• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.001 ■ Spring 2024 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack

02 - System Security Plan

Wrap Up

January 24, 2024 by David Lanter

Lecture slides

  • University of Washington Threat Modeling Cards
  • Threat Modeling Cards – Human Impact (blue)
  • Threat Modeling Cards – Adversary Motivation (orange)
  • Threat Modeling Cards – Adversary’s Resources (red)

Filed Under: 02 - System Security Plan Tagged With:

NIST SP 800-100, Chapter 10 “Risk Management”

January 17, 2024 by David Lanter 18 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 02 - System Security Plan Tagged With:

NIST SP 800-18r1 “Guide for Developing Security Plans for Federal Information Systems”

January 17, 2024 by David Lanter 18 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 02 - System Security Plan Tagged With:

“FedRAMP-High-Moderate-Low-LI_SaaS-Baseline-System Security Plan (SSP) Template”

January 17, 2024 by David Lanter 18 Comments

Post your thoughtful analysis about one key point you took from or observe in this assigned reading.

Filed Under: 02 - System Security Plan Tagged With:

My question about System Security Plans to discuss with my classmates

January 17, 2024 by David Lanter 11 Comments

Filed Under: 02 - System Security Plan Tagged With:

In The News

January 17, 2024 by David Lanter 7 Comments

Contribute a link and a brief summary.

Filed Under: 02 - System Security Plan Tagged With:

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (1)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (4)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in