• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.001 ■ Spring 2024 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack

David Lanter

In The News

March 13, 2024 by David Lanter 7 Comments

Filed Under: 09 - Host Hardening Tagged With:

Boyle and Panko Chapter 5 Access Control

February 28, 2024 by David Lanter 15 Comments

Filed Under: 08 - Access Control Tagged With:

NIST SP 800 63-3 “Digital Identity Guidelines”

February 28, 2024 by David Lanter 15 Comments

Filed Under: 08 - Access Control Tagged With:

NIST SP 800 63A “Digital Identity Guidelines Enrollment and Identity Proofing”

February 28, 2024 by David Lanter 8 Comments

Filed Under: 08 - Access Control Tagged With:

NIST SP 800 63B “Digital Identity Guidelines Authentication and Lifecycle Management”

February 28, 2024 by David Lanter 10 Comments

Filed Under: 08 - Access Control Tagged With:

My question to discuss with my classmates

February 28, 2024 by David Lanter 9 Comments

Filed Under: 08 - Access Control Tagged With:

In The News

February 28, 2024 by David Lanter 7 Comments

Filed Under: 08 - Access Control Tagged With:

Wrap Up

February 21, 2024 by David Lanter

Presentation slides

These are the same quizzes and solutions found under: 05 – Secure Networks

Quiz-1 and solutions

Quiz-2 and solutions

Filed Under: 06 - Firewalls Tagged With:

Boyle and Panko Chapter 6 – Firewalls

February 14, 2024 by David Lanter 22 Comments

Filed Under: 06 - Firewalls Tagged With:

Basile, C., Matteo, M.C., Mutti, S. and Paraboschi, S, “Detection of Conflicts in Security Policies”, in Vacca, J.R. (2017)

February 14, 2024 by David Lanter 15 Comments

http://community.mis.temple.edu/mis5214sp2019bnai/files/2019/01/Vacca_Chapter55_DetectionOfConflictsInSecurityPolicies.pdf

Filed Under: 06 - Firewalls Tagged With:

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Interim pages omitted …
  • Page 7
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (1)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (4)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in