• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.001 ■ Spring 2024 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack

My question to discuss with my classmates

March 27, 2024 by David Lanter 14 Comments

Filed Under: 11 - Data Protection Tagged With:

Reader Interactions

Comments

  1. Yannick Rugamba says

    March 31, 2024 at 2:50 pm

    In your opinion, what is the single most important aspect of a company’s backup strategy..

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      April 1, 2024 at 2:10 pm

      I would say it is testing the backups done to ensure they are valid and useful in the event of a security incident or data breach.

      Log in to Reply
  2. Eyup Aslanbay says

    March 31, 2024 at 5:20 pm

    How does backup ensure availability?

    Log in to Reply
    • Jon Stillwagon says

      April 2, 2024 at 7:14 pm

      Backing up your data could make it portable for people to gain access to the data you are backing up.

      Log in to Reply
    • Celinemary Turner says

      April 2, 2024 at 9:00 pm

      By having a reliable backup system in place, organizations can ensure that their data and systems are always available, even in the face of unexpected disruptions.

      Log in to Reply
  3. Jon Stillwagon says

    March 31, 2024 at 5:26 pm

    Are database access control systems limited to a certain number of systems that can manage their database structures and restrict access?

    Log in to Reply
  4. Celinemary Turner says

    March 31, 2024 at 6:27 pm

    How can data be protected while it is being stored, transmitted and processed?

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      April 1, 2024 at 2:20 pm

      My submission…
      Data in store: encryption at rest e.g. AES 256 and column-level encryption
      Data in transmission: use of TLS/SSL
      Data being processed: hashing to ensure integrity of data at each phase of processing.

      Log in to Reply
  5. Bo Wang says

    March 31, 2024 at 8:38 pm

    What are the different between information and data?

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      April 1, 2024 at 2:17 pm

      The popular difference I have held on to is that information is processed data i.e. raw records that have been manipulated, and sorted to make meaningful insights from.

      Log in to Reply
    • Celinemary Turner says

      April 2, 2024 at 9:10 pm

      While often used interchangeably, there is a major difference between information and data. Data becomes information when it’s processed, analyzed, and presented in a way that provides value and meaning.

      Log in to Reply
  6. Ooreofeoluwa Koyejo says

    March 31, 2024 at 9:19 pm

    What are the other ways organisations can protect customer data from exposure in the event of a data breach?

    Log in to Reply
    • Celinemary Turner says

      April 2, 2024 at 9:22 pm

      In addition to backup and access controls, organizations can protect customer data from exposure in the event of a data breach by:
      Encryption, Masking, Tokenization, Segmentation, Monitoring, Incident Response Planning. Data Loss Prevention (DLP) Secure Coding Practices, Regular Security Audits, and Risk Assessments, and finally, employee Education and Awareness:

      Log in to Reply
  7. Edge Kroll says

    March 31, 2024 at 10:28 pm

    How can organizations strike a balance between ensuring data accessibility for legitimate users while also protecting against unauthorized access?

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (1)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (4)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in