• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.001 ■ Spring 2024 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack

My question to discuss with my classmates

February 7, 2024 by David Lanter 11 Comments

Filed Under: 05 - Secure Networks Tagged With:

Reader Interactions

Comments

  1. Ooreofeoluwa Koyejo says

    February 10, 2024 at 9:16 pm

    What are some simplifications in security architecture that can be incorporated into corporate systems to improve enterprise security?

    Log in to Reply
  2. Yannick Rugamba says

    February 11, 2024 at 2:11 pm

    How does the concept of ‘death of the perimeter’ influence our approach to network security, especially with the rise of remote work and cloud computing?”

    Log in to Reply
  3. Bo Wang says

    February 11, 2024 at 4:07 pm

    Is there any way to protect from DDOS attack?

    Log in to Reply
    • Eyup Aslanbay says

      February 13, 2024 at 11:23 pm

      To protect against DDoS attacks, it’s essential to combine strategies like increasing bandwidth, using DDoS mitigation services, and ensuring a robust network architecture. Implementing firewalls, intrusion prevention systems, and rate limiting can help filter out malicious traffic.

      Log in to Reply
  4. Celinemary Turner says

    February 11, 2024 at 8:03 pm

    Is there a means of using cloud infrastructure that can help prevent/mitigate DDoS attacks?

    Log in to Reply
    • Eyup Aslanbay says

      February 13, 2024 at 11:25 pm

      Cloud infrastructure combats DDoS attacks with scalability, global distribution, and built in security features like elastic load balancing and DDoS mitigation services. Its ability to distribute traffic and provide real-time analysis helps reduce the impact and risk of such attacks effectively.

      Log in to Reply
  5. Edge Kroll says

    February 11, 2024 at 8:52 pm

    How can organizations ensure the confidentiality, integrity, and availability of their data when utilizing cloud services?

    Log in to Reply
    • Celinemary Turner says

      February 12, 2024 at 8:50 pm

      Organizations should implement robust security measures to protect sensitive data and ensure that systems are secure, including firewalls, encryption, and access controls. This may involve working with cloud service providers to ensure that their security protocols are sufficient to meet the organization’s needs.

      Log in to Reply
  6. Jon Stillwagon says

    February 11, 2024 at 11:12 pm

    With public key infrastructure how is it determined that the system won’t be critically hurt by availability?

    Log in to Reply
  7. Eyup Aslanbay says

    February 13, 2024 at 11:11 pm

    What is the most common attack against wireless networks?

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      February 14, 2024 at 11:04 am

      I’d say war-driving which attackers use as a part of the reconnaissance process, there’s also packet sniffing: an attacker joins the network as an intruder, and reads and listens to the transmission happening on the network to gather information. Rogue access points are another one where an attacker includes an access point to the network

      Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (1)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (4)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in