• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.701 ■ Spring 2022 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit 01 – Threat Environment
      • Unit 02 – System Security Plan
      • Unit 03 – Planning and Policy
      • Unit 04 – Cryptography
      • Unit 05 – Secure Networks
      • Unit 06 – Firewalls
      • Unit 07 – Mid-Term Exam
    • Second Half of the Semester
      • Unit 08 – Access Control
      • Unit 9 Host Hardening
      • Unit 10 Application Security
      • Unit 11 Data Protection
      • Unit 12 – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Equifax Data Breach
    • Participation
    • Team Project
  • Harvard Coursepack
  • Gradebook
  • Zoom

My question to discuss with my classmates

January 20, 2022 by Jose Gomez 14 Comments

Filed Under: 03 - Planning and Policy Tagged With:

Reader Interactions

Comments

  1. Kelly Sharadin says

    January 26, 2022 at 9:45 am

    FIPS and FedRAMP have a strict focus on governmental and public sector organizations. We talk about the need for consistent standards within the industry and I agree with that. However for private or smaller organizations should a new standard emerge to standardize security requriements for the private sector or do we believe Sarbanes Oxley, GDPR and COPPA already accomplish that?

    Log in to Reply
  2. Lauren Deinhardt says

    January 26, 2022 at 4:57 pm

    Our class readings this week included a lot on ISO compliance certifications. Out of those mentioned (ie ISO 27001, 27004, 27007, etc.), which do you think is the most important to modern information security?

    Log in to Reply
  3. Kyuande Johnson says

    January 26, 2022 at 9:44 pm

    How many steps are involved in the RMF Process? and Describe each step.

    Log in to Reply
  4. zijian ou says

    January 27, 2022 at 1:53 am

    What are the 17 security-related areas covered by the minimum security requirements related to protection?

    Log in to Reply
  5. Antonio Cozza says

    January 27, 2022 at 12:18 pm

    While the goal of FIPS 200, minimum security requirements for federal information and information systems, is to provide what the title suggests in terms of managerial, operational, and technical aspects, are the seventeen areas that it defines to be required sufficient? Are they any notable possible oversights to be considered now in 2022 compared to those defined when it was suggested in 2006?

    Log in to Reply
  6. Victoria Zak says

    January 27, 2022 at 10:19 pm

    What is the purpose of FIPS 200? What are the minimum security requirements?

    Log in to Reply
  7. Dan Xu says

    January 28, 2022 at 4:38 am

    NIST 800 60 V1R1 mentions the RMF process. Which is the most critical step in the RMF process and why?

    Log in to Reply
  8. Madalyn Stiverson says

    January 30, 2022 at 11:12 am

    How would you go about creating an information risk profile for a small start-up business? How should the business use the risk profile?

    Log in to Reply
  9. kofi bonsu says

    January 30, 2022 at 9:29 pm

    The likely question that I would discuss with my classmates is how might we mitigate the risk of phishing attacks?

    Log in to Reply
    • Victoria Zak says

      February 1, 2022 at 8:34 pm

      Hi Kofi,

      This is a great question to discuss with the class. I found this article stating phishing is involved in 36% of breaches and 85% of the breaches involved a human element (https://www.phishingbox.com/resources/phishing-facts).
      However, organizations can educate their employees of what a potential phishing attack may look like. For example, emails should be sent out every month, if not quarterly, to see if an employee can point out a phishing attack.
      An employee should look for poor grammar/spelling, sent from a free account, use of emotional queues, and URLs are not real. Another way to mitigate a risk of a phishing attack is MFA. It is an extra protection of layer to protect an account.

      Log in to Reply
  10. Michael Jordan says

    January 31, 2022 at 11:05 pm

    Given the number of security controls listed in FIPS 200 and how many organizations have more controls than the bare minimum, how many people and how much time does it take to conduct a good audit on a large organization or government agency?

    Log in to Reply
  11. Bernard Antwi says

    February 1, 2022 at 10:59 pm

    What are the security functional requirements in information security system explain the FIPS 200?

    Log in to Reply
  12. Olayinka Lucas says

    February 12, 2022 at 7:04 pm

    FIPS 200 is the same as NIST SP 800 53 r 5, which encompasses 20 control families and 272 controls in total is the guidelines for Security Controls implementation in the United States. What would be the most appropriate/standard security guideline for auditing businesses that choose to operate outside the United States

    Log in to Reply
  13. Olayinka Lucas says

    February 13, 2022 at 2:26 pm

    What is the most important step out of the 6 recommended by the Risk management Framework in NIST SP 800-37

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (2)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (6)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)
  • 13 – Review (1)
  • 13 – Team Project Presentations and Review for Final (1)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in