• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.005 ■ Spring 2021 ■ Wade Mackey
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit 01 – Threat Environment
      • Unit 02 – System Security Plan
      • Unit 03 – Planning and Policy
      • Unit 04 – Cryptography
      • Unit 05 – Secure Networks
      • Unit 06 – Firewalls
      • Unit 07 – Mid-Term Exam
    • Second Half of the Semester
      • Unit 08 – Access Control
      • Unit 9 Host Hardening
      • Unit 10 Application Security
      • Unit 11 Data Protection
      • Unit 12 – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Participation
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Cyberattack: The Maersk Global Supply-Chain Meltdown
    • Team Project – Updated 3/31/2020
  • Harvard Coursepack
  • Gradebook

My question to discuss with my classmates

January 23, 2020 by Wade Mackey 21 Comments

Filed Under: 03 - Planning and Policy Tagged With:

Reader Interactions

Comments

  1. Akshay Shendarkar says

    January 24, 2020 at 3:16 pm

    Since it is difficult/impossible to predict the probability of any security incident, what are some of the alternatives that can be used to get a more accurate estimation while performing the classical Risk Analysis ?

    Log in to Reply
  2. Numneung Koedkietpong says

    January 24, 2020 at 8:16 pm

    What are the risks when the system security planning is reviewed and approved by unauthorized person?

    Log in to Reply
    • Christopher James Lukens says

      January 28, 2020 at 11:21 am

      The risk is that the person who is unauthorized may also be unqualified to review a SSP. This could lead to gaps in the plan or even gaps towards compliance and open the company up for breaches and fines. The SSP needs to be reviewed by qualified security professionals who know how to use the framework.

      Log in to Reply
  3. Zeynep Sahin says

    January 24, 2020 at 10:59 pm

    How can an organization balance regulatory compliance and business needs?

    Log in to Reply
    • Junjie Han says

      April 1, 2020 at 12:00 pm

      Hi, Zeynep Sahin
      The organization should choose the right IT security framework for security control deployment.This depends on the organization’s positioning of its business.

      Log in to Reply
  4. Percy Jacob Rwandarugali says

    January 26, 2020 at 11:50 am

    Who should have access to the system security and where should to it be stored?

    Log in to Reply
  5. Percy Jacob Rwandarugali says

    January 26, 2020 at 11:52 am

    Who should have access to the system security plan and where should to it be stored?

    Log in to Reply
  6. Christopher James Lukens says

    January 26, 2020 at 2:16 pm

    What are the relationships between FIPS 199, FIPS 200, SP 800-53, in terms of developing a system security plan?

    Log in to Reply
    • Zeynep Sahin says

      January 27, 2020 at 2:43 am

      FIPS Publication 199 is for Security Categorization of Federal Information and Information Systems. FIPS Publication 200, points out risk-based process for selecting the security controls to meet the minimum-security requirements. NIST SP 800-53 provides three security control baselines., low, moderate, and high, that are associated with the three FIPS 199 impact levels; as the impact level increases, so do the minimum assurance requirements.

      Log in to Reply
  7. Imran Jordan Kharabsheh says

    January 26, 2020 at 7:53 pm

    Among the seventeen security related areas that are covered in the minimum security requirements of federal information systems security program, which area do you feel holds the most significance and cover the most prominent risks faced by federal agencies?

    Log in to Reply
  8. Natalie Dorely says

    January 26, 2020 at 9:41 pm

    What would happen if organizations added biometrics as a form of security control and there was a breach in confidential information of the employees that personal information was obtained?

    Log in to Reply
  9. Junjie Han says

    January 26, 2020 at 11:04 pm

    When some organizations are unable to meet minimum security requirements (when they want to implement IT programs such as membership).But the financial situation does not meet the minimum security requirements.) what can they do?Or just take risks?

    Log in to Reply
  10. Alexander Reichart-Anderson says

    January 26, 2020 at 11:40 pm

    Which information systems, positions, and policies/standards are most risky, important, and/or vulnerable as we move into the 2020s?

    Log in to Reply
    • Christopher James Lukens says

      January 28, 2020 at 11:18 am

      I think at the hart of this question its about staying current with standards and not falling behind on best practices. At the current time using the NIST standards is a great option but once implemented you need to review and make sure there are no changes and that your still current. The most risky thing to do is to implement a framework and then never look at it again and assume your not vulnerable.

      Log in to Reply
  11. Sarah Puffen says

    January 26, 2020 at 11:44 pm

    Why is it important to revisit security categorizations as a business matures?

    Log in to Reply
    • Christopher James Lukens says

      January 28, 2020 at 11:14 am

      As the business evolves and matures, a business needs to make sure their categorizations of data are right otherwise they wont be using the necessary controls to prevent an incident. Another reason is to make sure the company stays in compliance and doesn’t receive any fines.

      Log in to Reply
  12. Joseph Nguyen says

    January 27, 2020 at 12:01 am

    Is SSP specific to NIST only or also available in other frameworks?

    Log in to Reply
    • Peiran Liu says

      April 1, 2020 at 1:55 pm

      There are also kinds of system security plan for different frameworks, but the SSP we are doing are specifically to NIST only as it contains lots of references to the NIST file.

      Log in to Reply
  13. Innocent says

    January 29, 2020 at 2:32 am

    Who is responsible for implementing, monitoring and enforcing the security rules and policies that are established and authorized by the management of an organization ?

    Log in to Reply
  14. Peiran Liu says

    April 1, 2020 at 1:53 pm

    How often should the policy be updated for a small company to balance between cost and effectiveness?

    Log in to Reply
    • Percy Jacob Rwandarugali says

      April 1, 2020 at 5:27 pm

      Hi Sarah,
      I think policies can reviewed between 1 to 2 years, however for fast paced businesses, like PCI DSS mechants may need to review policies once or at most twice a year.

      Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (2)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (6)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (6)
  • 13 – Review (1)
  • 13 – Team Project Presentations and Review for Final (1)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in