• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.001 ■ Spring 2024 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack

My question to discuss with my classmates

March 20, 2024 by David Lanter 11 Comments

Filed Under: 10 - Application Security Tagged With:

Reader Interactions

Comments

  1. Jon Stillwagon says

    March 23, 2024 at 4:43 pm

    Is it always a good idea to harden your applications or when there is a suspicion of an intrusion?

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      March 25, 2024 at 8:43 pm

      I would say that best practice should be applying patches as soon as they are available and tested successfully for compatibility and not at the point of a suspicious intrusion,

      Log in to Reply
  2. Eyup Aslanbay says

    March 23, 2024 at 4:49 pm

    What dangers do cookies create?

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      March 25, 2024 at 8:44 pm

      one that comes to mind is exposure of sensitive and personal information stored in the cookies

      Log in to Reply
  3. Celinemary Turner says

    March 24, 2024 at 2:38 am

    What is the most effective way to protect web applications?

    Log in to Reply
  4. Bo Wang says

    March 24, 2024 at 8:50 pm

    How can I avoid booby-trapped apps?

    Log in to Reply
  5. Yannick Rugamba says

    March 24, 2024 at 10:08 pm

    What do you think are the most important factors to consider when analyzing and managing the attack surface of a web application, and why?

    Log in to Reply
  6. Ooreofeoluwa Koyejo says

    March 25, 2024 at 8:42 pm

    What does an effective defence-in-depth look like in the protection of web applications?

    Log in to Reply
    • Celinemary Turner says

      March 26, 2024 at 9:18 pm

      An effective defense-in-depth for web application protection involves a multi-layered approach that includes Network Security (Firewalls). Application Security ( Secure coding practices, vulnerability scanning). Authentication and Authorization( Strong authentication mechanisms (e.g., multi-factor authentication).Data Encryption.
      By implementing these multiple layers of defense, organizations can significantly reduce the risk of a successful attack and protect their web applications from various threats.

      Log in to Reply
  7. Edge Kroll says

    March 26, 2024 at 6:09 pm

    What measures can developers take to prevent SQL injection attacks in their web applications?

    Log in to Reply
    • Celinemary Turner says

      March 26, 2024 at 9:05 pm

      To prevent SQL injection attacks, developers should regularly update and patch software and keep databases, frameworks, and libraries up to date with the latest security patches.

      Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (1)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (4)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in