• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.701 ■ Spring 2022 ■ Jose Gomez
  • Homepage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit 01 – Threat Environment
      • Unit 02 – System Security Plan
      • Unit 03 – Planning and Policy
      • Unit 04 – Cryptography
      • Unit 05 – Secure Networks
      • Unit 06 – Firewalls
      • Unit 07 – Mid-Term Exam
    • Second Half of the Semester
      • Unit 08 – Access Control
      • Unit 9 Host Hardening
      • Unit 10 Application Security
      • Unit 11 Data Protection
      • Unit 12 – Incident and Disaster Response
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Equifax Data Breach
    • Participation
    • Team Project
  • Harvard Coursepack
  • Gradebook
  • Zoom

Main Content

Wrap Up

April 14, 2022 By Jose Gomez

Slides with Practice Exam Questions

Wrap Up

March 31, 2022 By Jose Gomez Leave a Comment

Presentation slides

Boyle and Panko Chapter 10 Incident and Disaster Response

March 31, 2022 By Jose Gomez 22 Comments

In The News

January 13, 2022 by Jose Gomez 11 Comments

Contribute a link and a brief summary.

Filed Under: 02 - System Security Plan Tagged With:

Wrap up

January 13, 2022 by Jose Gomez

Lecture slides 

Filed Under: 01 - Introduction Tagged With:

Boyle and Panko: Chapter 1 “The Threat Environment”

December 22, 2021 by Jose Gomez 22 Comments

Post your thoughtful analysis about one key point you took from this assigned reading. (This first week you are not required to post: One question to ask your fellow classmates to facilitate discussion, nor are required to post In The News nor comment on other students’ postings.)

Filed Under: 01 - Threat Environment Tagged With:

Welcome to Security Architecture

December 22, 2021 by Jose Gomez

Course

In this course you will study and learn about how organizations plan, design and develop enterprise security architecture, align their IT security capabilities with its business goals and strategy, and assess IT system security architectures and capabilities.

Objectives

  1. Learn key Enterprise Security Architecture concepts
  2. Develop an understanding of contextual, conceptual, logical, physical and component levels or security architectures and how they relate to one another
  3. Learn how security architectures are planned, designed and documented
  4. Gain an overview of how security architectures are evaluated and assessed
  5. Gain experience working as part of team, developing and delivering a professional presentation

Filed Under: 01 - Introduction Tagged With:

Ross, J.W., Weill P., and Robertson D.C. (2008), “Implement the Operating Model Via Enterprise Architecture”

December 22, 2021 by Jose Gomez 18 Comments

Post your thoughtful analysis about one key point you took from this assigned reading.

Filed Under: 01 - Threat Environment Tagged With:

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 5
  • Page 6
  • Page 7

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (2)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (6)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)
  • 13 – Review (1)
  • 13 – Team Project Presentations and Review for Final (1)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in