• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.001 ■ Spring 2023 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack
  • Zoom Meeting

Participation

Much of your learning will occur as you prepare for and participate in discussions about the course material. In addition to fulfilling your weekly assignments you are required to:

  1. Comment on your classmates’ discussion questions and/or key points they took away from the readings: Read your classmates’ discussion questions and key points they took away from the assigned readings – and contribute at least three (3) substantive posts that include your thoughtful answers to their discussion questions and/or comments on the key points made about the readings. Your posting of your three comments is due noon Tuesday.
  1. Post an article to the “In the News” Post: Contribute a link and be prepared to discuss in class an article you found about a current event in the Information Security arena. An ideal article would be tied thematically to the topic of the week.  However, any article you find interesting and would like to share is welcome. The deadline for posting is noon Tuesday.

Evaluation online and in-class participation will be based on what you contribute, not simply what you know.  Frequency and quality of your contributions are equally important.

Note: Late submissions for participation deadlines will result in no (0) credit earned for Comments and In the News articles.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (1)
  • 01 – Threat Environment (2)
  • 02 – System Security Plan (5)
  • 03 – Planning and Policy (6)
  • 04 – Cryptography (3)
  • 05 – Secure Networks (6)
  • 06 – Firewalls (4)
  • 08 – Access Control (6)
  • 09 – Host Hardening (4)
  • 10 – Application Security (5)
  • 11 – Data Protection (3)
  • 12 – Incident and Disaster Response (4)
  • Uncategorized (3)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in