• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.005 ■ Spring 2021 ■ Wade Mackey
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit 01 – Threat Environment
      • Unit 02 – System Security Plan
      • Unit 03 – Planning and Policy
      • Unit 04 – Cryptography
      • Unit 05 – Secure Networks
      • Unit 06 – Firewalls
      • Unit 07 – Mid-Term Exam
    • Second Half of the Semester
      • Unit 08 – Access Control
      • Unit 9 Host Hardening
      • Unit 10 Application Security
      • Unit 11 Data Protection
      • Unit 12 – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Participation
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Cyberattack: The Maersk Global Supply-Chain Meltdown
    • Team Project – Updated 3/31/2020
  • Harvard Coursepack
  • Gradebook

My question to discuss with my classmates

February 27, 2020 by Wade Mackey 22 Comments

Filed Under: 08 - Access Control Tagged With:

Reader Interactions

Comments

  1. Percy Jacob Rwandarugali says

    March 1, 2020 at 3:20 pm

    What do you think provides more security as regards to access control and authentication, CSPs or physical systems?

    Log in to Reply
    • Christopher James Lukens says

      March 10, 2020 at 7:34 pm

      Both are needed and are incredibly important but I would argue that physical security is more important. If someone is able to get into your facility and get access to a networking closet, or just a network jack massive damages could occur. If a hacker has physical access to the device they will be able to compromise it is often the mentality taken which is why physical security should not be overlooked.

      Log in to Reply
  2. Innocent says

    March 2, 2020 at 9:35 am

    What is the name of a client/server protocol designed to allow network access servers to authenticate remote users by sending access request messages to a central server ?

    Log in to Reply
  3. Zeynep Sahin says

    March 3, 2020 at 12:36 am

    What are the ways of solving access control dilemma-balancing security and convenience?

    Log in to Reply
  4. Natalie Dorely says

    March 4, 2020 at 3:54 pm

    Do you think biometrics is an efficient tool to use for multi-factor authentication?

    Log in to Reply
    • Numneung Koedkietpong says

      March 9, 2020 at 10:31 am

      Hi Natlie,
      Personally, I think using biometrics combining with other access control for multi-factor authentication make efficiency and increase more security. For example, organization can apply user PIN (something you know) with fingerprint (something you are). In this way, it makes more difficult for authorized person to illicit access to physical resources.

      Log in to Reply
    • Sarah Puffen says

      March 10, 2020 at 12:00 pm

      I think that it can be, however I think that there should be certain circumstances where biometrics should be used. I wouldn’t use biometrics to access some game on my phone, but I would use it for something that requires more security.

      Log in to Reply
  5. Numneung Koedkietpong says

    March 6, 2020 at 9:04 pm

    How attackers can compromise systems via biometric authentication?

    Log in to Reply
    • Zeynep Sahin says

      March 9, 2020 at 5:05 am

      Hi Neung,
      There are many privacy issues with biometric data which may lead security breaches. Like any collection of data has risk of getting hacked, biometric database may be breached too, and all biometric information can be stolen. Since people cannot change their fingerprints or iris scan, once biometric data is stollen, it may no longer be under control of the owners. The other risk is that biometric data can be duplicated and used to access any device or information.

      Log in to Reply
  6. Imran Jordan Kharabsheh says

    March 8, 2020 at 11:01 pm

    Hypothetically speaking, if you were tasked with securing an information system that contained critical information to your organization and is known to be a significant target for hackers and less-than-moral employees, what physical or digital access controls would you put in place to help mitigate and discourage these threats?

    Log in to Reply
    • Zeynep Sahin says

      March 9, 2020 at 5:48 am

      Hi Imran,
      In regard to physical security, I would design layered defense to protect access control systems. For instance, I would put multifactor access control in place such as enforcing biometrics accompanying with identification card. Also, CCVT cameras and security guards may deter unauthorized people. Additionally, mantraps, combinations safes and doors or electronic card systems should be designed to protect physical access to information systems from unauthorized or malicious people. Regarding logical access control to IS, role-based access control can be used which restricts accesses to computer resources based on need-to-know principle so that only identified authorized individual can access.

      Log in to Reply
  7. Alexander Reichart-Anderson says

    March 8, 2020 at 11:51 pm

    What would be your solution to the perpetual password problem that users like myself often run into? I have too many passwords to remember and as they get more and more complex it is nearly impossible.

    Log in to Reply
    • Zeynep Sahin says

      March 9, 2020 at 5:20 am

      Hi Alex,
      Biometric technology may be an alternative for passwords and seems promising to create a password less world. However, some privacy issues remain with them too. If strong methods are developed regarding how to store and access biometric data securely, this technology will be a remedy for password problems like creating weak passwords, various passwords to remember, and the cost of creating new ones. I believe, the proper environment will be available to ensure personal data protection in the near future so that biometric data can be used by people securely.

      Log in to Reply
  8. Joseph Nguyen says

    March 9, 2020 at 12:05 am

    Should 2FA be mandatory for any authentication process?

    Log in to Reply
    • Sarah Puffen says

      March 10, 2020 at 11:11 am

      No, I don’t think so. Adding too many authentication components where they are not necessary can be risky, not only because it tends to push users away, but also because that it is another security aspect that needs to be monitored and protected. There are definitely times when 2FA is necessary, like when dealing with sensitive information, but I think it’s best to keep authentication level on par with the information it is protecting.

      Log in to Reply
  9. Junjie Han says

    March 9, 2020 at 8:47 pm

    When a password document is found to be downloaded, what emergency measures should be taken to prevent hackers from accessing the data? (hackers need time to crack password documents)

    Log in to Reply
    • Christopher James Lukens says

      March 10, 2020 at 7:38 pm

      The first step would be to go to your incident response plan and begin properly documenting all aspects of the incident that has occurred. As for the remediation step, would include immediately issuing a mandatory password change for all users. If 2 factor authentication is not used it may also be a good time to think about implementing it to heighten the security posture.

      Log in to Reply
  10. Akshay Shendarkar says

    March 10, 2020 at 5:20 pm

    As an IT Auditor, what would be the starting point for auditing the IAM department of an organizations and standards would you specifically refer when conducting the audit?

    Log in to Reply
    • Junjie Han says

      April 1, 2020 at 12:10 pm

      Hi, Shendarkar
      I think the start point is reviewing the policy of IAM department and review the file restriction setting.

      Log in to Reply
  11. Christopher James Lukens says

    March 10, 2020 at 5:23 pm

    Often times people will write passwords down and level them on their desk if they are forced to change passwords often. Where does this issue fall int, physical security or IAM?

    Log in to Reply
    • Peiran Liu says

      April 1, 2020 at 1:29 pm

      In my opinion, in this case companies should also force employee to not write them down and make janitors check the desk when they are cleaning. Even writing down in notes apps on their phone is better than writing down on papers as at least it is protected by their phone password.

      Log in to Reply
  12. Peiran Liu says

    April 1, 2020 at 1:26 pm

    Should the company force employees to use the chosen authentication method? Or should company offer different way of authentication method like physical key or biometric and let employees choose?

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (2)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (6)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (6)
  • 13 – Review (1)
  • 13 – Team Project Presentations and Review for Final (1)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in