• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.001 ■ Spring 2024 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack

My question about System Security Plans to discuss with my classmates

January 17, 2024 by David Lanter 11 Comments

Filed Under: 02 - System Security Plan Tagged With:

Reader Interactions

Comments

  1. Ooreofeoluwa Koyejo says

    January 21, 2024 at 12:55 am

    I believe that the system security plans we have seen are detailed and serve the purpose of documenting and accountability for the implementation of baseline security controls in information systems.

    My question for the week is ‘Are the plans sufficient enough to prevent data breaches/security incidents? If not, can you propose a way to leverage these system security plans to cater to the event of a live security incident/data breach?

    Log in to Reply
    • Yannick Rugamba says

      January 23, 2024 at 12:30 am

      Good question, I think these security plans are a good starting point, but they might not be enough on their own to prevent all data breaches. Maybe we could improve them by adding real-time monitoring and a solid incident response strategy. This means keeping an eye on our systems constantly to spot any unusual activity and having a team ready to jump into action if something goes wrong

      Log in to Reply
  2. Ooreofeoluwa Koyejo says

    January 21, 2024 at 1:05 am

    3 categories of system security controls
    – Management Controls
    – Operational Controls
    – Technical Controls

    2 types of the nature of the system security controls
    – Physical Controls
    – Logical/Technical Controls

    Log in to Reply
  3. Eyup Aslanbay says

    January 21, 2024 at 3:15 pm

    My question is What is the purpose of categorizing an information system using FIPS 199 in the process of developing a System Security Plan?

    Log in to Reply
  4. Yannick Rugamba says

    January 21, 2024 at 6:41 pm

    My question is: What are some basic, yet important steps we can take to make sure our System Security Plan is always up-to-date and effective in responding to new cybersecurity threats?

    Log in to Reply
    • Edge Kroll says

      January 23, 2024 at 11:09 pm

      Maintaining an effective SSP involves regular risk assessments, continuous monitoring, and updates to policies. Conduct frequent risk assessments, use automated monitoring tools, and update security policies regularly. Employee training, robust patch management, and strong access controls contribute to a secure environment. Develop and test an incident response plan, collaborate with the cybersecurity community, and stay informed about emerging threats.

      Log in to Reply
  5. Edge Kroll says

    January 21, 2024 at 7:59 pm

    My question is: How can a system security plan successfully address the Human factor in security?

    Log in to Reply
  6. Jon Stillwagon says

    January 21, 2024 at 8:35 pm

    How long does it take for a system security plan to be accepted into being used for the company?

    Log in to Reply
  7. Celinemary Turner says

    January 21, 2024 at 9:14 pm

    Three categories of system security controls
    Administrative Controls: These are the rules, procedures, and guidelines established by an organization to oversee and regulate the security of its information systems.
    Technical Controls: This uses technology to enforce security measures, surveillance, and safeguarding of information systems.
    Physical Controls: Physical controls refer to methods implemented to safeguard the physical components of information systems, such as hardware, facilities, and equipment.
    There are two types of system security controls.
    Preventive Controls: These are procedures implemented to prevent security incidents or breaches.
    Detective Controls: Detective controls are systems created to detect and address security problems or unauthorized activities that have already taken place.

    The System Security Plan (SSP) is evaluated by the Authorizing Official (AO), who then grants the Authorization to Operate (ATO). In order to protect data and guarantee system security,

    My question for the week. Can the authorization procedure and the granting of an ATO be impacted by the non-submission of the necessary paperwork, such as the SSP?

    Log in to Reply
  8. Bo Wang says

    January 21, 2024 at 10:25 pm

    My question is how to account for those uncertainties, such as natural factors and unintentional human factors, in developing a safety plan.

    Log in to Reply
    • Jon Stillwagon says

      January 23, 2024 at 10:02 pm

      I think that the risk mitigation would take affect at this point so that way the organization can better protect their technology from such things like what you described. It would also benefit from people trying to get into the system and cause harm.

      Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (1)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (4)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in