• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.005 ■ Spring 2021 ■ Wade Mackey
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit 01 – Threat Environment
      • Unit 02 – System Security Plan
      • Unit 03 – Planning and Policy
      • Unit 04 – Cryptography
      • Unit 05 – Secure Networks
      • Unit 06 – Firewalls
      • Unit 07 – Mid-Term Exam
    • Second Half of the Semester
      • Unit 08 – Access Control
      • Unit 9 Host Hardening
      • Unit 10 Application Security
      • Unit 11 Data Protection
      • Unit 12 – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Participation
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Cyberattack: The Maersk Global Supply-Chain Meltdown
    • Team Project – Updated 3/31/2020
  • Harvard Coursepack
  • Gradebook

My question about System Security Plans to discuss with my classmates

January 15, 2020 by Wade Mackey 24 Comments

Filed Under: 02 - System Security Plan Tagged With:

Reader Interactions

Comments

  1. Percy Jacob Rwandarugali says

    January 17, 2020 at 7:12 pm

    Do small businesses require comprehensive system security plans and implementation of government mandated polices to the “T” despite limited budgets?

    Log in to Reply
    • Christopher James Lukens says

      January 21, 2020 at 9:37 am

      Hi Percy,
      Great question, I think its incredibly important for small businesses to take cyber security seriously. As always the issue comes down to the amount of time and resources a small business can spare to develop a a comprehensive plan. I think just the development of a plan even if it isn’t perfect already puts a small business ahead of others. Small business still need to comply to government rules no different that a large business as well.

      Log in to Reply
  2. Zeynep Sahin says

    January 17, 2020 at 9:23 pm

    What would be the advantages or challenges of implementing risk management practices from the beginning of SDLC to the end of all phases?

    Log in to Reply
    • Sarah Puffen says

      January 21, 2020 at 9:37 am

      I think that time would be a challenge when implementing risk management practices to all phases of the SDLC. For example, after implementing controls and determining the residual risk- the residual risk may not be at an acceptable level, so the risk management cycle would need to be repeated in order to figure out a way to lower the residual risk to an appropriate level. While this is beneficial in the long run, it can be time consuming and costly to the agency.

      Log in to Reply
  3. Numneung Koedkietpong says

    January 18, 2020 at 12:11 am

    What are difficulties or obstacles when organization develop system security plans?

    Log in to Reply
    • Junjie Han says

      April 1, 2020 at 11:55 am

      Hi, Numneung
      I thinks the challenge of develop system security plans are align the organization’s business goals with IT applications, using a risk-based orientation to accurately assess business requirements related to IT and IoT/IIoT.Adopt and apply appropriate standards-based frameworks.Create or adjust your security and compliance architecture.

      Log in to Reply
  4. Akshay Shendarkar says

    January 18, 2020 at 5:08 pm

    For an effective incident response plan, how do organizations define appropriate logging and monitoring standards, so that meaningful data is capture which can provide alerts for potential security incidents ?

    Log in to Reply
    • Percy Jacob Rwandarugali says

      April 1, 2020 at 4:33 pm

      Great question Akshay, i think companies should determine which data or critical parts of the system need to be protected/ monitored and what framework they want to use and then deploy a customized SIEM tool based on their security parameters

      Log in to Reply
  5. Imran Jordan Kharabsheh says

    January 19, 2020 at 2:25 pm

    What are the benefits and shortcomings of differing system security planning infrastructures?

    Log in to Reply
  6. Peiran Liu says

    January 19, 2020 at 8:19 pm

    Which part should be the most prioritized part of system security planning? Or which part should companies put most money in?

    Log in to Reply
  7. Junjie Han says

    January 19, 2020 at 8:44 pm

    Risk management in IT requires identifying system characteristics.What are the main differences in system characteristics?How does this affect security priorities?

    Log in to Reply
    • Zeynep Sahin says

      January 20, 2020 at 1:50 am

      Hi Junjie,
      System characterization is the process of identifying information system assets that need to be protected. Information assets are characterized according to their criticality to the organization (using FIPS 199 to determine the system’s appropriate security categorization). This process is so important because the results of this processes provide basis for risk assessment works and other security processes.

      Log in to Reply
  8. Christopher James Lukens says

    January 19, 2020 at 9:31 pm

    How often should the system security plan be revised? How should changes be implemented?

    Log in to Reply
    • Numneung Koedkietpong says

      January 20, 2020 at 11:29 am

      Personally, I think the system security plan should be periodically reviewed and revised at least annually if there is no change. However, if there is any new program development, update of systems or any changes of information system owner, the organization should review the system security plan right after that because the changes impact to new risks. The organization should identify assets, evaluate risks based on FIP199, define system owner, and document to the plan with revision number and date.

      Log in to Reply
  9. Joseph Nguyen says

    January 19, 2020 at 10:22 pm

    It would be good to have a program that use AI/Machine Learning that can help to create/maintain a system security plan . The program interactively can propose/suggest options of howto mitigate certain security controls.

    Log in to Reply
    • Junjie Han says

      January 21, 2020 at 5:33 pm

      AI machines can help machines and systems maintain maintenance security plans.And the AI machine itself needs a security plan.AI can help humans reduce some of the computation and observation time.Confusion, polymorphous and certain other characteristics are among the most challenging hacking techniques that make it difficult to detect malicious programs.In addition, security engineers with specific domain knowledge are another important issue in ensuring network security.But by using AI and ML, experts and researchers will do their best to use the best technology to identify and respond to complex cyber attacks with little or no human intervention.

      Log in to Reply
  10. Sarah Puffen says

    January 19, 2020 at 11:47 pm

    Where should the system security plan be stored? Who should be allowed access to the system security plan?

    Log in to Reply
    • Zeynep Sahin says

      January 20, 2020 at 1:24 am

      Hi Sarah,
      I think, SSPs should have confidential or at least restricted level of classification. Therefore, access to this document should be granted to only authorized employees so that any exploitation of security controls is prevented. And, every company should follow their policies for storing, handling, and distribution about confidential documents. For instances, encryption and creating appropriate access-control lists.

      Log in to Reply
  11. Qiannan Zhen says

    January 20, 2020 at 12:07 am

    Does the system security plan apply to any type of organization?

    Log in to Reply
    • Numneung Koedkietpong says

      January 20, 2020 at 11:16 am

      Hi Zhen, I think every organization should establish system security plan because it is a guideline and help organizations to well understand systems, data, system owners, and security controls. Each organization has different system security plan since it depends on risks, nature of organization business, what assets they have, how big impacts of the risk when they perform risk management analysis.

      Log in to Reply
      • Qiannan Zhen says

        January 21, 2020 at 11:30 pm

        I agree with you. I think it is necessary for the management of the organization to understand the system security plan. Only by mastering the requirements of SSP, can managers develop appropriate SSP for the organization and play a role.

        Log in to Reply
  12. Natalie Dorely says

    January 20, 2020 at 5:50 pm

    Is it possible to apply the Risk Assessment Process every time a new security control is applied?

    Log in to Reply
    • Peiran Liu says

      April 1, 2020 at 1:32 pm

      In my option it should depend on how new or different the new security control is. If the security control is drastically different, the risk assessment process should be rethink. Otherwise, it is ok to apply the same risk assessment process every time a new security control is applied.

      Log in to Reply
  13. Innocent says

    February 22, 2020 at 2:22 pm

    Who is responsible for the development, maintenance and update of the system security plan?

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (2)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (6)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (6)
  • 13 – Review (1)
  • 13 – Team Project Presentations and Review for Final (1)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in