• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.701 ■ Spring 2022 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit 01 – Threat Environment
      • Unit 02 – System Security Plan
      • Unit 03 – Planning and Policy
      • Unit 04 – Cryptography
      • Unit 05 – Secure Networks
      • Unit 06 – Firewalls
      • Unit 07 – Mid-Term Exam
    • Second Half of the Semester
      • Unit 08 – Access Control
      • Unit 9 Host Hardening
      • Unit 10 Application Security
      • Unit 11 Data Protection
      • Unit 12 – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Equifax Data Breach
    • Participation
    • Team Project
  • Harvard Coursepack
  • Gradebook
  • Zoom

My question to discuss with my classmates

March 17, 2022 by Jose Gomez 31 Comments

Filed Under: 10 - Application Security Tagged With:

Reader Interactions

Comments

  1. Madalyn Stiverson says

    March 18, 2022 at 10:49 am

    What’s the very first step to application hardening?

    Log in to Reply
    • Kelly Sharadin says

      March 21, 2022 at 6:33 pm

      Hi Madalyn,

      The first step to application hardening is to identify/define the attack surface of the application. This is accomplished through logically mapping how data flows through the application, what types of data the application ingests and applying the proper controls to prevent exploitation.

      Kelly

      Log in to Reply
  2. Victoria Zak says

    March 19, 2022 at 12:25 pm

    With Web Application, what is the biggest challenge?

    Log in to Reply
    • Antonio Cozza says

      March 20, 2022 at 7:55 pm

      The biggest applications with web applications in general is securing them, as there are a plethora of security downfalls in implementing applications, developers are not always informed of best security practices rather than completing functionality of the application.

      Log in to Reply
    • kofi bonsu says

      March 22, 2022 at 8:41 pm

      Hello Victoria,
      Thanks for sharing your thought on question to discuss with your classmates. I believe that Web security is always the biggest challenge in developing the application. No matter what, security should always be included throughout the development lifecycle. Web app developers should take proper measures while coding and make sure that they include appropriate encryptions to safeguard their products against the threats mentioned above.

      Log in to Reply
  3. Dhaval Patel says

    March 20, 2022 at 8:27 am

    Is it more difficult to secure applications or operating systems?

    Log in to Reply
    • Victoria Zak says

      March 20, 2022 at 1:42 pm

      Dhaval,

      It is easier to secure operating systems than applications.
      With operating systems, an individual has to keep up with the system and software security updates (there are automatic push for software updates available), enable a firewall, password protect and lock your device, encrypt your data, and use a VPN.
      However to secure an application, an application security audit, proper logging, real-time security monitoring and protection, encrypt and harden everything, keeping severs and softwares up to date, and keep an eye on OWASP top ten are ways to protect an application.

      Log in to Reply
    • Antonio Cozza says

      March 20, 2022 at 6:00 pm

      I think that in theory it is easier to secure an OS if it is linux/unix, Windows is inherently more difficult because the GUI adds many more attack vectors and kernel vulnerabilities, and Windows kernel is maintained only by a small sample of Microsoft employees. Applicatons are created by all kinds of developers with a wide variety of skill ranges and there are a high number of possible attack vectors, inevitably 1 or several seem to always make it past developers, especially the lazier they are with development, the more vulnerable an application will be, with clear indications to attackers of certain attack methods to check for based on picking up that a developer is using a subpar practice.

      Log in to Reply
  4. Dan Xu says

    March 20, 2022 at 8:36 am

    What measures are in place to protect patches of critical assets, systems and data on the network?

    Log in to Reply
  5. Kelly Sharadin says

    March 20, 2022 at 11:28 am

    What is one measure an organization can take to improve email application gateway security?

    Log in to Reply
    • Victoria Zak says

      March 20, 2022 at 1:54 pm

      Kelly,
      One way an organization can improve an email gateway is ensuring the user is an actual employee before creating an account. The organization must keep track of employees (who is leaving/ will be immediately terminated) and terminate their access in a reasonable amount of time in order to disregard any threat. Another way to improve email application gateway security is to enable the account hijack detection. If an attacker guesses the account’s password, in order to limit the ability to a compromised account, the account hijack detection is able to set a maximum number of messages given in a timeframe One ether limit is reached, the account is disabled and the administrator is notified.

      Log in to Reply
    • Madalyn Stiverson says

      March 22, 2022 at 4:44 pm

      Hi Kelly,

      One of the most important things is to train the people. You should implement at least annual training on security awareness and phishing awareness. You can also use simulated phishing attacks to test employee’s awareness. When you send out the simulated phishing attacks, you should record what percentage of employees fail, pass, and do not respond. This will help you track improvement over time and the effectiveness of your phishing awareness training.

      Log in to Reply
  6. kofi bonsu says

    March 20, 2022 at 1:57 pm

    The question I intend to discuss with my classmates is explain what does OWASP Application Security Verification Standard (ASVS) project includes?

    Log in to Reply
    • Kyuande Johnson says

      March 21, 2022 at 9:57 pm

      The OWASP Application Security Verification Standard (ASVS) Project provides a basis for testing web application technical security controls and also provides developers with a list of requirements for secure development.

      Log in to Reply
  7. Patrick Jurgelewicz says

    March 20, 2022 at 5:52 pm

    Although the OWASP Top 10 is a de facto standard in the AppSec industry, it is intended mostly to bring awareness to threats and be a starting point for an AppSec program. What steps or documents in addition to the OWASP Top 10 could assist in building a robust AppSec program?

    Log in to Reply
    • Antonio Cozza says

      March 20, 2022 at 7:51 pm

      Historically, appsec has been mostly an afterthought because functionality and a complete application were driven by the business goals and security was not implemented initially. OWASP is good for finding web app vulnerabilities, but security has to be implemented by design, so a good question to ask is: Are we implementing security in our application design process?

      Log in to Reply
  8. Antonio Cozza says

    March 20, 2022 at 7:56 pm

    Aside from being more or less common, does anyone think that one of the OWASP top 10 common web app vulnerabilities holds more weight than another and why?

    Log in to Reply
    • Vraj Patel says

      March 21, 2022 at 4:23 pm

      Hello Antonio,
      I would say the Broken Authentication would hold more weight than other once. Broken Authentication is using an weak or well-known password on the websites. Therefore, it would allow the attackers easy access to the websites.

      Log in to Reply
  9. zijian ou says

    March 20, 2022 at 10:46 pm

    What is the most effective way to protect web applications?

    Log in to Reply
    • Vraj Patel says

      March 21, 2022 at 4:26 pm

      Hello Zijian,
      There are many ways to protect the web application. However, on of the most important way I think would be by validating the inputs that the website would be accepting such as username and password or a comment section. This would also ensure the risk of SQL or Cross-Site scripting would be migrated.

      Log in to Reply
    • Kyuande Johnson says

      March 21, 2022 at 9:56 pm

      Maintain Security During Web App Development
      Before you run out and hire a team of security consultants, realize that you can maintain security in your web applications during the actual development of those tools.

      Log in to Reply
  10. Michael Jordan says

    March 21, 2022 at 12:16 am

    Should AppSec be a perpetual thought in the minds of application programmers when creating new applications, or is it better to just code the whole application for functionality and then test and change code after reviewing/auditing for security in the end?

    Personally, I think that it is probably better to incorporate main security points into the design/plan of the application (authentication, authorization, etc.), create it, and then go back and modify for specific security faults afterwards. I say this because applications are typically created with functionality in mind, which is what users want and how the money is made on the development side, and there will still be vulnerabilities that are discovered after deployment anyways. I don’t think (in most cases) it would be worth it to stress over AppSec the entire time an application is being created.

    Log in to Reply
    • Michael Jordan says

      March 21, 2022 at 12:19 am

      I also think this is why extensive testing is important. I wanted to clarify that I did not mean applications should be deployed prematurely.

      Log in to Reply
  11. Vraj Patel says

    March 21, 2022 at 3:18 pm

    Is the Soft Phones more secure than IP Telephones? If so, how are they more secure?

    Log in to Reply
  12. Kyuande Johnson says

    March 21, 2022 at 9:49 pm

    How to mitigate SQL Injection risks?

    Log in to Reply
    • Madalyn Stiverson says

      March 22, 2022 at 4:44 pm

      Hi Kyuande,

      One of the best ways to protect against SQL injections is security-driven programming. Train employees on the risks and how you can avoid SQL injection, and then enforce accountability through audits. One of the methods you should train your employees in is input validation and sanitation. This sanitation process should modify or remove queries made by the user which includes double quotation marks or other code that could modify the SQL database.

      Log in to Reply
    • Bernard Antwi says

      April 20, 2022 at 11:20 pm

      Hi Kyuande

      One way will be the use of firewall. Consider a web application firewall (WAF) – either software or appliance based – to help filter out malicious data. Good ones will have a comprehensive set of default rules, and make it easy to add new ones whenever necessary. A WAF can be particularly useful to provide some security protection against a particular new vulnerability before a patch is available.

      Log in to Reply
  13. Lauren Deinhardt says

    March 21, 2022 at 9:54 pm

    What methodologies can you use to measure changes to an attack surface, and how?

    Log in to Reply
    • Madalyn Stiverson says

      March 22, 2022 at 4:44 pm

      Hi Lauren,

      At least annually, you should assess any changes in your attack surface and make sure that your key data/systems are protected. To calculate the attack surface, you will need to take inventory of the all entry and exit points into the system, all valuable data on the system or used in the system, and the code that protects these items. Once you add all of this together, you get the attack surface.

      Log in to Reply
  14. Olayinka Lucas says

    April 20, 2022 at 9:38 pm

    What is a disadvantage of application hardening?

    Log in to Reply
  15. Bernard Antwi says

    April 20, 2022 at 11:17 pm

    What is the latest OWASP in 2022?

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (2)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (6)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)
  • 13 – Review (1)
  • 13 – Team Project Presentations and Review for Final (1)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in