• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.701 ■ Spring 2022 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit 01 – Threat Environment
      • Unit 02 – System Security Plan
      • Unit 03 – Planning and Policy
      • Unit 04 – Cryptography
      • Unit 05 – Secure Networks
      • Unit 06 – Firewalls
      • Unit 07 – Mid-Term Exam
    • Second Half of the Semester
      • Unit 08 – Access Control
      • Unit 9 Host Hardening
      • Unit 10 Application Security
      • Unit 11 Data Protection
      • Unit 12 – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Equifax Data Breach
    • Participation
    • Team Project
  • Harvard Coursepack
  • Gradebook
  • Zoom

My question to discuss with my classmates

February 3, 2022 by Jose Gomez 27 Comments

Filed Under: 05 - Secure Networks Tagged With:

Reader Interactions

Comments

  1. Kelly Sharadin says

    February 4, 2022 at 1:58 pm

    Cloud environments can reduce network visibility compared to on-premise networks. I have been working on an Azure networking project and its eye-opening how much collecting that information will cost the client. To that end, do you think cloud environments make network security more or less difficult?

    Log in to Reply
    • Lauren Deinhardt says

      February 6, 2022 at 10:01 pm

      I really think that this depends on the type of service deployed. For instance, a SaaS cloud platform might have more managed security than an IaaS would (i.e. MSFT O365, depending on the package, can include Windows Defender and other security measures that an IaaS might not). Overall, I do believe that many cloud platforms offer functional means of creating a secure environment.

      Log in to Reply
  2. zijian ou says

    February 5, 2022 at 7:15 am

    What steps can be taken to prevent distributed denial of service attacks (DDoS)?

    Log in to Reply
    • Kelly Sharadin says

      February 6, 2022 at 10:23 am

      Hi Zijian,

      A couple of mitigations organizations can put in place to prevent DDoS attacks. First and foremost, understanding what normal network traffic looks like can help network engineers filter malicious traffic. Organizations should use load balancers to help offset spikes in traffic to prevent the server from being taken offline during a DDoS attack. If the infrastructure is hosted with a cloud provider, utilize their services for DDoS protection and review any SLAs regarding DDoS protection. Lastly, if the organization has the security maturity to do so, implementing deception techniques like honeypots to direct malicious attackers to decoy resources can help defenders respond without being actively targeted.

      Kelly

      Log in to Reply
    • kofi bonsu says

      February 8, 2022 at 8:24 am

      Hi ZiJian,
      I believe an organization can help avoid a distributed denial-of-service attack by doing the following: Creating a strategy for dealing with denials of service. Securing the resources of the network. Filtering firewalls and routers at the network’s edge to detect and block DDoS links

      Log in to Reply
    • Madalyn Stiverson says

      February 8, 2022 at 9:31 am

      Hi Zijian,

      In addition to what Kelly and Kofi mentioned, there are a few additional things you can track and implement. You can track and block requests coming from a single IP or IP range. You should track your normal network traffic and respond to any abnormal traffic. You can also increase your bandwidth, as it will increase your resilience to DDoS attacks. Cloud-based networks naturally have larger bandwidth.

      Log in to Reply
  3. Madalyn Stiverson says

    February 5, 2022 at 9:57 am

    What are the pros and cons to a wholly cloud based infrastructure? Is this feasible for small businesses to implement?

    Log in to Reply
    • Vraj Patel says

      February 7, 2022 at 7:44 pm

      Hello Madalyn,
      One of the pro for using a cloud based infrastructure is the availability of that system. The system on the cloud could be easily accessible from any where. One of the con would be that as it’s online it could be accessible by any one. As a result it would need to be properly secured.

      Log in to Reply
  4. Andrew Nguyen says

    February 5, 2022 at 7:41 pm

    One question that i would like to ask my classmates based off this weeks readings would be :

    How does using a cloud infrastructure help prevent/mitigate DDoS attacks?

    Log in to Reply
    • Michael Jordan says

      February 9, 2022 at 12:23 am

      Hi Andrew,

      I would think that using a cloud infrastructure could help prevent DDoS attacks because cloud providers are connected to so many organizations that they inherently have more responsibility than most companies to make their services as secure as possible. Using an IaaS may create more responsibility for the purchasing organization, but there could still be flaws in the CSP network that could grant access to back-end cloud storage, connected networks, and more (hopefully not).

      I think using a cloud infrastructure could help mitigate attempted attacks because the network bandwidth would be larger and would require more traffic to disrupt, boosting the availability of the network, but not making it invincible.

      With that being said, I would also think CSP’s receive among the highest volume of attempted attacks due to the volume of storage and interconnectivity they hold, so there is some trade off.

      -Mike

      Log in to Reply
  5. kofi bonsu says

    February 6, 2022 at 6:23 am

    One question that I will be happy to discuss with my classmates is explain what is meant by a certification authority and the role of a digital certificate for as far as security is concerned.

    Log in to Reply
    • Patrick Jurgelewicz says

      February 8, 2022 at 11:48 am

      Hey Kofi, a certification authority is “an entity entrusted to issue certificates that assert that the recipient individual, computer, or organization requesting the certificate fulfills the conditions of an established policy”. Basically, they are trusted parties that validates a host’s identity so end users don’t have to. A digital certificate is the digitally signed statement that contains the information about an entity and the entity’s public key.

      Log in to Reply
  6. Antonio Cozza says

    February 6, 2022 at 6:43 pm

    As cybersecurity professionals, how do you view and do you purchase IoT / “smart” devices when these are notoriously insecure, unpatched, and are the easiest method of adding zombies into a botnet for an attacker to control with a c2 server and enact a DoS attack?

    Log in to Reply
    • Madalyn Stiverson says

      February 8, 2022 at 9:25 am

      Hi Antonio,

      For me, it’s a tradeoff of an additional potential attack vector vs convenience When I hook up a smart light switch in my house, I make sure to change the default password to something strong and unique. Ideally, you’d also do regular firmware updates and make sure someone can’t use the light switch as a stepping stone into your network. I would be hesitant to install locks and garage openers that are connected to the internet, as a vulnerability in those could grant access to the house.

      Log in to Reply
  7. Vraj Patel says

    February 6, 2022 at 7:17 pm

    What mitigation steps can be taken once identified the DDoS attack?

    Log in to Reply
    • Victoria Zak says

      February 7, 2022 at 8:43 pm

      Hi Vraj,

      In the article we read for this week, there are any many mitigation steps an organization can take once a DDoS attack is identified. One being, to identify statistical patterns and being able to compare the same with live traffic. Another way is to set up dummy servers with maximum vulnerabilities that are exposed to the hackers as legitimate servers, known as the honeypot. Additionally, aggressive catching can be utilized. Aggressive catching are webpages stored as a separate HTML files and when users request these pages, the HTML files are presented to them instead of the time/CPU resource consuming database quires. This enables the servers to handle more requests/per second and hence the smaller DDoS attacks can be fended off.

      Log in to Reply
  8. Victoria Zak says

    February 6, 2022 at 7:30 pm

    How long do DDoS attacks last and what are the different types?

    Log in to Reply
  9. Dhaval Patel says

    February 6, 2022 at 7:36 pm

    Do you think it is easier to stop/prevent DDoS attacks that occur on cloud environments or an on-prem environment/hybrid model?

    Log in to Reply
    • Patrick Jurgelewicz says

      February 8, 2022 at 11:12 am

      Hey Dhaval, I believe one of the best ways to mitigate DDoS attacks is to enable auto-scaling within the server and to load-balance and direct traffic as needed as new instances come online to deal with the incoming traffic. I believe this can be best done on cloud environments as typically additional scaling can be provided as needed, then the company can pay later.

      Log in to Reply
  10. Patrick Jurgelewicz says

    February 6, 2022 at 9:31 pm

    How do the security goals of a network differ from the typical CIA triad used for most information types?

    Log in to Reply
  11. Lauren Deinhardt says

    February 6, 2022 at 10:01 pm

    What are the 5 essential characteristics of a cloud computing environment?

    Log in to Reply
  12. Dan Xu says

    February 6, 2022 at 11:04 pm

    What are the disadvantages of cloud computing and how can they be prevented?

    Log in to Reply
  13. Olayinka Lucas says

    February 6, 2022 at 11:47 pm

    As an Information Technology Auditor, what would be the most critical risks to identify for mitigation when auditing a Cloud Service Provider (CSP).

    Log in to Reply
    • Michael Jordan says

      February 9, 2022 at 12:14 am

      Hi Olayinka,

      I would think that auditing a CSP is one of the hardest and most thorough audits that an IT auditor would have to conduct. Cloud service providers even service some government agencies, which would be (in my opinion) some of the most nerve racking systems to audit, so CSP’s are just as critical.

      I think that the largest critical risks to identify would be within the Saas and PaaS services, because the IaaS service leaves more responsibility for the purchaser of the service in regards to security (but could still could have critical flaws). The most critical risks to identify for mitigation would be within the most widespread services – for example, O365 (there was a huge Outlook breach in which over 20,000 organizations were affected (https://venturebeat.com/2021/03/08/white-house-warns-of-active-threat-following-microsoft-outlook-breach/)), Salesforce, and many more.

      TLDR: The most critical risks to identify would be the ones that could grant access to the most systems with the highest security categorizations.

      -Mike

      Log in to Reply
  14. Michael Jordan says

    February 6, 2022 at 11:56 pm

    Would you guys also consider the Titan computing cluster from the case study to be a cloud? Is the phrase “computing cluster” a synonym for a cloud?

    Log in to Reply
    • Madalyn Stiverson says

      February 8, 2022 at 9:20 am

      Hi Michael,

      The Titan cluster was accessible via internet after submitting your login information. It included both databases to store your information and additional computational power for the scientists to use in their experiments. I would consider this a community cloud, as defined in the NIST 800 145 reading for this week.

      Log in to Reply
      • Michael Jordan says

        February 9, 2022 at 12:04 am

        Hi Madalyn,

        I would consider it a cloud too. I think that in some cases, the word “cloud” is synonymous with the word “cluster”, but I did not want to overstep my knowledge and say that they are always synonyms. I am glad that you agree that the Titan cluster was a cloud. Thanks for your response!

        -Mike

        Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (2)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (6)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)
  • 13 – Review (1)
  • 13 – Team Project Presentations and Review for Final (1)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in