ICE 5.1 Telling a Story through Visualization, on the site 9 years, 7 months ago
I am on the road and having a hard time finding it. Sorry! More later …
-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 7 months ago
Assignment:
1. Read the following articles:
BYOD & Mobile Device Management: A Strategic Whitepaperhttp://media.cms.bmc.com/documents/bmc-byod-and-mobile-device-management-a-strategic-whitepaper.pdf
Mobile Device Management: Vendors and Comparison Guide
http://www.tomsitpro.com/articles/mdm-vendor-comparison,2-681-2.html
Why digital certificates for mobile devices?
http://community.arubanetworks.com/t5/Technology-Blog/Why-digital-certificates-for-mobile-devices/ba-p/174734
Deploying iPhone and iPad Digital Certificates
https://www.apple.com/hk/en/ipad/business/docs/iOS_6_Certificates_Sep12.pdf2. Write a brief description of why and how MDM systems are used AND a brief description of why and how digital certificates are beginning to be used for mobile security. Send it in an email with the subject: “Week 12 assignment” to my tue90933@temple.edu account by mid-day Wednesday.
-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 8 months ago
Hopefully you all got my email informing you that we will not be meeting in person (again) this week.
Instead, I would like you to watch the video presentation at the link below and get familiar (don;t worry about memorizing details) of the article also at a link below. I have also posted this week’s quiz.
I look forward to seeing you all again on April 3!
****************************************************
Network defense in depth
https://www.brighttalk.com/webcast/8615/97927Please note: you will have to sign up for a (free) Brighttalk account if you do not have one to watch this video.
Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0CB4QFjAA&url=https%3A%2F%2Fics-cert.us-cert.gov%2Fsites%2Fdefault%2Ffiles%2Frecommended_practices%2FDefense_in_Depth_Oct09.pdf&ei=dmURVeL9LIy8ggSKooOIBg&usg=AFQjCNFP8ocYJAcUJhJQOtUzmRUyrFjmIQ&sig2=lOP5-KD5-eaztmLlr9My_wSorry, for the long link. You can just search for the title if it is a problem.
-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 8 months ago
Assignment:
1. Read the following articles:
Defense In Depth: A Blueprint For Securityhttp://www.informationweek.com/defense-in-depth-a-blueprint-for-security/d/d-id/1061550?
Are You Managing Your Security Risks?
http://www.industrial-ip.org/en/knowledge-center/solutions/security-and-compliance/are-you-managing-your-security-risks
2. Create a network diagram, showing physical components on the network
and annotating their functions, that depicts a defense-in-depth strategy. -
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 8 months ago
I’ve attached the lecture I have recorded as a voice-over of Powerpoint slides. It covers some important materials. So, please give it a listen. Here is the quiz for this week, too.
-
Gregory S. Senko wrote a new post on the site MIS5214 – Security Architecture 9 years, 8 months ago
Reminder – we will not be meeting as a group this week.
Assignment:
1. Read the following articles:
Network Authentication, Authorization, and Accounting: Part One
http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_10-1/101_aaa-part1.html
SolutionBase: Best practices for implementing RADIUS
http://www.techrepublic.com/article/solutionbase-best-practices-for-implementing-radius/NPS Authorization Process
https://technet.microsoft.com/en-us/library/dd197420%28v=ws.10%29.aspx
2. Create a network diagram that depicts the devices and protocols needed to protect the network from “rogue” services and processes and send it to my greg.senko@temple.edu email by noon on Wednesday 3/18.
3. View this week’s lecture materials. that I will post separate, by the end of the day Sunday 3/16. - Load More