• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.001 ■ Spring 2024 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack

My question to discuss with my classmates

February 28, 2024 by David Lanter 9 Comments

Filed Under: 08 - Access Control Tagged With:

Reader Interactions

Comments

  1. Yannick Rugamba says

    March 10, 2024 at 8:41 pm

    Is enhancing security through the principle of privilege detrimental, to productivity and user satisfaction? How can we find a ground, between security and ease of use?

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      March 11, 2024 at 4:54 pm

      Do you mean the principle of least privilege, if yes, I do not think it is detrimental however, it could potentially impact operational productivity where users have multiple roles and responsibilities within an organisation which introduces some level of complexity to access control. With this, I suggest security professionals explore dynamic access control mechanisms in their infrastructure through the appropriate use of centralized management and monitoring of user activities within the network.

      Log in to Reply
  2. Celinemary Turner says

    March 11, 2024 at 3:04 am

    What type of access control provides the strongest level of protection?

    Log in to Reply
    • Eyup Aslanbay says

      March 12, 2024 at 10:56 pm

      -Multi factor Authentication (MFA):
      -Role-Based Access Control (RBAC)
      -Attribute-Based Access Control (ABAC)
      -Least Privilege Principle:

      Log in to Reply
  3. Jon Stillwagon says

    March 11, 2024 at 3:19 pm

    Do authenticators assurance levels get reevaluated after a certain amount of time?

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      March 11, 2024 at 4:56 pm

      I believe with continuous improvement, changing risk levels and threats, it is important to continually re-evaluate assurance levels to ensure the adequacy and sufficiency of the authenticators implemented.

      Log in to Reply
  4. Ooreofeoluwa Koyejo says

    March 11, 2024 at 4:08 pm

    Does Zero-Trust architecture solve the risks and threats in identity management?

    Log in to Reply
  5. Eyup Aslanbay says

    March 11, 2024 at 10:14 pm

    Can a domain have multiple domain controllers?

    Log in to Reply
  6. Bo Wang says

    March 12, 2024 at 8:05 pm

    Can tokens be stored with other device?

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (1)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (4)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in