• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.001 ■ Spring 2023 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack
  • Zoom Meeting

Team Project

You and your team are:

  • Acting as the CSP (Cloud Service Provider)
  • Seeking PA (Preliminary Authorization) for your information system
  • Responsible for:
    1. Developing and documenting the system security architecture for your information system
    2. Developing a System Security Plan (SSP) for your information system
    3. Presenting your SSP to an internal senior management review team

Instructions for successfully completing 1, 2 & 3 (above) and 1 through 4 (below) will be provided throughout the semester in class.

Deliverables: (Hand in your assignment individually via Canvas. Each member of the team should submit an identical copies of the following documents in PDF format with your names on the files and in the documents via your individual Canvas:

  1. PowerPoint presentation
  2. System Security Plan (with completed sections and attachments as detailed above)
  3. Logical system security architecture diagrams (System’s logical network diagram with boundaries, interconnections and data flows to/from users and other/supporting systems, and security architecture components)
  4. 360 Degree Review – On a single page, list the members of your team including yourself and briefly describe each team member’s contribution to developing and delivering the deliverables
  • Each team not presenting will interview/question the SSP presentation team to help identify and clarify possible weaknesses in the information system’s security architecture being presented.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (1)
  • 01 – Threat Environment (2)
  • 02 – System Security Plan (5)
  • 03 – Planning and Policy (6)
  • 04 – Cryptography (3)
  • 05 – Secure Networks (6)
  • 06 – Firewalls (4)
  • 08 – Access Control (6)
  • 09 – Host Hardening (4)
  • 10 – Application Security (5)
  • 11 – Data Protection (3)
  • 12 – Incident and Disaster Response (4)
  • Uncategorized (3)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in