• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.001 ■ Spring 2024 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack

Question to discuss with my classmates

April 3, 2024 by David Lanter 14 Comments

Filed Under: 12 - Incident and Disaster Response Tagged With:

Reader Interactions

Comments

  1. Ooreofeoluwa Koyejo says

    April 6, 2024 at 11:17 am

    Aside from the known tabletop exercises and simulations of incidents as a way of preparing for incidents, what other ways do you suggest to help organisations improve their incident response process?

    Log in to Reply
  2. Eyup Aslanbay says

    April 7, 2024 at 7:57 pm

    What four protections can firms provide for people during an emergency?

    Log in to Reply
  3. Jon Stillwagon says

    April 7, 2024 at 8:05 pm

    How does confidentiality play a part in a business continuity plan?

    Log in to Reply
    • Celinemary Turner says

      April 9, 2024 at 9:19 pm

      Confidentiality plays a crucial role in a business continuity plan by ensuring that sensitive information is protected during a disaster or disruption. By prioritizing confidentiality in a business continuity plan, organizations can:
      * Protect sensitive information from unauthorized access or disclosure
      * Maintain trust with customers and stakeholders
      * Comply with regulatory requirements
      * Prevent reputational damage
      * Ensure continuity of critical operations.

      Log in to Reply
  4. Celinemary Turner says

    April 7, 2024 at 8:37 pm

    What is the difference between a business continuity plan and an information system contingency plan?

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      April 9, 2024 at 5:32 pm

      Using the nomenclature, I’ll submit that a business continuity plan is documented with activities and procedures to ensure the business (entire operations of the organisation) does not get impacted or interrupted in the event of an incident so that its services and products are not disrupted from being delivered to its customers or users while an information system contingency plan is a plan that is specific to an information system to ensure it remains functional in the event of a disruption to it.

      Log in to Reply
  5. Edge Kroll says

    April 7, 2024 at 8:56 pm

    What are the essential components that businesses should consider when developing and implementing a Disaster Recovery Plan (DRP)?

    Log in to Reply
    • Celinemary Turner says

      April 9, 2024 at 9:15 pm

      When developing and implementing a Disaster Recovery Plan (DRP), businesses should consider the following essential components:
      Business Impact Analysis (BIA), Risk Assessment, Disaster Recovery Goals: Define recovery time objectives (RTOs) and recovery point objectives (RPOs) for critical systems and data.
      Emergency Response Plan and Data Backup and Storage.

      Log in to Reply
  6. Yannick Rugamba says

    April 7, 2024 at 11:59 pm

    Is an IDS a preventative, detective, or restorative control?

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      April 9, 2024 at 5:29 pm

      I believe an IDS – Intrusion DETECTION system is a detective control, it is not preventative because IDS does not perform any action, it only logs and alerts the analysts this is where an IPS- Intrusion PREVENTION comes in which would perform an action when a threat is identified.

      Log in to Reply
  7. Yannick Rugamba says

    April 8, 2024 at 12:00 am

    At what phase of the System Development Life Cycle (SDLC) do you think it is most critical to start incorporating information system contingency planning considerations and strategies, and why?

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      April 9, 2024 at 5:27 pm

      If the application being built is core to business operations then I would suggest contingency planning is infused into every phase of the SDLC.

      Log in to Reply
    • Celinemary Turner says

      April 9, 2024 at 9:04 pm

      Incorporating contingency planning during the initiation phase sets the stage for a resilient and recoverable system, reducing the risk of costly rework and ensuring that the system meets business continuity and disaster recovery requirements.

      Log in to Reply
  8. Bo Wang says

    April 9, 2024 at 10:23 pm

    How to improve response speed to disasters.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (1)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (4)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in